Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
f128ec6b826d03c5d01f329763522ea394b7e94d1a153627448d497de7b490df.exe
Resource
win10v2004-20241007-en
General
-
Target
f128ec6b826d03c5d01f329763522ea394b7e94d1a153627448d497de7b490df.exe
-
Size
542KB
-
MD5
73e37518780946ddf321291030990222
-
SHA1
5abfa43dd1afb7bfa77d6d64203a86c50c2ba88f
-
SHA256
f128ec6b826d03c5d01f329763522ea394b7e94d1a153627448d497de7b490df
-
SHA512
cbce5df33f4c25d173d6858567f87166ef6ca848f739a1c8d7732833adddfd154535f33109743d8174b4277a1169e4d70902a3e69324c50c1de7e7cd277e7f38
-
SSDEEP
12288:TMrEy90oyasgYXeItV1ogGGwZ6qcW4RIkUZf+kdewDbl2:Hybsg45tHogGuW4qUkdrDbg
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b61-12.dat healer behavioral1/memory/1224-15-0x0000000000620000-0x000000000062A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw58Wk98sP70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw58Wk98sP70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw58Wk98sP70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw58Wk98sP70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw58Wk98sP70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw58Wk98sP70.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/112-22-0x0000000004A00000-0x0000000004A46000-memory.dmp family_redline behavioral1/memory/112-24-0x00000000071C0000-0x0000000007204000-memory.dmp family_redline behavioral1/memory/112-32-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-38-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-86-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-84-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-82-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-80-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-78-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-76-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-74-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-72-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-68-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-66-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-64-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-62-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-61-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-58-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-56-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-54-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-52-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-48-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-46-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-44-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-43-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-40-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-36-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-34-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-88-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-70-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-50-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-30-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-28-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-26-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline behavioral1/memory/112-25-0x00000000071C0000-0x00000000071FE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3664 vuU7315Jc.exe 1224 sw58Wk98sP70.exe 112 tQC49In19.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw58Wk98sP70.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f128ec6b826d03c5d01f329763522ea394b7e94d1a153627448d497de7b490df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vuU7315Jc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f128ec6b826d03c5d01f329763522ea394b7e94d1a153627448d497de7b490df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vuU7315Jc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tQC49In19.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1224 sw58Wk98sP70.exe 1224 sw58Wk98sP70.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1224 sw58Wk98sP70.exe Token: SeDebugPrivilege 112 tQC49In19.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2960 wrote to memory of 3664 2960 f128ec6b826d03c5d01f329763522ea394b7e94d1a153627448d497de7b490df.exe 83 PID 2960 wrote to memory of 3664 2960 f128ec6b826d03c5d01f329763522ea394b7e94d1a153627448d497de7b490df.exe 83 PID 2960 wrote to memory of 3664 2960 f128ec6b826d03c5d01f329763522ea394b7e94d1a153627448d497de7b490df.exe 83 PID 3664 wrote to memory of 1224 3664 vuU7315Jc.exe 84 PID 3664 wrote to memory of 1224 3664 vuU7315Jc.exe 84 PID 3664 wrote to memory of 112 3664 vuU7315Jc.exe 94 PID 3664 wrote to memory of 112 3664 vuU7315Jc.exe 94 PID 3664 wrote to memory of 112 3664 vuU7315Jc.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f128ec6b826d03c5d01f329763522ea394b7e94d1a153627448d497de7b490df.exe"C:\Users\Admin\AppData\Local\Temp\f128ec6b826d03c5d01f329763522ea394b7e94d1a153627448d497de7b490df.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vuU7315Jc.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vuU7315Jc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw58Wk98sP70.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw58Wk98sP70.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tQC49In19.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tQC49In19.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398KB
MD509cb4e90689489b91d2b61bac87cd57a
SHA10ced54bab4e51dd682cffb1bb2c8b7e92c697163
SHA256e9468e0964f249c32e3517df484ff6170ebef8d9c334ac57abe0cd101c130b5e
SHA512d2b076cb6e8d45703b31823059075b5761d7003f555b34ba879b5e3204a9ec9cd5cb33f939b93f283b4f8be242768f3411343791e9fdee4e17ef7af85c4d8ea7
-
Filesize
14KB
MD5eb48040d0b89a690e35859d3c0d20f43
SHA1bf764323a9abe836c12ced51f6fc441488fd3566
SHA256cb207a7c78f9265a4d3d843a3b767ca08e728c57a2de42450af7de79eb8b5d66
SHA512d1051868bb94dac7da8ef1c43b1a7599d05aed9bbd4d007ebdab5129cec11ba51741beb3933ef1bef339ea630e4b818143567b36f7423bf4a12888264bf6e8ce
-
Filesize
367KB
MD51d723ff94958004611f8d9036d32a484
SHA1494b2b1df04dd00bd4a6582ca026b45ed1e26f5e
SHA256ce58c79e2d8396ebc000387ba86ec87273d28bd7dfa8310c49c59b22c7de42af
SHA5129738bf0e92ad9b1f526a48a4262410186a961e0aa9e04ef1ecc4769b29d92339f46e331a65810ce72b27df319260ac8aba0636742690e95bc34f6d59fbf2ff61