Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
26959627cc04dfa9f5af7ce16521372f69190f8244673df72e99c21c436314a6.exe
Resource
win10v2004-20241007-en
General
-
Target
26959627cc04dfa9f5af7ce16521372f69190f8244673df72e99c21c436314a6.exe
-
Size
1.2MB
-
MD5
530b2f5e422b722833329e1a4f60adcc
-
SHA1
5b416d66fddb7e789675a47c670c951b637c8a78
-
SHA256
26959627cc04dfa9f5af7ce16521372f69190f8244673df72e99c21c436314a6
-
SHA512
dd25a022a10dccb6d09c503e7cb63f0cf0965c1d3f598d151d11517cb6a8da90293807c54563ff713f70304ddd7aedbc816c65f8b1b9e11a20fb011f455fd95b
-
SSDEEP
24576:QygTXCykULNe2gw1wdFEHYyUvNlxckl1LwDk5iu2AhIF5ju0I:XYG+g1dKHYyUvHxrTPGu
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b89-32.dat healer behavioral1/memory/3456-35-0x0000000000B40000-0x0000000000B4A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bupU57YL07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bupU57YL07.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bupU57YL07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bupU57YL07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bupU57YL07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bupU57YL07.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2056-41-0x0000000002450000-0x0000000002496000-memory.dmp family_redline behavioral1/memory/2056-43-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/2056-77-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-75-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-107-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-105-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-103-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-101-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-95-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-91-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-89-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-87-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-85-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-83-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-81-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-79-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-73-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-71-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-69-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-67-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-65-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-63-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-57-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-55-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-53-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-51-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-49-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-47-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-99-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-97-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-93-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-61-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-59-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-45-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/2056-44-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3460 pltl28SX42.exe 4204 plUA07sK23.exe 2052 plSC79Ev52.exe 2304 plDv13Mo92.exe 3456 bupU57YL07.exe 2056 caVZ71Tq47.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bupU57YL07.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pltl28SX42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" plUA07sK23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plSC79Ev52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" plDv13Mo92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 26959627cc04dfa9f5af7ce16521372f69190f8244673df72e99c21c436314a6.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26959627cc04dfa9f5af7ce16521372f69190f8244673df72e99c21c436314a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pltl28SX42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plUA07sK23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plSC79Ev52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plDv13Mo92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caVZ71Tq47.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3456 bupU57YL07.exe 3456 bupU57YL07.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3456 bupU57YL07.exe Token: SeDebugPrivilege 2056 caVZ71Tq47.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2584 wrote to memory of 3460 2584 26959627cc04dfa9f5af7ce16521372f69190f8244673df72e99c21c436314a6.exe 83 PID 2584 wrote to memory of 3460 2584 26959627cc04dfa9f5af7ce16521372f69190f8244673df72e99c21c436314a6.exe 83 PID 2584 wrote to memory of 3460 2584 26959627cc04dfa9f5af7ce16521372f69190f8244673df72e99c21c436314a6.exe 83 PID 3460 wrote to memory of 4204 3460 pltl28SX42.exe 84 PID 3460 wrote to memory of 4204 3460 pltl28SX42.exe 84 PID 3460 wrote to memory of 4204 3460 pltl28SX42.exe 84 PID 4204 wrote to memory of 2052 4204 plUA07sK23.exe 85 PID 4204 wrote to memory of 2052 4204 plUA07sK23.exe 85 PID 4204 wrote to memory of 2052 4204 plUA07sK23.exe 85 PID 2052 wrote to memory of 2304 2052 plSC79Ev52.exe 86 PID 2052 wrote to memory of 2304 2052 plSC79Ev52.exe 86 PID 2052 wrote to memory of 2304 2052 plSC79Ev52.exe 86 PID 2304 wrote to memory of 3456 2304 plDv13Mo92.exe 88 PID 2304 wrote to memory of 3456 2304 plDv13Mo92.exe 88 PID 2304 wrote to memory of 2056 2304 plDv13Mo92.exe 100 PID 2304 wrote to memory of 2056 2304 plDv13Mo92.exe 100 PID 2304 wrote to memory of 2056 2304 plDv13Mo92.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\26959627cc04dfa9f5af7ce16521372f69190f8244673df72e99c21c436314a6.exe"C:\Users\Admin\AppData\Local\Temp\26959627cc04dfa9f5af7ce16521372f69190f8244673df72e99c21c436314a6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pltl28SX42.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pltl28SX42.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plUA07sK23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\plUA07sK23.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plSC79Ev52.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plSC79Ev52.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plDv13Mo92.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plDv13Mo92.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bupU57YL07.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\bupU57YL07.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caVZ71Tq47.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caVZ71Tq47.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD51a29062a3b6ecfb1e0e15146e3f4a0f0
SHA1f7ca636a88707be0daa090e81abd991d3e85a15c
SHA256755f4344d6c0333adf37b3d731b959327e2bbf5bcea4f316d4a288c801ab86e9
SHA5127c3b557c47c254daef57c31209e25b1ce329d2829abaea20a259fd6dc2124b3ca45c7ef3037b7e6fda75bdcc418841296748d7206eb7b759bb3f95d125cda885
-
Filesize
936KB
MD5be704dd2becfc994a21d58a33e93ba97
SHA1b9b42f262eb32e4d3cb9fc1fc40cfcf87b62c87c
SHA25639d10d316230362d345728bc995a0710205b1e011d14a06cab138f7a2b066c1c
SHA51241e1978648ae815d1a86c1c9b4dd47ee236acff24dc43c428ed91dc70d04035514c17aa76308fc4cd1e7bd7ac4c5240f3df6f445c1b10ee7c9e8922c0cffbc46
-
Filesize
666KB
MD5595012eba8deca6530704fd09b6d27b6
SHA1ec095c60658465fba60d326545a24460bed0875d
SHA256a497a6c1cbe29e984eb2b74a7ffd4df3e9fc7e1cec9dbed4703edc6bf679dbc4
SHA512d3dc363c2180669d25237f2475c9eb9914c8b97cf4b3fa4f4f01202e1272fe2dafced4fe582a3a8bcfa18c3b6690ded1709e6de13749d7a14f7f51b0250832c5
-
Filesize
391KB
MD5fb801db9f05b95fd3db16a4d59c6e346
SHA13635ac9b4370430de1b9d709672a1014050bcd67
SHA256e2d6e7b34ab435e695604014b09678344d950997b922bed43888cf388db73426
SHA512a12d5995484fe9a3f02e7187d19d5ada35b4065198593b833c52dfbfbae870a232b12a36789789d44690ff017ba689107ca31606b0026ba2b5f80350402d6089
-
Filesize
16KB
MD56fc39149b0ad5a9cc8f325e78d2c1d45
SHA1d07a1d90a20a80c0ac215d3bb30f9311481e3d86
SHA2564465c8a76b5fdf1f2cd4a4bf81397e6366ede4f0333933e2474e380fd21c1301
SHA512e44629576500f40ee9431f0ccc57a313f88496084bb2c4b54124ba46fe23d2f8afc7046c5443966a6f0d6ad69ec8fd7aa2ab0312a1a2873d85c824670bd6c486
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23