Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe
Resource
win10v2004-20230220-en
General
-
Target
53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe
-
Size
481KB
-
MD5
a0969e0ab6cc4949b3f9511573b9489c
-
SHA1
a0c923e88d68a7b852ba93092a01788811c34517
-
SHA256
53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89
-
SHA512
80ce1705711574384ef3a3d11418242e24b520b0424c8bd71858db29db1f4323a76dd280593474ac2b4ae20c9eba7bee294817e89120384cf239b6214fcd17bf
-
SSDEEP
12288:+Mroy90s/yVFlUplDL5qo20QfAaJ21ThG:yyrqBYtttXKyG
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3040776.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3040776.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k3040776.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3040776.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3040776.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3040776.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m6403855.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 6 IoCs
pid Process 4624 y4325078.exe 4636 k3040776.exe 1148 l9572066.exe 2540 m6403855.exe 4708 oneetx.exe 4444 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3040776.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3040776.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4325078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4325078.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4636 k3040776.exe 4636 k3040776.exe 1148 l9572066.exe 1148 l9572066.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4636 k3040776.exe Token: SeDebugPrivilege 1148 l9572066.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 m6403855.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4008 wrote to memory of 4624 4008 53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe 81 PID 4008 wrote to memory of 4624 4008 53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe 81 PID 4008 wrote to memory of 4624 4008 53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe 81 PID 4624 wrote to memory of 4636 4624 y4325078.exe 82 PID 4624 wrote to memory of 4636 4624 y4325078.exe 82 PID 4624 wrote to memory of 4636 4624 y4325078.exe 82 PID 4624 wrote to memory of 1148 4624 y4325078.exe 88 PID 4624 wrote to memory of 1148 4624 y4325078.exe 88 PID 4624 wrote to memory of 1148 4624 y4325078.exe 88 PID 4008 wrote to memory of 2540 4008 53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe 93 PID 4008 wrote to memory of 2540 4008 53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe 93 PID 4008 wrote to memory of 2540 4008 53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe 93 PID 2540 wrote to memory of 4708 2540 m6403855.exe 94 PID 2540 wrote to memory of 4708 2540 m6403855.exe 94 PID 2540 wrote to memory of 4708 2540 m6403855.exe 94 PID 4708 wrote to memory of 2508 4708 oneetx.exe 95 PID 4708 wrote to memory of 2508 4708 oneetx.exe 95 PID 4708 wrote to memory of 2508 4708 oneetx.exe 95 PID 4708 wrote to memory of 1240 4708 oneetx.exe 97 PID 4708 wrote to memory of 1240 4708 oneetx.exe 97 PID 4708 wrote to memory of 1240 4708 oneetx.exe 97 PID 1240 wrote to memory of 2236 1240 cmd.exe 99 PID 1240 wrote to memory of 2236 1240 cmd.exe 99 PID 1240 wrote to memory of 2236 1240 cmd.exe 99 PID 1240 wrote to memory of 2072 1240 cmd.exe 100 PID 1240 wrote to memory of 2072 1240 cmd.exe 100 PID 1240 wrote to memory of 2072 1240 cmd.exe 100 PID 1240 wrote to memory of 3788 1240 cmd.exe 101 PID 1240 wrote to memory of 3788 1240 cmd.exe 101 PID 1240 wrote to memory of 3788 1240 cmd.exe 101 PID 1240 wrote to memory of 3680 1240 cmd.exe 102 PID 1240 wrote to memory of 3680 1240 cmd.exe 102 PID 1240 wrote to memory of 3680 1240 cmd.exe 102 PID 1240 wrote to memory of 3856 1240 cmd.exe 103 PID 1240 wrote to memory of 3856 1240 cmd.exe 103 PID 1240 wrote to memory of 3856 1240 cmd.exe 103 PID 1240 wrote to memory of 3916 1240 cmd.exe 104 PID 1240 wrote to memory of 3916 1240 cmd.exe 104 PID 1240 wrote to memory of 3916 1240 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe"C:\Users\Admin\AppData\Local\Temp\53ce22935d343da23fcc1833b16725f64d8c0be92c7566e02aa02dac64d78f89.