Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe
Resource
win10v2004-20230220-en
General
-
Target
6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe
-
Size
587KB
-
MD5
7e7983630beaf3e8168bad43893c1761
-
SHA1
42a7bf6b71909c652e8c47d476ea637d696613b3
-
SHA256
6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607
-
SHA512
331d0bd8797147cbf5a4fe34a66b9fab9336c1b9c55e84c46b174b7f81082b5044817217919d7f1f55343014b544fe1757a141c8d2f363ba7910100b4d709e80
-
SSDEEP
12288:nMrHy90NU+2R37ye8zx71KneSYRk4SxFnyaK586xvdkz17jUo2:wyZ+ztQeSYaxFIqCvdu1752
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3908-148-0x000000000AEE0000-0x000000000B4F8000-memory.dmp redline_stealer behavioral2/memory/3908-156-0x000000000B500000-0x000000000B566000-memory.dmp redline_stealer behavioral2/memory/3908-158-0x000000000C370000-0x000000000C532000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h2596552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h2596552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h2596552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h2596552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h2596552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h2596552.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation i9992260.exe -
Executes dropped EXE 7 IoCs
pid Process 4368 x6874578.exe 3908 g3420628.exe 4120 h2596552.exe 4936 i9992260.exe 3816 oneetx.exe 3604 oneetx.exe 1484 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 5068 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h2596552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h2596552.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6874578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6874578.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2868 4120 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3908 g3420628.exe 3908 g3420628.exe 4120 h2596552.exe 4120 h2596552.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3908 g3420628.exe Token: SeDebugPrivilege 4120 h2596552.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4936 i9992260.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1996 wrote to memory of 4368 1996 6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe 83 PID 1996 wrote to memory of 4368 1996 6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe 83 PID 1996 wrote to memory of 4368 1996 6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe 83 PID 4368 wrote to memory of 3908 4368 x6874578.exe 84 PID 4368 wrote to memory of 3908 4368 x6874578.exe 84 PID 4368 wrote to memory of 3908 4368 x6874578.exe 84 PID 4368 wrote to memory of 4120 4368 x6874578.exe 85 PID 4368 wrote to memory of 4120 4368 x6874578.exe 85 PID 4368 wrote to memory of 4120 4368 x6874578.exe 85 PID 1996 wrote to memory of 4936 1996 6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe 91 PID 1996 wrote to memory of 4936 1996 6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe 91 PID 1996 wrote to memory of 4936 1996 6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe 91 PID 4936 wrote to memory of 3816 4936 i9992260.exe 92 PID 4936 wrote to memory of 3816 4936 i9992260.exe 92 PID 4936 wrote to memory of 3816 4936 i9992260.exe 92 PID 3816 wrote to memory of 4676 3816 oneetx.exe 93 PID 3816 wrote to memory of 4676 3816 oneetx.exe 93 PID 3816 wrote to memory of 4676 3816 oneetx.exe 93 PID 3816 wrote to memory of 4720 3816 oneetx.exe 95 PID 3816 wrote to memory of 4720 3816 oneetx.exe 95 PID 3816 wrote to memory of 4720 3816 oneetx.exe 95 PID 4720 wrote to memory of 4480 4720 cmd.exe 97 PID 4720 wrote to memory of 4480 4720 cmd.exe 97 PID 4720 wrote to memory of 4480 4720 cmd.exe 97 PID 4720 wrote to memory of 3292 4720 cmd.exe 98 PID 4720 wrote to memory of 3292 4720 cmd.exe 98 PID 4720 wrote to memory of 3292 4720 cmd.exe 98 PID 4720 wrote to memory of 2828 4720 cmd.exe 99 PID 4720 wrote to memory of 2828 4720 cmd.exe 99 PID 4720 wrote to memory of 2828 4720 cmd.exe 99 PID 4720 wrote to memory of 4904 4720 cmd.exe 100 PID 4720 wrote to memory of 4904 4720 cmd.exe 100 PID 4720 wrote to memory of 4904 4720 cmd.exe 100 PID 4720 wrote to memory of 2104 4720 cmd.exe 101 PID 4720 wrote to memory of 2104 4720 cmd.exe 101 PID 4720 wrote to memory of 2104 4720 cmd.exe 101 PID 4720 wrote to memory of 3844 4720 cmd.exe 102 PID 4720 wrote to memory of 3844 4720 cmd.exe 102 PID 4720 wrote to memory of 3844 4720 cmd.exe 102 PID 3816 wrote to memory of 5068 3816 oneetx.exe 108 PID 3816 wrote to memory of 5068 3816 oneetx.exe 108 PID 3816 wrote to memory of 5068 3816 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe"C:\Users\Admin\AppData\Local\Temp\6332d27f3ef783ab3e7cec3b08678da16f27cb28f4e477e5678a14b491150607.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6874578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6874578.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3420628.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3420628.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2596552.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2596552.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 10124⤵
