Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe
Resource
win10v2004-20230221-en
General
-
Target
285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe
-
Size
556KB
-
MD5
fa45898576f21be7ff41b01973a5b52c
-
SHA1
2003e8f8e9545546ce5030f352a99d1d0d957645
-
SHA256
285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca
-
SHA512
9e1f5f9bda1161c07e31154f66387e8f239e4a44f5a9b6f0dab0b5e91542fbcc088b789384525c6fac12f51c8c02d41dbed4b425180d4d897935f8a6970218a3
-
SSDEEP
12288:YMrey90iYU1PhojOZmgL4dS7RwQDS/ZjwYzEWwA:myVF7E0OL/SYzAA
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h8238214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h8238214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h8238214.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h8238214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h8238214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h8238214.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation i7698821.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1564 x4879961.exe 2000 g1912318.exe 2324 h8238214.exe 4852 i7698821.exe 5024 oneetx.exe 1796 oneetx.exe 2388 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3904 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h8238214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h8238214.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4879961.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4879961.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4772 2324 WerFault.exe 95 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2000 g1912318.exe 2000 g1912318.exe 2324 h8238214.exe 2324 h8238214.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2000 g1912318.exe Token: SeDebugPrivilege 2324 h8238214.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4852 i7698821.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1564 1264 285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe 87 PID 1264 wrote to memory of 1564 1264 285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe 87 PID 1264 wrote to memory of 1564 1264 285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe 87 PID 1564 wrote to memory of 2000 1564 x4879961.exe 88 PID 1564 wrote to memory of 2000 1564 x4879961.exe 88 PID 1564 wrote to memory of 2000 1564 x4879961.exe 88 PID 1564 wrote to memory of 2324 1564 x4879961.exe 95 PID 1564 wrote to memory of 2324 1564 x4879961.exe 95 PID 1564 wrote to memory of 2324 1564 x4879961.exe 95 PID 1264 wrote to memory of 4852 1264 285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe 98 PID 1264 wrote to memory of 4852 1264 285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe 98 PID 1264 wrote to memory of 4852 1264 285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe 98 PID 4852 wrote to memory of 5024 4852 i7698821.exe 99 PID 4852 wrote to memory of 5024 4852 i7698821.exe 99 PID 4852 wrote to memory of 5024 4852 i7698821.exe 99 PID 5024 wrote to memory of 4376 5024 oneetx.exe 100 PID 5024 wrote to memory of 4376 5024 oneetx.exe 100 PID 5024 wrote to memory of 4376 5024 oneetx.exe 100 PID 5024 wrote to memory of 4204 5024 oneetx.exe 102 PID 5024 wrote to memory of 4204 5024 oneetx.exe 102 PID 5024 wrote to memory of 4204 5024 oneetx.exe 102 PID 4204 wrote to memory of 4128 4204 cmd.exe 104 PID 4204 wrote to memory of 4128 4204 cmd.exe 104 PID 4204 wrote to memory of 4128 4204 cmd.exe 104 PID 4204 wrote to memory of 2352 4204 cmd.exe 105 PID 4204 wrote to memory of 2352 4204 cmd.exe 105 PID 4204 wrote to memory of 2352 4204 cmd.exe 105 PID 4204 wrote to memory of 3660 4204 cmd.exe 106 PID 4204 wrote to memory of 3660 4204 cmd.exe 106 PID 4204 wrote to memory of 3660 4204 cmd.exe 106 PID 4204 wrote to memory of 1268 4204 cmd.exe 107 PID 4204 wrote to memory of 1268 4204 cmd.exe 107 PID 4204 wrote to memory of 1268 4204 cmd.exe 107 PID 4204 wrote to memory of 2932 4204 cmd.exe 108 PID 4204 wrote to memory of 2932 4204 cmd.exe 108 PID 4204 wrote to memory of 2932 4204 cmd.exe 108 PID 4204 wrote to memory of 4784 4204 cmd.exe 109 PID 4204 wrote to memory of 4784 4204 cmd.exe 109 PID 4204 wrote to memory of 4784 4204 cmd.exe 109 PID 5024 wrote to memory of 3904 5024 oneetx.exe 112 PID 5024 wrote to memory of 3904 5024 oneetx.exe 112 PID 5024 wrote to memory of 3904 5024 oneetx.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe"C:\Users\Admin\AppData\Local\Temp\285695c649e53760b921fabf7ee7b1e76f4e4e9ba07bf7a629ee4194644a99ca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4879961.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4879961.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1912318.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1912318.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8238214.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8238214.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 10884⤵
