Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe
Resource
win10v2004-20241007-en
General
-
Target
f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe
-
Size
664KB
-
MD5
67742ac32d735d2ba730dd77f9f2cf03
-
SHA1
58103d6fa5f21918b5062baffdf3e010d4c8436a
-
SHA256
f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da
-
SHA512
d380126e629b61dbbf37d6dee7f80e6338217cf223ecf20e66a57bffbb06842d12d665df6da32fee340ea7d7d683a95d6d9c414edfc0fb6aa9313c6ffd233c35
-
SSDEEP
12288:2Mriy90V7hl1x6FXeImrreiaEsfa+oRDgXE042GWjeEc2:wyYx69oe5hJogSWy2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b65-13.dat healer behavioral1/memory/3112-15-0x0000000000C80000-0x0000000000C8A000-memory.dmp healer behavioral1/memory/1280-22-0x0000000004AD0000-0x0000000004AEA000-memory.dmp healer behavioral1/memory/1280-24-0x0000000007110000-0x0000000007128000-memory.dmp healer behavioral1/memory/1280-48-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-52-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-50-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-46-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-45-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-42-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-41-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-38-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-36-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-35-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-33-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-30-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-28-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-26-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/1280-25-0x0000000007110000-0x0000000007122000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz1072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz1072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz1072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v2782Mn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v2782Mn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v2782Mn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz1072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz1072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz1072.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v2782Mn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v2782Mn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v2782Mn.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4700-60-0x0000000004C40000-0x0000000004C86000-memory.dmp family_redline behavioral1/memory/4700-61-0x0000000007180000-0x00000000071C4000-memory.dmp family_redline behavioral1/memory/4700-83-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-95-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-93-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-92-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-89-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-87-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-85-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-81-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-79-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-77-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-75-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-73-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-71-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-69-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-67-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-65-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-63-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/4700-62-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 5084 zap1796.exe 3112 tz1072.exe 1280 v2782Mn.exe 4700 w15sS81.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz1072.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v2782Mn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v2782Mn.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap1796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1408 1280 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap1796.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2782Mn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w15sS81.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3112 tz1072.exe 3112 tz1072.exe 1280 v2782Mn.exe 1280 v2782Mn.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3112 tz1072.exe Token: SeDebugPrivilege 1280 v2782Mn.exe Token: SeDebugPrivilege 4700 w15sS81.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1832 wrote to memory of 5084 1832 f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe 83 PID 1832 wrote to memory of 5084 1832 f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe 83 PID 1832 wrote to memory of 5084 1832 f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe 83 PID 5084 wrote to memory of 3112 5084 zap1796.exe 84 PID 5084 wrote to memory of 3112 5084 zap1796.exe 84 PID 5084 wrote to memory of 1280 5084 zap1796.exe 88 PID 5084 wrote to memory of 1280 5084 zap1796.exe 88 PID 5084 wrote to memory of 1280 5084 zap1796.exe 88 PID 1832 wrote to memory of 4700 1832 f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe 93 PID 1832 wrote to memory of 4700 1832 f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe 93 PID 1832 wrote to memory of 4700 1832 f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe"C:\Users\Admin\AppData\Local\Temp\f4b43d8c7c4216021a0e350d1e7e4d3c6461d863ffe3e57f97da5d158a46a6da.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1796.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1796.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tz1072.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tz1072.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2782Mn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2782Mn.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 10924⤵
- Program crash
PID:1408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w15sS81.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w15sS81.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1280 -ip 12801⤵PID:4756
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD521665e389c0d8d1dba730c4ddb5ae70d
SHA11b68f26aa56583b8086997421cb99a50f329909d
SHA2563c5449354d2c7d1eaa4cf92bdd00365bb8a837b353edc57582880f3ac20722d7
SHA512c7d2403ad3f80e39ece27043b91b2985059260636c36013f559454e97cbabf8175b60b4020eabe4d2ed455506acca1e6eb4a9f8b0ad0f61c525d170399512e7a
-
Filesize
329KB
MD5303a178389f30b53ebfc20bdc5c703cf
SHA1f9f65af0835a8995cd41212d4acdb6f141673004
SHA25638d5e2c039a2f28ef97976e23a87c318e375f752b212042d2d288be5fca26ace
SHA5124508654b77c1bb1ae322594e6e796d8dcc0ad0f2930040321044c09d19d61d5efda1d93ed12055b208cc538dab7774a27f7228b05dd4a3910d169158327b07cc
-
Filesize
11KB
MD5ea130a0e7d62ffd43a0f29dd0141af9a
SHA1e150260a7a9e43f11cb7434c28541b65a36b8f44
SHA256e77ef407d5340d0e23e807b940ebb632a47877ac2aecac4fba8da704d782a858
SHA51275c34d73cbe8e2c882d81da61c1259857bd201c5e716b17c6c89a300bb9b0b240c383857d06bb676cb55a9f6188e249551818d0627289600c4750e488d573b9a
-
Filesize
277KB
MD5b2d12f91f4a4dd663f629f7cab84b754
SHA17af3e04c38aa6fa181537d40b3b630ba38473a7b
SHA2567a78add882a06fbda40fcc5d7086421e3d2a8cbbd9ac879899fe78b13b433345
SHA512d538af7c27e8d5794bfe57d33d739dfdbac900b5dcc268ae108c6f37fdd5c87fbfab3394baae91e758b3b9fbcbc0bb7fed6e3aea19f5c05fc392e09bc7165fcf