Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe
Resource
win10v2004-20230220-en
General
-
Target
44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe
-
Size
588KB
-
MD5
c79334e0be85c01fd5dabb6428a11734
-
SHA1
de4bd202c8d619720e42bc5d9167cb7c47991649
-
SHA256
44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7
-
SHA512
70cf85d042f404ed809049454f775d0c8a22431536ff03dc1d6ba0cc01f277ff05402e1a40eecc650a554cdaaf21a193703727b9405a0020f7dc86e5e226063a
-
SSDEEP
12288:WMrfy90BLjvacid38PrwogypyFzf0m2KBJaNVfjtl+K5uWph:pyq31iNceysWm2gJaXxroWph
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2596-148-0x000000000AB90000-0x000000000B1A8000-memory.dmp redline_stealer behavioral2/memory/2596-157-0x000000000AB10000-0x000000000AB76000-memory.dmp redline_stealer behavioral2/memory/2596-158-0x000000000C080000-0x000000000C242000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1299486.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1299486.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h1299486.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1299486.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1299486.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1299486.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation i5802727.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 5 IoCs
pid Process 4824 x5858709.exe 2596 g5667860.exe 2760 h1299486.exe 4424 i5802727.exe 5024 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h1299486.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h1299486.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5858709.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5858709.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2600 2760 WerFault.exe 87 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2356 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2596 g5667860.exe 2596 g5667860.exe 2760 h1299486.exe 2760 h1299486.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2596 g5667860.exe Token: SeDebugPrivilege 2760 h1299486.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4424 i5802727.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4268 wrote to memory of 4824 4268 44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe 84 PID 4268 wrote to memory of 4824 4268 44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe 84 PID 4268 wrote to memory of 4824 4268 44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe 84 PID 4824 wrote to memory of 2596 4824 x5858709.exe 85 PID 4824 wrote to memory of 2596 4824 x5858709.exe 85 PID 4824 wrote to memory of 2596 4824 x5858709.exe 85 PID 4824 wrote to memory of 2760 4824 x5858709.exe 87 PID 4824 wrote to memory of 2760 4824 x5858709.exe 87 PID 4824 wrote to memory of 2760 4824 x5858709.exe 87 PID 4268 wrote to memory of 4424 4268 44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe 91 PID 4268 wrote to memory of 4424 4268 44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe 91 PID 4268 wrote to memory of 4424 4268 44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe 91 PID 4424 wrote to memory of 5024 4424 i5802727.exe 92 PID 4424 wrote to memory of 5024 4424 i5802727.exe 92 PID 4424 wrote to memory of 5024 4424 i5802727.exe 92 PID 5024 wrote to memory of 2356 5024 oneetx.exe 93 PID 5024 wrote to memory of 2356 5024 oneetx.exe 93 PID 5024 wrote to memory of 2356 5024 oneetx.exe 93 PID 5024 wrote to memory of 2696 5024 oneetx.exe 96 PID 5024 wrote to memory of 2696 5024 oneetx.exe 96 PID 5024 wrote to memory of 2696 5024 oneetx.exe 96 PID 2696 wrote to memory of 2460 2696 cmd.exe 97 PID 2696 wrote to memory of 2460 2696 cmd.exe 97 PID 2696 wrote to memory of 2460 2696 cmd.exe 97 PID 2696 wrote to memory of 4060 2696 cmd.exe 98 PID 2696 wrote to memory of 4060 2696 cmd.exe 98 PID 2696 wrote to memory of 4060 2696 cmd.exe 98 PID 2696 wrote to memory of 1560 2696 cmd.exe 99 PID 2696 wrote to memory of 1560 2696 cmd.exe 99 PID 2696 wrote to memory of 1560 2696 cmd.exe 99 PID 2696 wrote to memory of 1256 2696 cmd.exe 100 PID 2696 wrote to memory of 1256 2696 cmd.exe 100 PID 2696 wrote to memory of 1256 2696 cmd.exe 100 PID 2696 wrote to memory of 2124 2696 cmd.exe 101 PID 2696 wrote to memory of 2124 2696 cmd.exe 101 PID 2696 wrote to memory of 2124 2696 cmd.exe 101 PID 2696 wrote to memory of 1324 2696 cmd.exe 102 PID 2696 wrote to memory of 1324 2696 cmd.exe 102 PID 2696 wrote to memory of 1324 2696 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe"C:\Users\Admin\AppData\Local\Temp\44f668e2810bbf6ca9b9ad2dd9fe4f3ff2a8be225279d38d1dc2b0667c9791b7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5858709.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5858709.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5667860.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5667860.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1299486.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1299486.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 10844⤵
