Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
5998d60db876f9bb217941ec7c4354d5e860e15abd72bd98e55dd4770a0a36cf.exe
Resource
win10v2004-20241007-en
General
-
Target
5998d60db876f9bb217941ec7c4354d5e860e15abd72bd98e55dd4770a0a36cf.exe
-
Size
1.0MB
-
MD5
7b7fcf369aa1ad7f6fbd27dd19b97ccd
-
SHA1
9201f8892f6beb2a69edc6c8a690d36305869faa
-
SHA256
5998d60db876f9bb217941ec7c4354d5e860e15abd72bd98e55dd4770a0a36cf
-
SHA512
f944f7039ce4fd3e2918db95e76d9b2b8e469b10a846717ba733d3c85e6d4385e22d31ab11256b9f6956c3ac04c7bb7cb7e3c2fd774d2743f64bc2cfb48807ac
-
SSDEEP
24576:Cyv5ihOi8a0u4OrbenTwQgiWT/5H15mVFg8MODE7:pZJXdn8P1xVkFxMOY
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023cbd-27.dat healer behavioral1/memory/4728-28-0x0000000000660000-0x000000000066A000-memory.dmp healer behavioral1/memory/5056-34-0x00000000024B0000-0x00000000024CA000-memory.dmp healer behavioral1/memory/5056-36-0x0000000002770000-0x0000000002788000-memory.dmp healer behavioral1/memory/5056-37-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-44-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-64-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-62-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-61-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-58-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-56-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-54-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-52-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-50-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-48-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-46-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-42-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-40-0x0000000002770000-0x0000000002782000-memory.dmp healer behavioral1/memory/5056-38-0x0000000002770000-0x0000000002782000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bus6532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bus6532.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor4043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor4043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor4043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor4043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor4043.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bus6532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bus6532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bus6532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bus6532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor4043.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1608-72-0x0000000004940000-0x0000000004986000-memory.dmp family_redline behavioral1/memory/1608-73-0x00000000050D0000-0x0000000005114000-memory.dmp family_redline behavioral1/memory/1608-81-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-77-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-75-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-74-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-95-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-107-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-105-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-103-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-102-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-99-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-98-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-93-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-91-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-89-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-87-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-85-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-83-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline behavioral1/memory/1608-79-0x00000000050D0000-0x000000000510E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 932 kino0811.exe 3652 kino2540.exe 3388 kino0536.exe 4728 bus6532.exe 5056 cor4043.exe 1608 dyV54s86.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor4043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bus6532.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor4043.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5998d60db876f9bb217941ec7c4354d5e860e15abd72bd98e55dd4770a0a36cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kino0811.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kino2540.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kino0536.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4764 5056 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5998d60db876f9bb217941ec7c4354d5e860e15abd72bd98e55dd4770a0a36cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kino0811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kino2540.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kino0536.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cor4043.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyV54s86.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4728 bus6532.exe 4728 bus6532.exe 5056 cor4043.exe 5056 cor4043.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4728 bus6532.exe Token: SeDebugPrivilege 5056 cor4043.exe Token: SeDebugPrivilege 1608 dyV54s86.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3892 wrote to memory of 932 3892 5998d60db876f9bb217941ec7c4354d5e860e15abd72bd98e55dd4770a0a36cf.exe 83 PID 3892 wrote to memory of 932 3892 5998d60db876f9bb217941ec7c4354d5e860e15abd72bd98e55dd4770a0a36cf.exe 83 PID 3892 wrote to memory of 932 3892 5998d60db876f9bb217941ec7c4354d5e860e15abd72bd98e55dd4770a0a36cf.exe 83 PID 932 wrote to memory of 3652 932 kino0811.exe 84 PID 932 wrote to memory of 3652 932 kino0811.exe 84 PID 932 wrote to memory of 3652 932 kino0811.exe 84 PID 3652 wrote to memory of 3388 3652 kino2540.exe 85 PID 3652 wrote to memory of 3388 3652 kino2540.exe 85 PID 3652 wrote to memory of 3388 3652 kino2540.exe 85 PID 3388 wrote to memory of 4728 3388 kino0536.exe 86 PID 3388 wrote to memory of 4728 3388 kino0536.exe 86 PID 3388 wrote to memory of 5056 3388 kino0536.exe 97 PID 3388 wrote to memory of 5056 3388 kino0536.exe 97 PID 3388 wrote to memory of 5056 3388 kino0536.exe 97 PID 3652 wrote to memory of 1608 3652 kino2540.exe 102 PID 3652 wrote to memory of 1608 3652 kino2540.exe 102 PID 3652 wrote to memory of 1608 3652 kino2540.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5998d60db876f9bb217941ec7c4354d5e860e15abd72bd98e55dd4770a0a36cf.exe"C:\Users\Admin\AppData\Local\Temp\5998d60db876f9bb217941ec7c4354d5e860e15abd72bd98e55dd4770a0a36cf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0811.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino0811.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino2540.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0536.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0536.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6532.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus6532.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4043.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4043.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 10806⤵
- Program crash
PID:4764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyV54s86.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dyV54s86.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5056 -ip 50561⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
851KB
MD5d2f56e9ac7a2103e8be395b27668b393
SHA17786a41858fa1e310443c771d1ffcb4e53ec5220
SHA2569ff79259e88a44c08105a214a535e8cb6114e275bd8a103700520eadf1a5fa48
SHA512b81780df277e24287968fc7f1232781d90dd0b26491ae83395d6293cb5e5c5363135bd268700b33a5d0f60c950480a246ea721f3aacc7b80765466856454a44b
-
Filesize
709KB
MD517adab661cc4c8f398de32cc89b9b87e
SHA14f070cde9e6f5f16b180e5c2663fb169b725f6b5
SHA256c6d6d6cb0338760549191a4652681a8f88907027bc494ae4c57ead602328a206
SHA512be63b6aca2ba91c99282edc1efda4a2199e8894db54dd0467afb7803e68675439543f00adfb4dec8add6bf47864ec1a39196677a3be309866e1df828e38291df
-
Filesize
497KB
MD5f4c296f9d077bf944c8727d13b11d8bf
SHA10740452d6f5ff57cb0a9fe02f257886d09e585c7
SHA256a3616b6fc4129f8d0b8ead9b3f1fce6864b3fba5b2252f887c5969f8a5d2b734
SHA51257465840ed3e29c2d60db251e3cfe2744b17a10b6cc4d1d65563d49fa4b24aaae78d71dab9cb39e67fb002000fd6bdb49c674bd248f0150f8120faa1c9ab82ee
-
Filesize
352KB
MD53e238c1460e8b9e4e13a1f0ab04c3f79
SHA1b4664399bf6262300a640980fc4b0e6183426ea8
SHA256d4e9732c363f3acf655ceb9cce555c46d6dbf0c5bc8ce5eb9853e6a8e8be896d
SHA5124c188938cb8d51002238effaef2ffde8ef16a6a099dae7549764f91557bbf1756aa5b6e71dd50f97c838084c8bdc431f5211c8db2195718019897b2c39377fff
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
439KB
MD599e5f0ff726ca857cd29965499449c70
SHA18eb294f21d0e9aecf737484a6f24204e122d1a17
SHA256d801e784c78e88f283e6bb655f773e086571ebfd50f919fd8819b7f134c068b4
SHA5125be8a212221a14437247e40352497c75b1b4c67f70da475df41085ca2a3089e41ae22ce891a9c28dbd15cc2dc261e58f29082be829a6e7e5432d672eedde2f02