Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
1dd2e5b3fa247ee1a185bdaf26f5aef16520eff3dce8fcde4ba0454ed89123b1.exe
Resource
win10v2004-20241007-en
General
-
Target
1dd2e5b3fa247ee1a185bdaf26f5aef16520eff3dce8fcde4ba0454ed89123b1.exe
-
Size
705KB
-
MD5
cbcd0860e4954ccaab5ed793a3c76426
-
SHA1
700f76375885ac0721cb0bb45419cd7e3e519d25
-
SHA256
1dd2e5b3fa247ee1a185bdaf26f5aef16520eff3dce8fcde4ba0454ed89123b1
-
SHA512
ab62dd591fd4814a8d7747e4f0d9712d774fb6311f95e94ecdee2dc3054322b3a7c978d634e4ad463b1bc95dbb38de6ca5e980c0b1d89ca097ea78b61430fae0
-
SSDEEP
12288:gy90RxG9G4ztuY7B+uniW2HyzCZGzAlTsIB/kxDqW6WrxgjWf:gyDGcuY+W9IG0FyxDqWPrxgja
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1004-19-0x0000000002350000-0x000000000236A000-memory.dmp healer behavioral1/memory/1004-21-0x0000000002400000-0x0000000002418000-memory.dmp healer behavioral1/memory/1004-25-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-47-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-45-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-43-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-41-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-39-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-37-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-35-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-33-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-49-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-31-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-29-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-27-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-23-0x0000000002400000-0x0000000002413000-memory.dmp healer behavioral1/memory/1004-22-0x0000000002400000-0x0000000002413000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 70983751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 70983751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 70983751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 70983751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 70983751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 70983751.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2612-60-0x0000000004A10000-0x0000000004A4C000-memory.dmp family_redline behavioral1/memory/2612-61-0x0000000005070000-0x00000000050AA000-memory.dmp family_redline behavioral1/memory/2612-67-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-65-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-63-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-62-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-75-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-95-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-94-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-91-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-89-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-87-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-85-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-83-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-81-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-79-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-73-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-71-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-69-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline behavioral1/memory/2612-77-0x0000000005070000-0x00000000050A5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 720 un757221.exe 1004 70983751.exe 2612 rk488470.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 70983751.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 70983751.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1dd2e5b3fa247ee1a185bdaf26f5aef16520eff3dce8fcde4ba0454ed89123b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un757221.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1428 1004 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dd2e5b3fa247ee1a185bdaf26f5aef16520eff3dce8fcde4ba0454ed89123b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un757221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70983751.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk488470.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1004 70983751.exe 1004 70983751.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1004 70983751.exe Token: SeDebugPrivilege 2612 rk488470.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3844 wrote to memory of 720 3844 1dd2e5b3fa247ee1a185bdaf26f5aef16520eff3dce8fcde4ba0454ed89123b1.exe 83 PID 3844 wrote to memory of 720 3844 1dd2e5b3fa247ee1a185bdaf26f5aef16520eff3dce8fcde4ba0454ed89123b1.exe 83 PID 3844 wrote to memory of 720 3844 1dd2e5b3fa247ee1a185bdaf26f5aef16520eff3dce8fcde4ba0454ed89123b1.exe 83 PID 720 wrote to memory of 1004 720 un757221.exe 85 PID 720 wrote to memory of 1004 720 un757221.exe 85 PID 720 wrote to memory of 1004 720 un757221.exe 85 PID 720 wrote to memory of 2612 720 un757221.exe 98 PID 720 wrote to memory of 2612 720 un757221.exe 98 PID 720 wrote to memory of 2612 720 un757221.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dd2e5b3fa247ee1a185bdaf26f5aef16520eff3dce8fcde4ba0454ed89123b1.exe"C:\Users\Admin\AppData\Local\Temp\1dd2e5b3fa247ee1a185bdaf26f5aef16520eff3dce8fcde4ba0454ed89123b1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un757221.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un757221.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\70983751.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\70983751.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 10204⤵
- Program crash
PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk488470.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk488470.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1004 -ip 10041⤵PID:5072
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD595d7a6896511611faed57723499706c8
SHA16d2ab77217992fb20d7d2984f288111661aa82c1
SHA2562255d5664a4ad803a4d317cb3fa9dafb6d4a302eb4c5b684dfe458149b311591
SHA512e7d65e0f55f084451a519eacf54f698879a81def1c5389e2acf200a6f767f6d5c4c506c4fff22358c651111d0824175eee281d0eaf1888d49bd247ca6f45f3d9
-
Filesize
280KB
MD5ae69290f744b59e5e02c3ca323e0bf1e
SHA190d00337229ac526bb4f5b08ab6a8ca8f782042f
SHA256549a684d1b88cfff02387dcefb2b6e976d0a8045617ce6385bac2ac63913c2c3
SHA51282f18dae5cb1931b1ef1a36f485703444f590240d87b725ec58fb36be96f3f035b14b44e0327c5204d43555752c33d7e0ed9b8f6623f8ba9770ba5cabd623895
-
Filesize
342KB
MD549e08f229f585fba823f6bd21fcaa777
SHA1ae4f305c7ad7fdf5be1bfae66665b45f3a6c78ec
SHA2568bb582ba0df11dc3e6b35b82354c2e1bfd30c8fde0c94bf35d52c5f751583462
SHA51263489072d36e520c61b543bbf0cb7a8e7d44596522370f1ac5d048c9245828519ae7c95660eac630282354a9460e64d38124d9610907eba7bc9b600f8e08ae70