Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
8f459a981c0f81b0b54dd4c001d62f490fd70b2125f86338db7cc75a7dd5fb31.exe
Resource
win10v2004-20241007-en
General
-
Target
8f459a981c0f81b0b54dd4c001d62f490fd70b2125f86338db7cc75a7dd5fb31.exe
-
Size
534KB
-
MD5
52101467c256fd2b66bb9cfcf231f937
-
SHA1
225c516212ac747b6463a90344d241d24fa01c4c
-
SHA256
8f459a981c0f81b0b54dd4c001d62f490fd70b2125f86338db7cc75a7dd5fb31
-
SHA512
5c7fb09d815bcfceaec95ec6cd84f235cd8e5f8ad23154a582d30bc648fccf0df3083bd9db26b4a91eb81b340f1fae37df7f77a9b01b05a5b4234ee498afc7c9
-
SSDEEP
12288:WMrIy90k6NnJwUwDIbNotTbUWpXVqHpDi9CFHlOwH5npM:qyQi0bNEU8FqJD19a
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b76-12.dat healer behavioral1/memory/1268-15-0x0000000000B60000-0x0000000000B6A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr279689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr279689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr279689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr279689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr279689.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr279689.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2260-22-0x0000000002700000-0x0000000002746000-memory.dmp family_redline behavioral1/memory/2260-24-0x0000000004AD0000-0x0000000004B14000-memory.dmp family_redline behavioral1/memory/2260-26-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-40-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-88-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-87-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-84-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-80-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-78-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-76-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-74-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-72-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-70-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-68-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-64-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-62-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-60-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-58-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-56-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-54-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-52-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-50-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-48-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-44-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-43-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-38-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-36-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-34-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-33-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-30-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-28-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-82-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-66-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-46-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2260-25-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4000 ziMX5652.exe 1268 jr279689.exe 2260 ku308104.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr279689.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f459a981c0f81b0b54dd4c001d62f490fd70b2125f86338db7cc75a7dd5fb31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMX5652.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f459a981c0f81b0b54dd4c001d62f490fd70b2125f86338db7cc75a7dd5fb31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziMX5652.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku308104.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1268 jr279689.exe 1268 jr279689.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1268 jr279689.exe Token: SeDebugPrivilege 2260 ku308104.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 452 wrote to memory of 4000 452 8f459a981c0f81b0b54dd4c001d62f490fd70b2125f86338db7cc75a7dd5fb31.exe 83 PID 452 wrote to memory of 4000 452 8f459a981c0f81b0b54dd4c001d62f490fd70b2125f86338db7cc75a7dd5fb31.exe 83 PID 452 wrote to memory of 4000 452 8f459a981c0f81b0b54dd4c001d62f490fd70b2125f86338db7cc75a7dd5fb31.exe 83 PID 4000 wrote to memory of 1268 4000 ziMX5652.exe 84 PID 4000 wrote to memory of 1268 4000 ziMX5652.exe 84 PID 4000 wrote to memory of 2260 4000 ziMX5652.exe 97 PID 4000 wrote to memory of 2260 4000 ziMX5652.exe 97 PID 4000 wrote to memory of 2260 4000 ziMX5652.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f459a981c0f81b0b54dd4c001d62f490fd70b2125f86338db7cc75a7dd5fb31.exe"C:\Users\Admin\AppData\Local\Temp\8f459a981c0f81b0b54dd4c001d62f490fd70b2125f86338db7cc75a7dd5fb31.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMX5652.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMX5652.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr279689.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr279689.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku308104.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku308104.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request30.243.111.52.in-addr.arpaIN PTRResponse
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
156 B 3
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
30.243.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD587ee96932f4facc2a94fbc5e1b3d7aee
SHA10ea218b1c20483f1b628f099475c18d2f053fd34
SHA256bdef3c05b48ca6383d1073ddaaecf8529ab3f0ab08746c45e78960554aff1076
SHA5128d1bd8b67e73afcd4a4db73b79c72079a8a1d3f34e81312969b890e06c4c7fa45fcd5c821fd3bee253520a093da04a952779d30b6c359f3415dc81976ec8f679
-
Filesize
11KB
MD5b78b5dc0c84dc01601e6c148f8630fbd
SHA1a60b5a7c82be01561245f1c7d4f3fb5db3b0d0df
SHA256ae8d23ea29924ba92b9bff0a42c084d7a9099b3a3a7323f0452f88faa210ef7b
SHA5127d3189336a486852068fb968ede4c90e0dd6006f341c28ea1a26b5f299d354d0dd1612ff5d88340f802da613188186b14da0a0b0ba76cfc40645ca201d56e12f
-
Filesize
319KB
MD5710d18b9ca784978d102b358cb17cbe3
SHA175999952a90eba791d85f046738643a03825cffa
SHA256db15f047ed08f5acef4cb816c748f0714d355ab51bcb62d028ad305aa01f8a64
SHA512cebc7eab37db6772def3431992c23a6937ad313929742e5dd5f648161804dbf38768fe4c300cebd2ec81fe8a7a641bb2dc76ddaf9e66a9eed4237c950b13b510