Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe
Resource
win10v2004-20241007-en
General
-
Target
16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe
-
Size
705KB
-
MD5
9d84c7e553e7d514ccc7411410bf2478
-
SHA1
7a78a030f5e3842abc4a7030fe0e1976abc04e0b
-
SHA256
16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044
-
SHA512
20295183be80e72dbad9a895acdf9c2f12ea61fe5e3fc3f26f6f425e45d2c4ca666e22038de8e526b897f007924487f871e69ad7716bc399c9b891bfd1b7ac30
-
SSDEEP
12288:5y900UoxtJnZCN4cJYKigW0ZSG/NbDTq5IFeqt4rytqZKZWd:5yfUobCN4cJPWep/NneyFeqtMSCKod
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1012-18-0x0000000004A90000-0x0000000004AAA000-memory.dmp healer behavioral1/memory/1012-20-0x0000000004C50000-0x0000000004C68000-memory.dmp healer behavioral1/memory/1012-21-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-38-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-36-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-48-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-46-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-44-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-42-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-40-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-34-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-32-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-30-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-28-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-26-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-24-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/1012-22-0x0000000004C50000-0x0000000004C62000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr581439.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr581439.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4588-60-0x0000000004CC0000-0x0000000004CFC000-memory.dmp family_redline behavioral1/memory/4588-61-0x0000000004E60000-0x0000000004E9A000-memory.dmp family_redline behavioral1/memory/4588-77-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-89-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-95-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-94-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-91-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-87-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-85-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-83-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-81-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-79-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-75-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-73-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-72-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-69-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-67-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-65-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-63-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline behavioral1/memory/4588-62-0x0000000004E60000-0x0000000004E95000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4316 un539888.exe 1012 pr581439.exe 4588 qu369738.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr581439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr581439.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un539888.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3696 1012 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un539888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr581439.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu369738.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1012 pr581439.exe 1012 pr581439.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1012 pr581439.exe Token: SeDebugPrivilege 4588 qu369738.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2616 wrote to memory of 4316 2616 16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe 83 PID 2616 wrote to memory of 4316 2616 16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe 83 PID 2616 wrote to memory of 4316 2616 16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe 83 PID 4316 wrote to memory of 1012 4316 un539888.exe 84 PID 4316 wrote to memory of 1012 4316 un539888.exe 84 PID 4316 wrote to memory of 1012 4316 un539888.exe 84 PID 4316 wrote to memory of 4588 4316 un539888.exe 100 PID 4316 wrote to memory of 4588 4316 un539888.exe 100 PID 4316 wrote to memory of 4588 4316 un539888.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe"C:\Users\Admin\AppData\Local\Temp\16809ee081a61a732b8784c82c0bd957d1004a372f838be574a52a240a43b044.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539888.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539888.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581439.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr581439.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 10284⤵
- Program crash
PID:3696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu369738.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu369738.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1012 -ip 10121⤵PID:2572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD5eb7bae9c204a35848bbb8fe28f4f7f43
SHA13a27677231ddff1f1a0377c2bb188aea2d2537af
SHA2563c70a784c329a31fa8490d0dc90ed06936bb635db7112e821fa3e44c09d86c75
SHA51243e6130d96839a6911608d226700073560ce5ea099fb0249d0398e0bb457bf62c7c57ca5726ca62f8e5d4a839cc3f0dd4f1d3cbbe001bf03a153f6fde640a14c
-
Filesize
277KB
MD5b7167512a443043c8f251c3317260e5c
SHA15c8257fe287fb15d882ce611bccc50681304d69d
SHA256bc31e69b7b687f7ee50239cd5766b1fe51d47e66563932eca4480214ebbb7dc7
SHA51262ccdfbc8bdb82a65ba65f4a144c6547686d09d4418dd7dd96369bc1fac516ac1dcd89df6f036c21e03bc312ad4232a4d08e3e5aa64ed3ddb33354b4a82a58c6
-
Filesize
360KB
MD52a436b4178b745e61b9ae7531ab69501
SHA19c83b535a0cb5a0c8c360fd636653df2017094e8
SHA25623b9ea6081087fc074f06f72b5293470e69a9009fab484cf5282c9fc6eed3b26
SHA512274ebd1126453341a4d7ef04d94ba52dd4d0b4f9f2a0ece7194b72a444d5db8b5f5d97dc2c03e680f72c9a98a221569e681b3ebc57c66d0cc152bde61f156b53