Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
9c4d9abf16b3994f884a5bbc542f7dcdcf0febff0531118d3e2846de02dfa91e.exe
Resource
win10v2004-20241007-en
General
-
Target
9c4d9abf16b3994f884a5bbc542f7dcdcf0febff0531118d3e2846de02dfa91e.exe
-
Size
694KB
-
MD5
7823737a9edc94ef4c04ca56ea1f805d
-
SHA1
4f7588d3e45a9dfe139094056660412406c1ee44
-
SHA256
9c4d9abf16b3994f884a5bbc542f7dcdcf0febff0531118d3e2846de02dfa91e
-
SHA512
380f5a5864aae042b434544ff30d6491aa070b4314433ea2b82f756f85edc32bc385b540dbe029141a1745ce54e96f07ccbf6a858062b06661810f3f990fac45
-
SSDEEP
12288:Jy902qwcaSJdYpVdeodEG23VpnkKBehP1x3eKHD1Uc5vleu2KfEPqa8+BlEmqo0Y:JyOabH/dEGa9AP1xvHD1UAWKf0q3+jE6
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/532-18-0x0000000004CB0000-0x0000000004CCA000-memory.dmp healer behavioral1/memory/532-20-0x0000000004D20000-0x0000000004D38000-memory.dmp healer behavioral1/memory/532-28-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-48-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-46-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-44-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-42-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-40-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-38-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-36-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-34-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-32-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-30-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-26-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-24-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-22-0x0000000004D20000-0x0000000004D33000-memory.dmp healer behavioral1/memory/532-21-0x0000000004D20000-0x0000000004D33000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 98334445.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 98334445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 98334445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 98334445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 98334445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 98334445.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3680-59-0x0000000004B90000-0x0000000004BCC000-memory.dmp family_redline behavioral1/memory/3680-60-0x00000000071B0000-0x00000000071EA000-memory.dmp family_redline behavioral1/memory/3680-66-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-74-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-72-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-70-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-68-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-91-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-78-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-64-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-62-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-61-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-94-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-92-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-88-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-86-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-84-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-82-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-80-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline behavioral1/memory/3680-76-0x00000000071B0000-0x00000000071E5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 5108 un830271.exe 532 98334445.exe 3680 rk544875.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 98334445.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 98334445.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c4d9abf16b3994f884a5bbc542f7dcdcf0febff0531118d3e2846de02dfa91e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un830271.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 424 532 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c4d9abf16b3994f884a5bbc542f7dcdcf0febff0531118d3e2846de02dfa91e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un830271.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98334445.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk544875.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 532 98334445.exe 532 98334445.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 532 98334445.exe Token: SeDebugPrivilege 3680 rk544875.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3588 wrote to memory of 5108 3588 9c4d9abf16b3994f884a5bbc542f7dcdcf0febff0531118d3e2846de02dfa91e.exe 83 PID 3588 wrote to memory of 5108 3588 9c4d9abf16b3994f884a5bbc542f7dcdcf0febff0531118d3e2846de02dfa91e.exe 83 PID 3588 wrote to memory of 5108 3588 9c4d9abf16b3994f884a5bbc542f7dcdcf0febff0531118d3e2846de02dfa91e.exe 83 PID 5108 wrote to memory of 532 5108 un830271.exe 84 PID 5108 wrote to memory of 532 5108 un830271.exe 84 PID 5108 wrote to memory of 532 5108 un830271.exe 84 PID 5108 wrote to memory of 3680 5108 un830271.exe 95 PID 5108 wrote to memory of 3680 5108 un830271.exe 95 PID 5108 wrote to memory of 3680 5108 un830271.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c4d9abf16b3994f884a5bbc542f7dcdcf0febff0531118d3e2846de02dfa91e.exe"C:\Users\Admin\AppData\Local\Temp\9c4d9abf16b3994f884a5bbc542f7dcdcf0febff0531118d3e2846de02dfa91e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830271.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830271.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98334445.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98334445.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 10804⤵
- Program crash
PID:424
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk544875.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk544875.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 532 -ip 5321⤵PID:828
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD54994ad4ab17c900de4b94cf489fc1dad
SHA16d580f09798267d0f9b3335fdeb6f9a14c46d136
SHA25658218c83520f2e22cf73f96963ca42f114a0ed61fff356311e177306a4b1056d
SHA512481191d1150cdddef129a426558b5790df8fcb9d3bb035e2f4e1cfe4147c1ae7ead4aec7250c049c0262c627fd494f811a8a6ea97a11a7474d9bd6a46bac7f76
-
Filesize
257KB
MD5a9b03e549bc2821a3797cb1b8976c29b
SHA1cbc2673aaec4594cac59c18bc520fb067d423059
SHA25635b639f3a9fcde404026bfe232242818e2053aa2cde3c0726dcd3a4de0695c49
SHA512f4047ad58bc69d9a4700b87d45b349f58628aebebf75d288a3de938b72c648abdc77c1b9836024c60da7fc156af08870323353611050989f82d9ab21b774e9e2
-
Filesize
340KB
MD5116ccad154fb23e2c7ebb9d866be0550
SHA1a64a0f722fc3c061d962f0e724f027853cdd15f2
SHA2568691b260ffe57f473bdfecd31398afef1b944bf32b107da463fc716136dba3c9
SHA5122f42a643e5ef6e2940d36d68c542f41539e2d6175a9414e189332e68924a149e6d6583a2e4193eae606b8c9e9fe6a4be09ba42a2c1aacc489ef85d9d0f850c4b