Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 01:26

General

  • Target

    3efa046fb6cb01db908301b5ab6a0e454f0f4f979895fe323f5a0ebb3531d498.exe

  • Size

    912KB

  • MD5

    9e6966f846b67c695f96b94eb29bd208

  • SHA1

    02e83908979c5d590ebdb9b2b6c4671cafc99945

  • SHA256

    3efa046fb6cb01db908301b5ab6a0e454f0f4f979895fe323f5a0ebb3531d498

  • SHA512

    d9073d740114416528b58c94e357fd6162107c739d8145890532cd0d9b62c7a769b8f3392d10d92ce185e119b3eac6c6938e8bd7ee700c7233ed853521869826

  • SSDEEP

    24576:kyF544raxxt07WTEkfpnKY/ZkyrybsokHewwGySh:z7da3t+WhlKY/Zk/QoAei

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3efa046fb6cb01db908301b5ab6a0e454f0f4f979895fe323f5a0ebb3531d498.exe
    "C:\Users\Admin\AppData\Local\Temp\3efa046fb6cb01db908301b5ab6a0e454f0f4f979895fe323f5a0ebb3531d498.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st517677.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st517677.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\34804715.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\34804715.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3724
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp549319.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp549319.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4580
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 1236
          4⤵
          • Program crash
          PID:2400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr561259.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr561259.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4580 -ip 4580
    1⤵
      PID:5024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr561259.exe

      Filesize

      168KB

      MD5

      de94a2b4782da66c4061419bc4e314a3

      SHA1

      32b87f68554b7ebfd050c00e9de475bde042ed39

      SHA256

      845487d73838f054a1894cfda32aff4452be29643aa036f876ef2d5e4918f1d8

      SHA512

      bbf187cefd89888426a6d292d78cbc3ec99179eadc821b79c5944ea8cbc768f4fff6a1aeee2f8f9d37289435306f28092c5b8b76a64029a061e955fa7166ab16

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st517677.exe

      Filesize

      759KB

      MD5

      bad9b70f7e75da83e3f5036fbb4d13bc

      SHA1

      3b435d4a2bee634d29ba0f92f84b2394c589a832

      SHA256

      af51350ebc15eeab742b657bca0bfb76520826bcb5a046f47a4a2563c2dfc60f

      SHA512

      8dcf48f1b92d22060554243b2a273972b6fef0d43f6061f09e3450d4525cf72e5c7f7dd84d193c5cab82f0d9478ba26b49d13e1a96ade7ded2b5a4d6d4e9b6d8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\34804715.exe

      Filesize

      300KB

      MD5

      2f7d204e9cb041c444b0d7b2794ef4d4

      SHA1

      08171cd1b303ee301e556405ec570bc9fb936d06

      SHA256

      395a2c0d735e9c88b052db312eba01b73ff82396220a8fdcfffe4aac8ad66e32

      SHA512

      127505c2e7f3ff9dccf2e60389254751080ff26ce9f96944bc6ee230c57170a7fb6198ed16eb52a7e90807954c208bc12aad2150124f17b14d18add4abeda416

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp549319.exe

      Filesize

      539KB

      MD5

      b8bcbb24a9886244d363e5c1e309b7cb

      SHA1

      2f3b58e8db47431793fc34003c86ef49d7d493c3

      SHA256

      6eca62f78dfd1f3adfae8be2b6a70f914a4da0cae0697a6646c0bf7da17fcea1

      SHA512

      62839b57ecc511cc514cb3ef53f715c6198a64b4177d32a58653461b6a1b33b9b7e95ef00ba30119574eeecc1b851fbf5cb079700153646a1c6e97172c8ef619

    • C:\Windows\Temp\1.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • memory/1796-2163-0x0000000000A40000-0x0000000000A4A000-memory.dmp

      Filesize

      40KB

    • memory/1960-4329-0x000000000A700000-0x000000000A73C000-memory.dmp

      Filesize

      240KB

    • memory/1960-4325-0x0000000002C20000-0x0000000002C26000-memory.dmp

      Filesize

      24KB

    • memory/1960-4324-0x00000000008F0000-0x0000000000920000-memory.dmp

      Filesize

      192KB

    • memory/1960-4326-0x000000000ACA0000-0x000000000B2B8000-memory.dmp

      Filesize

      6.1MB

    • memory/1960-4327-0x000000000A790000-0x000000000A89A000-memory.dmp

      Filesize

      1.0MB

    • memory/1960-4328-0x000000000A6A0000-0x000000000A6B2000-memory.dmp

      Filesize

      72KB

    • memory/1960-4330-0x0000000004C70000-0x0000000004CBC000-memory.dmp

      Filesize

      304KB

    • memory/3724-76-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-24-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-80-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-74-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-72-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-70-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-68-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-62-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-60-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-56-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-54-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-50-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-48-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-46-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-44-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-42-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-40-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-38-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-36-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-34-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-30-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-28-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-26-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-78-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-22-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-21-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-64-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-58-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-52-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-2149-0x0000000002770000-0x000000000277A000-memory.dmp

      Filesize

      40KB

    • memory/3724-2151-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB

    • memory/3724-82-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-84-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-2164-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB

    • memory/3724-66-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-14-0x000000007468E000-0x000000007468F000-memory.dmp

      Filesize

      4KB

    • memory/3724-15-0x00000000021E0000-0x0000000002238000-memory.dmp

      Filesize

      352KB

    • memory/3724-17-0x0000000004CC0000-0x0000000005264000-memory.dmp

      Filesize

      5.6MB

    • memory/3724-16-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB

    • memory/3724-32-0x00000000026E0000-0x0000000002731000-memory.dmp

      Filesize

      324KB

    • memory/3724-19-0x00000000026E0000-0x0000000002736000-memory.dmp

      Filesize

      344KB

    • memory/3724-20-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB

    • memory/3724-18-0x0000000074680000-0x0000000074E30000-memory.dmp

      Filesize

      7.7MB

    • memory/4580-4318-0x0000000005790000-0x0000000005822000-memory.dmp

      Filesize

      584KB

    • memory/4580-4317-0x0000000005750000-0x0000000005782000-memory.dmp

      Filesize

      200KB

    • memory/4580-2170-0x0000000005510000-0x0000000005576000-memory.dmp

      Filesize

      408KB

    • memory/4580-2169-0x0000000004E90000-0x0000000004EF8000-memory.dmp

      Filesize

      416KB