Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:17

General

  • Target

    53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe

  • Size

    481KB

  • MD5

    a0969e0ab6cc4949b3f9511573b9489c

  • SHA1

    a0c923e88d68a7b852ba93092a01788811c34517

  • SHA256

    53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89

  • SHA512

    80ce1705711574384ef3a3d11418242e24b520b0424c8bd71858db29db1f4323a76dd280593474ac2b4ae20c9eba7bee294817e89120384cf239b6214fcd17bf

  • SSDEEP

    12288:+Mroy90s/yVFlUplDL5qo20QfAaJ21ThG:yyrqBYtttXKyG

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe
    "C:\Users\Admin\AppData\Local\Temp\53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4325078.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4325078.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3040776.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3040776.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9572066.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9572066.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6403855.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6403855.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4708
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2508
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1240
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2236
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:2072
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:3788
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3680
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:3856
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3916
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4444

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6403855.exe

                Filesize

                208KB

                MD5

                49011105556e784dc41443b78fdb9f70

                SHA1

                930fa39e0c3f191c74cbc9be4a78674d68c9e26f

                SHA256

                d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d

                SHA512

                2672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6403855.exe

                Filesize

                208KB

                MD5

                49011105556e784dc41443b78fdb9f70

                SHA1

                930fa39e0c3f191c74cbc9be4a78674d68c9e26f

                SHA256

                d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d

                SHA512

                2672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4325078.exe

                Filesize

                309KB

                MD5

                a9615ba3577ab47708889cec039069bb

                SHA1

                e3f9c4690ce0b8dc3bc5567b27178442d6117f62

                SHA256

                76f5e188d2c19c818172b4f72b7c968906892f9189c981f3b76f311c55b61b21

                SHA512

                ac85703a96ec4e2269bea70b33be0e055e8fb6e10951b8e2b8ceeec1f9af97253099bd041e8e23cd42187c3902fdcd7bdc5474c69a9f55a6aed33e6976647799

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4325078.exe

                Filesize

                309KB

                MD5

                a9615ba3577ab47708889cec039069bb

                SHA1

                e3f9c4690ce0b8dc3bc5567b27178442d6117f62

                SHA256

                76f5e188d2c19c818172b4f72b7c968906892f9189c981f3b76f311c55b61b21

                SHA512

                ac85703a96ec4e2269bea70b33be0e055e8fb6e10951b8e2b8ceeec1f9af97253099bd041e8e23cd42187c3902fdcd7bdc5474c69a9f55a6aed33e6976647799

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3040776.exe

                Filesize

                176KB

                MD5

                c9b4c70e4daecafe038d3907491d06c9

                SHA1

                280bfb9a28e90b00cc168a30f9128c265facfe50

                SHA256

                fa145de8081756f6f533f111ac1a8f8cb90ce3e17ddd263bffb387f2e9b53a6e

                SHA512

                30b8eb2a1159141c8f65aa3b4f38a7ae9921eb23e819ab0bab0ee48eade9b8efd11929456d6d8aa7b41c11faebc7fa2076968a03ecb059336cb8d33d4940b48a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3040776.exe

                Filesize

                176KB

                MD5

                c9b4c70e4daecafe038d3907491d06c9

                SHA1

                280bfb9a28e90b00cc168a30f9128c265facfe50

                SHA256

                fa145de8081756f6f533f111ac1a8f8cb90ce3e17ddd263bffb387f2e9b53a6e

                SHA512

                30b8eb2a1159141c8f65aa3b4f38a7ae9921eb23e819ab0bab0ee48eade9b8efd11929456d6d8aa7b41c11faebc7fa2076968a03ecb059336cb8d33d4940b48a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9572066.exe

                Filesize

                168KB

                MD5

                d150849d34f6977fc7a88cff5e194a49

                SHA1

                a3986ebd701a96e9bdc8245a6c4717dd1e285377

                SHA256

                4df33e3bdf052443f27f0b7e1afc8a18369204e1c367d64c7f8c0386858a36bf

                SHA512

                af32dc1b1dae4deb1848c8c5cfee5d0b8cfd90a7df241e50f87c6d4aa1999bd9be582c02c9c78d75b175323fc895498c7a51ed2884a3eb767500e7b3aec8605a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9572066.exe

                Filesize

                168KB

                MD5

                d150849d34f6977fc7a88cff5e194a49

                SHA1

                a3986ebd701a96e9bdc8245a6c4717dd1e285377

                SHA256

                4df33e3bdf052443f27f0b7e1afc8a18369204e1c367d64c7f8c0386858a36bf

                SHA512

                af32dc1b1dae4deb1848c8c5cfee5d0b8cfd90a7df241e50f87c6d4aa1999bd9be582c02c9c78d75b175323fc895498c7a51ed2884a3eb767500e7b3aec8605a

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                208KB

                MD5

                49011105556e784dc41443b78fdb9f70

                SHA1

                930fa39e0c3f191c74cbc9be4a78674d68c9e26f

                SHA256

                d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d

                SHA512

                2672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                208KB

                MD5

                49011105556e784dc41443b78fdb9f70

                SHA1

                930fa39e0c3f191c74cbc9be4a78674d68c9e26f

                SHA256

                d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d

                SHA512

                2672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                208KB

                MD5

                49011105556e784dc41443b78fdb9f70

                SHA1

                930fa39e0c3f191c74cbc9be4a78674d68c9e26f

                SHA256

                d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d

                SHA512

                2672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                208KB

                MD5

                49011105556e784dc41443b78fdb9f70

                SHA1

                930fa39e0c3f191c74cbc9be4a78674d68c9e26f

                SHA256

                d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d

                SHA512

                2672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f

              • memory/1148-192-0x0000000008BD0000-0x00000000090FC000-memory.dmp

                Filesize

                5.2MB

              • memory/1148-191-0x0000000006620000-0x00000000067E2000-memory.dmp

                Filesize

                1.8MB

              • memory/1148-190-0x0000000006060000-0x00000000060C6000-memory.dmp

                Filesize

                408KB

              • memory/1148-189-0x0000000005880000-0x0000000005912000-memory.dmp

                Filesize

                584KB

              • memory/1148-188-0x00000000029A0000-0x0000000002A16000-memory.dmp

                Filesize

                472KB

              • memory/1148-187-0x0000000005210000-0x0000000005220000-memory.dmp

                Filesize

                64KB

              • memory/1148-186-0x0000000005210000-0x0000000005220000-memory.dmp

                Filesize

                64KB

              • memory/1148-185-0x00000000051D0000-0x000000000520C000-memory.dmp

                Filesize

                240KB

              • memory/1148-184-0x0000000005170000-0x0000000005182000-memory.dmp

                Filesize

                72KB

              • memory/1148-183-0x0000000005430000-0x000000000553A000-memory.dmp

                Filesize

                1.0MB

              • memory/1148-193-0x0000000006FB0000-0x0000000007000000-memory.dmp

                Filesize

                320KB

              • memory/1148-181-0x0000000000930000-0x000000000095E000-memory.dmp

                Filesize

                184KB

              • memory/1148-182-0x0000000005940000-0x0000000005F58000-memory.dmp

                Filesize

                6.1MB

              • memory/4636-162-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-176-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-174-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-172-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-166-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-168-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-170-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-164-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-156-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-158-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-160-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-154-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-152-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-150-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-149-0x00000000024B0000-0x00000000024C2000-memory.dmp

                Filesize

                72KB

              • memory/4636-148-0x0000000004AB0000-0x0000000005054000-memory.dmp

                Filesize

                5.6MB

              • memory/4636-147-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

                Filesize

                64KB