Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 07:08

General

  • Target

    16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe

  • Size

    705KB

  • MD5

    9d84c7e553e7d514ccc7411410bf2478

  • SHA1

    7a78a030f5e3842abc4a7030fe0e1976abc04e0b

  • SHA256

    16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044

  • SHA512

    20295183be80e72dbad9a895acdf9c2f12ea61fe5e3fc3f26f6f425e45d2c4ca666e22038de8e526b897f007924487f871e69ad7716bc399c9b891bfd1b7ac30

  • SSDEEP

    12288:5y900UoxtJnZCN4cJYKigW0ZSG/NbDTq5IFeqt4rytqZKZWd:5yfUobCN4cJPWep/NneyFeqtMSCKod

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe
    "C:\Users\Admin\AppData\Local\Temp\16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539888.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539888.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581439.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581439.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1012
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 1028
          4⤵
          • Program crash
          PID:3696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu369738.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu369738.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4588
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1012 -ip 1012
    1⤵
      PID:2572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539888.exe

      Filesize

      551KB

      MD5

      eb7bae9c204a35848bbb8fe28f4f7f43

      SHA1

      3a27677231ddff1f1a0377c2bb188aea2d2537af

      SHA256

      3c70a784c329a31fa8490d0dc90ed06936bb635db7112e821fa3e44c09d86c75

      SHA512

      43e6130d96839a6911608d226700073560ce5ea099fb0249d0398e0bb457bf62c7c57ca5726ca62f8e5d4a839cc3f0dd4f1d3cbbe001bf03a153f6fde640a14c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581439.exe

      Filesize

      277KB

      MD5

      b7167512a443043c8f251c3317260e5c

      SHA1

      5c8257fe287fb15d882ce611bccc50681304d69d

      SHA256

      bc31e69b7b687f7ee50239cd5766b1fe51d47e66563932eca4480214ebbb7dc7

      SHA512

      62ccdfbc8bdb82a65ba65f4a144c6547686d09d4418dd7dd96369bc1fac516ac1dcd89df6f036c21e03bc312ad4232a4d08e3e5aa64ed3ddb33354b4a82a58c6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu369738.exe

      Filesize

      360KB

      MD5

      2a436b4178b745e61b9ae7531ab69501

      SHA1

      9c83b535a0cb5a0c8c360fd636653df2017094e8

      SHA256

      23b9ea6081087fc074f06f72b5293470e69a9009fab484cf5282c9fc6eed3b26

      SHA512

      274ebd1126453341a4d7ef04d94ba52dd4d0b4f9f2a0ece7194b72a444d5db8b5f5d97dc2c03e680f72c9a98a221569e681b3ebc57c66d0cc152bde61f156b53

    • memory/1012-16-0x0000000002C70000-0x0000000002C9D000-memory.dmp

      Filesize

      180KB

    • memory/1012-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1012-15-0x0000000002EA0000-0x0000000002FA0000-memory.dmp

      Filesize

      1024KB

    • memory/1012-18-0x0000000004A90000-0x0000000004AAA000-memory.dmp

      Filesize

      104KB

    • memory/1012-19-0x0000000007260000-0x0000000007804000-memory.dmp

      Filesize

      5.6MB

    • memory/1012-20-0x0000000004C50000-0x0000000004C68000-memory.dmp

      Filesize

      96KB

    • memory/1012-21-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-38-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-36-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-48-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-46-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-44-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-42-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-40-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-34-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-32-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-30-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-28-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-26-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-24-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-22-0x0000000004C50000-0x0000000004C62000-memory.dmp

      Filesize

      72KB

    • memory/1012-49-0x0000000002EA0000-0x0000000002FA0000-memory.dmp

      Filesize

      1024KB

    • memory/1012-50-0x0000000002C70000-0x0000000002C9D000-memory.dmp

      Filesize

      180KB

    • memory/1012-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1012-51-0x0000000000400000-0x0000000002B9F000-memory.dmp

      Filesize

      39.6MB

    • memory/1012-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1012-54-0x0000000000400000-0x0000000002B9F000-memory.dmp

      Filesize

      39.6MB

    • memory/4588-60-0x0000000004CC0000-0x0000000004CFC000-memory.dmp

      Filesize

      240KB

    • memory/4588-61-0x0000000004E60000-0x0000000004E9A000-memory.dmp

      Filesize

      232KB

    • memory/4588-77-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-89-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-95-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-94-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-91-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-87-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-85-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-83-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-81-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-79-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-75-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-73-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-72-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-69-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-67-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-65-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-63-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-62-0x0000000004E60000-0x0000000004E95000-memory.dmp

      Filesize

      212KB

    • memory/4588-854-0x0000000009D20000-0x000000000A338000-memory.dmp

      Filesize

      6.1MB

    • memory/4588-855-0x000000000A340000-0x000000000A352000-memory.dmp

      Filesize

      72KB

    • memory/4588-856-0x000000000A360000-0x000000000A46A000-memory.dmp

      Filesize

      1.0MB

    • memory/4588-857-0x000000000A480000-0x000000000A4BC000-memory.dmp

      Filesize

      240KB

    • memory/4588-858-0x0000000004960000-0x00000000049AC000-memory.dmp

      Filesize

      304KB