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4325078.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4325078.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3040776.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3040776.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9572066.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9572066.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6403855.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6403855.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2072
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3680
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3856
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD549011105556e784dc41443b78fdb9f70
SHA1930fa39e0c3f191c74cbc9be4a78674d68c9e26f
SHA256d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d
SHA5122672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f
-
Filesize
208KB
MD549011105556e784dc41443b78fdb9f70
SHA1930fa39e0c3f191c74cbc9be4a78674d68c9e26f
SHA256d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d
SHA5122672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f
-
Filesize
309KB
MD5a9615ba3577ab47708889cec039069bb
SHA1e3f9c4690ce0b8dc3bc5567b27178442d6117f62
SHA25676f5e188d2c19c818172b4f72b7c968906892f9189c981f3b76f311c55b61b21
SHA512ac85703a96ec4e2269bea70b33be0e055e8fb6e10951b8e2b8ceeec1f9af97253099bd041e8e23cd42187c3902fdcd7bdc5474c69a9f55a6aed33e6976647799
-
Filesize
309KB
MD5a9615ba3577ab47708889cec039069bb
SHA1e3f9c4690ce0b8dc3bc5567b27178442d6117f62
SHA25676f5e188d2c19c818172b4f72b7c968906892f9189c981f3b76f311c55b61b21
SHA512ac85703a96ec4e2269bea70b33be0e055e8fb6e10951b8e2b8ceeec1f9af97253099bd041e8e23cd42187c3902fdcd7bdc5474c69a9f55a6aed33e6976647799
-
Filesize
176KB
MD5c9b4c70e4daecafe038d3907491d06c9
SHA1280bfb9a28e90b00cc168a30f9128c265facfe50
SHA256fa145de8081756f6f533f111ac1a8f8cb90ce3e17ddd263bffb387f2e9b53a6e
SHA51230b8eb2a1159141c8f65aa3b4f38a7ae9921eb23e819ab0bab0ee48eade9b8efd11929456d6d8aa7b41c11faebc7fa2076968a03ecb059336cb8d33d4940b48a
-
Filesize
176KB
MD5c9b4c70e4daecafe038d3907491d06c9
SHA1280bfb9a28e90b00cc168a30f9128c265facfe50
SHA256fa145de8081756f6f533f111ac1a8f8cb90ce3e17ddd263bffb387f2e9b53a6e
SHA51230b8eb2a1159141c8f65aa3b4f38a7ae9921eb23e819ab0bab0ee48eade9b8efd11929456d6d8aa7b41c11faebc7fa2076968a03ecb059336cb8d33d4940b48a
-
Filesize
168KB
MD5d150849d34f6977fc7a88cff5e194a49
SHA1a3986ebd701a96e9bdc8245a6c4717dd1e285377
SHA2564df33e3bdf052443f27f0b7e1afc8a18369204e1c367d64c7f8c0386858a36bf
SHA512af32dc1b1dae4deb1848c8c5cfee5d0b8cfd90a7df241e50f87c6d4aa1999bd9be582c02c9c78d75b175323fc895498c7a51ed2884a3eb767500e7b3aec8605a
-
Filesize
168KB
MD5d150849d34f6977fc7a88cff5e194a49
SHA1a3986ebd701a96e9bdc8245a6c4717dd1e285377
SHA2564df33e3bdf052443f27f0b7e1afc8a18369204e1c367d64c7f8c0386858a36bf
SHA512af32dc1b1dae4deb1848c8c5cfee5d0b8cfd90a7df241e50f87c6d4aa1999bd9be582c02c9c78d75b175323fc895498c7a51ed2884a3eb767500e7b3aec8605a
-
Filesize
208KB
MD549011105556e784dc41443b78fdb9f70
SHA1930fa39e0c3f191c74cbc9be4a78674d68c9e26f
SHA256d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d
SHA5122672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f
-
Filesize
208KB
MD549011105556e784dc41443b78fdb9f70
SHA1930fa39e0c3f191c74cbc9be4a78674d68c9e26f
SHA256d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d
SHA5122672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f
-
Filesize
208KB
MD549011105556e784dc41443b78fdb9f70
SHA1930fa39e0c3f191c74cbc9be4a78674d68c9e26f
SHA256d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d
SHA5122672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f
-
Filesize
208KB
MD549011105556e784dc41443b78fdb9f70
SHA1930fa39e0c3f191c74cbc9be4a78674d68c9e26f
SHA256d8fd2d628daec7aed010592565cbb94aa1d19f64211c28158f02c1102fa86f3d
SHA5122672bde1fb917c5c43d11a83bbcda59d6efbe74ee85b260d8810e080013a41087684b68691f8e67f5d0e391848de24705fd3515d42dff0a610643b10caa7555f