- Program crash
PID:2868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9992260.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9992260.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4480
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3844
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5068
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4120 -ip 41201⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3604
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5104c42d6381688999f6956069589f3a0
SHA121f5529094c77f7af47572442e378bc4c3f3b445
SHA256e4706784a22eb4a6313e6c055d464df10516fc449287a2641035034bab22e62b
SHA5125724fcef0d76d977c9c89e6c0018a8a463bd99e1d0f788b3868b349ba389b549fe987935f6b3d07a7aef2a39a5cff14e9da0b35442bd5ac3efc7bee7d692f8ff
-
Filesize
206KB
MD5104c42d6381688999f6956069589f3a0
SHA121f5529094c77f7af47572442e378bc4c3f3b445
SHA256e4706784a22eb4a6313e6c055d464df10516fc449287a2641035034bab22e62b
SHA5125724fcef0d76d977c9c89e6c0018a8a463bd99e1d0f788b3868b349ba389b549fe987935f6b3d07a7aef2a39a5cff14e9da0b35442bd5ac3efc7bee7d692f8ff
-
Filesize
416KB
MD589a6a9d9d1686c083168df92ca5c4f33
SHA11fa518477a5ece322bb39c402c822224982f017e
SHA256054660be36c1d310dd75bb708bd61049fab4f738533053e8d8d8f202a522d3d3
SHA51212f40975ab4424bfef3b0a99312a6500f6506d7cd3701012a272bc965e5a28118347560325737337920581410916bb29d7a960ad19a2ee9d00560c9afaf48075
-
Filesize
416KB
MD589a6a9d9d1686c083168df92ca5c4f33
SHA11fa518477a5ece322bb39c402c822224982f017e
SHA256054660be36c1d310dd75bb708bd61049fab4f738533053e8d8d8f202a522d3d3
SHA51212f40975ab4424bfef3b0a99312a6500f6506d7cd3701012a272bc965e5a28118347560325737337920581410916bb29d7a960ad19a2ee9d00560c9afaf48075
-
Filesize
168KB
MD56d685dc0de22595a0eac863ce308161a
SHA14d34ba2a92588d49bbb27f877d358f806eceaa85
SHA2568ba0cd1161a9d8e28681c69ca3c4e1afda43b150a9c406a8d45f3ffa00dd39b9
SHA512d6d7cd8d3a6765198624f041fc0acc5c495794781661aa00684ea3aca3c2cb19091dd0f58cdc5c514227b814ff65d48bdda889d62d2b98818c9d707be788b439
-
Filesize
168KB
MD56d685dc0de22595a0eac863ce308161a
SHA14d34ba2a92588d49bbb27f877d358f806eceaa85
SHA2568ba0cd1161a9d8e28681c69ca3c4e1afda43b150a9c406a8d45f3ffa00dd39b9
SHA512d6d7cd8d3a6765198624f041fc0acc5c495794781661aa00684ea3aca3c2cb19091dd0f58cdc5c514227b814ff65d48bdda889d62d2b98818c9d707be788b439
-
Filesize
361KB
MD51623cc4855d9f5981d9de092faa8c003
SHA1d5166861db1f6382939504d6d312e6dc0df4239d
SHA256f92a05d791507c5b9e1f8364b25794b681e37d4906615b88f8d4fda99dc30b26
SHA51289e9a0b840f8ba25e5cd91b6f35b1676b9c28f826e0f636888b627b73b90b5919856b0b8a9fcbfcc450d2e0e5c83097419bee43b50499ecb6aa2bd88469a95d2
-
Filesize
361KB
MD51623cc4855d9f5981d9de092faa8c003
SHA1d5166861db1f6382939504d6d312e6dc0df4239d
SHA256f92a05d791507c5b9e1f8364b25794b681e37d4906615b88f8d4fda99dc30b26
SHA51289e9a0b840f8ba25e5cd91b6f35b1676b9c28f826e0f636888b627b73b90b5919856b0b8a9fcbfcc450d2e0e5c83097419bee43b50499ecb6aa2bd88469a95d2
-
Filesize
206KB
MD5104c42d6381688999f6956069589f3a0
SHA121f5529094c77f7af47572442e378bc4c3f3b445
SHA256e4706784a22eb4a6313e6c055d464df10516fc449287a2641035034bab22e62b
SHA5125724fcef0d76d977c9c89e6c0018a8a463bd99e1d0f788b3868b349ba389b549fe987935f6b3d07a7aef2a39a5cff14e9da0b35442bd5ac3efc7bee7d692f8ff
-
Filesize
206KB
MD5104c42d6381688999f6956069589f3a0
SHA121f5529094c77f7af47572442e378bc4c3f3b445
SHA256e4706784a22eb4a6313e6c055d464df10516fc449287a2641035034bab22e62b
SHA5125724fcef0d76d977c9c89e6c0018a8a463bd99e1d0f788b3868b349ba389b549fe987935f6b3d07a7aef2a39a5cff14e9da0b35442bd5ac3efc7bee7d692f8ff
-
Filesize
206KB
MD5104c42d6381688999f6956069589f3a0
SHA121f5529094c77f7af47572442e378bc4c3f3b445
SHA256e4706784a22eb4a6313e6c055d464df10516fc449287a2641035034bab22e62b
SHA5125724fcef0d76d977c9c89e6c0018a8a463bd99e1d0f788b3868b349ba389b549fe987935f6b3d07a7aef2a39a5cff14e9da0b35442bd5ac3efc7bee7d692f8ff
-
Filesize
206KB
MD5104c42d6381688999f6956069589f3a0
SHA121f5529094c77f7af47572442e378bc4c3f3b445
SHA256e4706784a22eb4a6313e6c055d464df10516fc449287a2641035034bab22e62b
SHA5125724fcef0d76d977c9c89e6c0018a8a463bd99e1d0f788b3868b349ba389b549fe987935f6b3d07a7aef2a39a5cff14e9da0b35442bd5ac3efc7bee7d692f8ff
-
Filesize
206KB
MD5104c42d6381688999f6956069589f3a0
SHA121f5529094c77f7af47572442e378bc4c3f3b445
SHA256e4706784a22eb4a6313e6c055d464df10516fc449287a2641035034bab22e62b
SHA5125724fcef0d76d977c9c89e6c0018a8a463bd99e1d0f788b3868b349ba389b549fe987935f6b3d07a7aef2a39a5cff14e9da0b35442bd5ac3efc7bee7d692f8ff
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5