Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
9f99900b851e21dc4f0272e785486b6af49f6887bc53c3cdbdf436902fdd05fe.exe
Resource
win10v2004-20241007-en
General
-
Target
9f99900b851e21dc4f0272e785486b6af49f6887bc53c3cdbdf436902fdd05fe.exe
-
Size
525KB
-
MD5
c85f753bb1b227f32c2d2fa853d0c446
-
SHA1
3c12c327b4ca2c9e51310792dbdadd8164065494
-
SHA256
9f99900b851e21dc4f0272e785486b6af49f6887bc53c3cdbdf436902fdd05fe
-
SHA512
099b10ad5c1dcb50ae5d06e86f5ba7f29e5a054480550d9b270eeed29da6c588b648ca4ac0cb47771763f60b03255809fe9ae3b40840402e4646700134ad2b71
-
SSDEEP
12288:sMrny90lAIzDRfnxkiamCmmZYb2bW2+qFm7fX975XBoOf:zyErR6mmtpFsF3oOf
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0032000000023b5c-12.dat healer behavioral1/memory/1552-15-0x0000000000240000-0x000000000024A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf23Gv61uT48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf23Gv61uT48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf23Gv61uT48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf23Gv61uT48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf23Gv61uT48.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf23Gv61uT48.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2488-22-0x00000000021C0000-0x0000000002206000-memory.dmp family_redline behavioral1/memory/2488-24-0x0000000004CA0000-0x0000000004CE4000-memory.dmp family_redline behavioral1/memory/2488-40-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-42-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-88-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-86-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-84-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-82-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-78-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-76-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-75-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-72-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-70-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-68-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-66-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-62-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-60-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-59-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-54-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-52-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-50-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-48-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-46-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-44-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-38-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-37-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-34-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-32-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-80-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-64-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-56-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-30-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-28-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-26-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/2488-25-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 924 vhkz4877FF.exe 1552 sf23Gv61uT48.exe 2488 tf04SH80mZ27.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf23Gv61uT48.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f99900b851e21dc4f0272e785486b6af49f6887bc53c3cdbdf436902fdd05fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhkz4877FF.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f99900b851e21dc4f0272e785486b6af49f6887bc53c3cdbdf436902fdd05fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhkz4877FF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf04SH80mZ27.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1552 sf23Gv61uT48.exe 1552 sf23Gv61uT48.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1552 sf23Gv61uT48.exe Token: SeDebugPrivilege 2488 tf04SH80mZ27.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2444 wrote to memory of 924 2444 9f99900b851e21dc4f0272e785486b6af49f6887bc53c3cdbdf436902fdd05fe.exe 83 PID 2444 wrote to memory of 924 2444 9f99900b851e21dc4f0272e785486b6af49f6887bc53c3cdbdf436902fdd05fe.exe 83 PID 2444 wrote to memory of 924 2444 9f99900b851e21dc4f0272e785486b6af49f6887bc53c3cdbdf436902fdd05fe.exe 83 PID 924 wrote to memory of 1552 924 vhkz4877FF.exe 84 PID 924 wrote to memory of 1552 924 vhkz4877FF.exe 84 PID 924 wrote to memory of 2488 924 vhkz4877FF.exe 100 PID 924 wrote to memory of 2488 924 vhkz4877FF.exe 100 PID 924 wrote to memory of 2488 924 vhkz4877FF.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f99900b851e21dc4f0272e785486b6af49f6887bc53c3cdbdf436902fdd05fe.exe"C:\Users\Admin\AppData\Local\Temp\9f99900b851e21dc4f0272e785486b6af49f6887bc53c3cdbdf436902fdd05fe.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhkz4877FF.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhkz4877FF.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf23Gv61uT48.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf23Gv61uT48.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf04SH80mZ27.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf04SH80mZ27.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5a84ceeffe2c53edc99a3eec521a5af5f
SHA1a110e8aeba6c8f2e9dc5f93dac06dd74e01dac46
SHA256f594d05a15e68e2215db28d2142c96e350974a004383a555fd0bc8ab98ce7b51
SHA51242462cf7e45f28a9a970bc0462512116a78c60bd277d3e2ed66a3ca7fa0f7fb8afba0f21d79887a877a0dcb68b90c0c7bd97345f7652f196b66417164551a841
-
Filesize
11KB
MD5b3e29bbec2642d4a6159da83b12b8535
SHA180f47c0383c6281287cdefaf05e1b18e07625861
SHA2560fabb677e066e5c5dc45517ac13ab6da1c439e0e32cfab06eec7af6936a4a06e
SHA512ccbe1f0e796c66de541abbe962f37f5a06903b8eaa8c269913535a2e1ccb55d7fbaa8d0a01ebdf85aa9613ad50e6fd898d1d879501469ab7852607302f0ee931
-
Filesize
291KB
MD57c3fa0948e6dfcb1a40cae5e71ac5dab
SHA12c214fd6d04c2e74f56f1367c8b0c6f41f0448c7
SHA2564236b2a1a06859a5b317785d6ef410f72015f64c524958e23b2a387559d60f0c
SHA5124e3505b52ce37bbb9a9ce6b15b513ecad68883a97e5318156bb752298ecc60f125e96e09bbfcdeae80fd46cede7ab3878bd1436f628036e3a39139056275023d