- Program crash
PID:4772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7698821.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7698821.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4376
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4128
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2932
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4784
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2324 -ip 23241⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1796
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5327aba89501fc211bd3de6041550b53b
SHA15f5c558b15b38c3eb62ed63650e2f05fe4fb0ded
SHA256958a98c2856ab564ba02ee099d7ee5d788bba060c5f646644e008bfd6f761bd4
SHA5125a316d01cd3ec512af5905f032f5f8c0701e12d4e5095477af64e8d0710f67670a9b50f7ee75e5bc59a703079c562cc1517f07da9ede9b8b322dc88ed63477f8
-
Filesize
205KB
MD5327aba89501fc211bd3de6041550b53b
SHA15f5c558b15b38c3eb62ed63650e2f05fe4fb0ded
SHA256958a98c2856ab564ba02ee099d7ee5d788bba060c5f646644e008bfd6f761bd4
SHA5125a316d01cd3ec512af5905f032f5f8c0701e12d4e5095477af64e8d0710f67670a9b50f7ee75e5bc59a703079c562cc1517f07da9ede9b8b322dc88ed63477f8
-
Filesize
384KB
MD5c2b0b19698618a5002f7c4d747092647
SHA1015f60adb994ea235a42f1234ec64c6f1525ab07
SHA256d1d47ff48af5ae2f90f37199d10c4f9e9a92d99a9f2b3b83737e1c60fba414d6
SHA512b258b3351d3da18974375b970158bb2bdaf8700d6b9829e5774073562a8baac7f542688d860581e6c93919627a78d786f387a710c2de7073a20fb7b9c77a12af
-
Filesize
384KB
MD5c2b0b19698618a5002f7c4d747092647
SHA1015f60adb994ea235a42f1234ec64c6f1525ab07
SHA256d1d47ff48af5ae2f90f37199d10c4f9e9a92d99a9f2b3b83737e1c60fba414d6
SHA512b258b3351d3da18974375b970158bb2bdaf8700d6b9829e5774073562a8baac7f542688d860581e6c93919627a78d786f387a710c2de7073a20fb7b9c77a12af
-
Filesize
168KB
MD5ad9b7a4680cd2ef4e1810d6b2009f50d
SHA1ab891aea976155eee8b7e746b8b06de16da9162d
SHA256733769bb440534844c3d45183f98c4e33492ff61fbe39997ce96953e620b7117
SHA5127e772a1c97425b2297cf2feff2a9f93efa3c46d70625e034e0646947db52ade7fccc6b9b38dd662fa1d192001b7cda9fab837468ea341f651ed4f32f6d71b926
-
Filesize
168KB
MD5ad9b7a4680cd2ef4e1810d6b2009f50d
SHA1ab891aea976155eee8b7e746b8b06de16da9162d
SHA256733769bb440534844c3d45183f98c4e33492ff61fbe39997ce96953e620b7117
SHA5127e772a1c97425b2297cf2feff2a9f93efa3c46d70625e034e0646947db52ade7fccc6b9b38dd662fa1d192001b7cda9fab837468ea341f651ed4f32f6d71b926
-
Filesize
289KB
MD5580ec8568e2830ac4fa37c7311f10239
SHA16e8bc8c50a5f8ac968c2b7ecd56b4f9288120262
SHA2568643c83f2757f233e1ae88e036c8258115d855c8ed1ff683e931af874565d745
SHA5126ab014a1fa2e67a3b522e16df4087d8139389582af4f6948df0cc7f50c173fbf0d317310369eae75c6b7b48a9f67e1be8fc58e6d5791c49462b632276b7dc30b
-
Filesize
289KB
MD5580ec8568e2830ac4fa37c7311f10239
SHA16e8bc8c50a5f8ac968c2b7ecd56b4f9288120262
SHA2568643c83f2757f233e1ae88e036c8258115d855c8ed1ff683e931af874565d745
SHA5126ab014a1fa2e67a3b522e16df4087d8139389582af4f6948df0cc7f50c173fbf0d317310369eae75c6b7b48a9f67e1be8fc58e6d5791c49462b632276b7dc30b
-
Filesize
205KB
MD5327aba89501fc211bd3de6041550b53b
SHA15f5c558b15b38c3eb62ed63650e2f05fe4fb0ded
SHA256958a98c2856ab564ba02ee099d7ee5d788bba060c5f646644e008bfd6f761bd4
SHA5125a316d01cd3ec512af5905f032f5f8c0701e12d4e5095477af64e8d0710f67670a9b50f7ee75e5bc59a703079c562cc1517f07da9ede9b8b322dc88ed63477f8
-
Filesize
205KB
MD5327aba89501fc211bd3de6041550b53b
SHA15f5c558b15b38c3eb62ed63650e2f05fe4fb0ded
SHA256958a98c2856ab564ba02ee099d7ee5d788bba060c5f646644e008bfd6f761bd4
SHA5125a316d01cd3ec512af5905f032f5f8c0701e12d4e5095477af64e8d0710f67670a9b50f7ee75e5bc59a703079c562cc1517f07da9ede9b8b322dc88ed63477f8
-
Filesize
205KB
MD5327aba89501fc211bd3de6041550b53b
SHA15f5c558b15b38c3eb62ed63650e2f05fe4fb0ded
SHA256958a98c2856ab564ba02ee099d7ee5d788bba060c5f646644e008bfd6f761bd4
SHA5125a316d01cd3ec512af5905f032f5f8c0701e12d4e5095477af64e8d0710f67670a9b50f7ee75e5bc59a703079c562cc1517f07da9ede9b8b322dc88ed63477f8
-
Filesize
205KB
MD5327aba89501fc211bd3de6041550b53b
SHA15f5c558b15b38c3eb62ed63650e2f05fe4fb0ded
SHA256958a98c2856ab564ba02ee099d7ee5d788bba060c5f646644e008bfd6f761bd4
SHA5125a316d01cd3ec512af5905f032f5f8c0701e12d4e5095477af64e8d0710f67670a9b50f7ee75e5bc59a703079c562cc1517f07da9ede9b8b322dc88ed63477f8
-
Filesize
205KB
MD5327aba89501fc211bd3de6041550b53b
SHA15f5c558b15b38c3eb62ed63650e2f05fe4fb0ded
SHA256958a98c2856ab564ba02ee099d7ee5d788bba060c5f646644e008bfd6f761bd4
SHA5125a316d01cd3ec512af5905f032f5f8c0701e12d4e5095477af64e8d0710f67670a9b50f7ee75e5bc59a703079c562cc1517f07da9ede9b8b322dc88ed63477f8
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5