- Program crash
PID:2600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5802727.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5802727.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2356
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4060
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2124
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1324
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2760 -ip 27601⤵PID:1124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD548ee587a6fb8e384ea38ff7c325b113e
SHA1b2037c9147330000e9af2f7dd0f1f054870b556a
SHA25675c2ea0b08bd7f28b7fec0794f5d0cf83742ebb1ad0f47342c01f088110ddb62
SHA51274b03462beb508aaada52507523c1698deb884043ebd3eb49980e2ddb1841d4a7d9fec05476e9f53e854c9eb5716f4ebfa97e69907fa5d932ebb11bc928d17c6
-
Filesize
206KB
MD548ee587a6fb8e384ea38ff7c325b113e
SHA1b2037c9147330000e9af2f7dd0f1f054870b556a
SHA25675c2ea0b08bd7f28b7fec0794f5d0cf83742ebb1ad0f47342c01f088110ddb62
SHA51274b03462beb508aaada52507523c1698deb884043ebd3eb49980e2ddb1841d4a7d9fec05476e9f53e854c9eb5716f4ebfa97e69907fa5d932ebb11bc928d17c6
-
Filesize
416KB
MD5148d726fb8a12f30c26566a0facd2a5f
SHA19af720ce3ca3b32366b73b25afa0db7f0d831fdb
SHA2560fedac62a2994967c6720816b8bb85681d66380a9164c4021beefb36b4dcc042
SHA5122b6a242df729566df86de714bd8278f2fcf47a5528e686092ddbd6dce52031efe84eabd9dec4652ee4d90ccf5ffdb03edac953826c4a730a66c14275bd627725
-
Filesize
416KB
MD5148d726fb8a12f30c26566a0facd2a5f
SHA19af720ce3ca3b32366b73b25afa0db7f0d831fdb
SHA2560fedac62a2994967c6720816b8bb85681d66380a9164c4021beefb36b4dcc042
SHA5122b6a242df729566df86de714bd8278f2fcf47a5528e686092ddbd6dce52031efe84eabd9dec4652ee4d90ccf5ffdb03edac953826c4a730a66c14275bd627725
-
Filesize
168KB
MD5244238e37c4ca304631793be20496142
SHA142bab7d167b12e03e46e96ef0f6959d3a467d740
SHA2560ef5332c4b558faf804f02e8e00710998e2012136d637b2189fd020aaec8dcb4
SHA5124274d47fea0cf67036ba93e47ea97fc2cf386ac35fc2d091c959291cf3aaf970e33094c5fc91463ba01561a304c4ac721b63129344f0d40a380b1836ae6d97ef
-
Filesize
168KB
MD5244238e37c4ca304631793be20496142
SHA142bab7d167b12e03e46e96ef0f6959d3a467d740
SHA2560ef5332c4b558faf804f02e8e00710998e2012136d637b2189fd020aaec8dcb4
SHA5124274d47fea0cf67036ba93e47ea97fc2cf386ac35fc2d091c959291cf3aaf970e33094c5fc91463ba01561a304c4ac721b63129344f0d40a380b1836ae6d97ef
-
Filesize
360KB
MD5c062a2da367b4fcefe41a555aec89c46
SHA12cea992946cc2f4e2dae4ca019db611c5436eed4
SHA256431ae24d1bcd6029abbb89018bc7cf053117a972cfd782c09aab7ed6331d9b31
SHA5125841eaeb296e3107374c4e6652ec56c322dd85cd42230dfc0751da3abfbb96cbc2acfffd97a8a7d7ebc5caa025f7db9e5c7d0b8956c19205cc8a745f911c0766
-
Filesize
360KB
MD5c062a2da367b4fcefe41a555aec89c46
SHA12cea992946cc2f4e2dae4ca019db611c5436eed4
SHA256431ae24d1bcd6029abbb89018bc7cf053117a972cfd782c09aab7ed6331d9b31
SHA5125841eaeb296e3107374c4e6652ec56c322dd85cd42230dfc0751da3abfbb96cbc2acfffd97a8a7d7ebc5caa025f7db9e5c7d0b8956c19205cc8a745f911c0766
-
Filesize
206KB
MD548ee587a6fb8e384ea38ff7c325b113e
SHA1b2037c9147330000e9af2f7dd0f1f054870b556a
SHA25675c2ea0b08bd7f28b7fec0794f5d0cf83742ebb1ad0f47342c01f088110ddb62
SHA51274b03462beb508aaada52507523c1698deb884043ebd3eb49980e2ddb1841d4a7d9fec05476e9f53e854c9eb5716f4ebfa97e69907fa5d932ebb11bc928d17c6
-
Filesize
206KB
MD548ee587a6fb8e384ea38ff7c325b113e
SHA1b2037c9147330000e9af2f7dd0f1f054870b556a
SHA25675c2ea0b08bd7f28b7fec0794f5d0cf83742ebb1ad0f47342c01f088110ddb62
SHA51274b03462beb508aaada52507523c1698deb884043ebd3eb49980e2ddb1841d4a7d9fec05476e9f53e854c9eb5716f4ebfa97e69907fa5d932ebb11bc928d17c6
-
Filesize
206KB
MD548ee587a6fb8e384ea38ff7c325b113e
SHA1b2037c9147330000e9af2f7dd0f1f054870b556a
SHA25675c2ea0b08bd7f28b7fec0794f5d0cf83742ebb1ad0f47342c01f088110ddb62
SHA51274b03462beb508aaada52507523c1698deb884043ebd3eb49980e2ddb1841d4a7d9fec05476e9f53e854c9eb5716f4ebfa97e69907fa5d932ebb11bc928d17c6