Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe
Resource
win10v2004-20230220-en
General
-
Target
9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe
-
Size
479KB
-
MD5
bca67fa198b3f33a2d74e0cde3957eb1
-
SHA1
8d9ab9f3da814666d4765379f8cd2d77442b7382
-
SHA256
9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27
-
SHA512
c6a59766101838bb8f067b8e8a064320370f44fa978747ed0433f4c1965034878e453491d47b984fa6e7711da100cce702cfa4135c19dfecbce5966f93b04ce3
-
SSDEEP
6144:KKy+bnr+Up0yN90QE3Pn1TNfAewsatZ9bwfJTKQnPyRnYNKps5DEvQhhneGh2/kV:mMrQy90hPnVZWaB5nQYNKps2vcsmbv
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7853172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7853172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7853172.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h7853172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7853172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7853172.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation i0502541.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 3972 x1364542.exe 2244 g2792624.exe 1120 h7853172.exe 2496 i0502541.exe 1964 oneetx.exe 4248 oneetx.exe 448 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4572 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h7853172.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h7853172.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1364542.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1364542.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2244 g2792624.exe 2244 g2792624.exe 1120 h7853172.exe 1120 h7853172.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2244 g2792624.exe Token: SeDebugPrivilege 1120 h7853172.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 i0502541.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4232 wrote to memory of 3972 4232 9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe 83 PID 4232 wrote to memory of 3972 4232 9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe 83 PID 4232 wrote to memory of 3972 4232 9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe 83 PID 3972 wrote to memory of 2244 3972 x1364542.exe 84 PID 3972 wrote to memory of 2244 3972 x1364542.exe 84 PID 3972 wrote to memory of 2244 3972 x1364542.exe 84 PID 3972 wrote to memory of 1120 3972 x1364542.exe 91 PID 3972 wrote to memory of 1120 3972 x1364542.exe 91 PID 3972 wrote to memory of 1120 3972 x1364542.exe 91 PID 4232 wrote to memory of 2496 4232 9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe 92 PID 4232 wrote to memory of 2496 4232 9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe 92 PID 4232 wrote to memory of 2496 4232 9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe 92 PID 2496 wrote to memory of 1964 2496 i0502541.exe 93 PID 2496 wrote to memory of 1964 2496 i0502541.exe 93 PID 2496 wrote to memory of 1964 2496 i0502541.exe 93 PID 1964 wrote to memory of 4464 1964 oneetx.exe 94 PID 1964 wrote to memory of 4464 1964 oneetx.exe 94 PID 1964 wrote to memory of 4464 1964 oneetx.exe 94 PID 1964 wrote to memory of 3520 1964 oneetx.exe 96 PID 1964 wrote to memory of 3520 1964 oneetx.exe 96 PID 1964 wrote to memory of 3520 1964 oneetx.exe 96 PID 3520 wrote to memory of 4104 3520 cmd.exe 98 PID 3520 wrote to memory of 4104 3520 cmd.exe 98 PID 3520 wrote to memory of 4104 3520 cmd.exe 98 PID 3520 wrote to memory of 64 3520 cmd.exe 99 PID 3520 wrote to memory of 64 3520 cmd.exe 99 PID 3520 wrote to memory of 64 3520 cmd.exe 99 PID 3520 wrote to memory of 4128 3520 cmd.exe 100 PID 3520 wrote to memory of 4128 3520 cmd.exe 100 PID 3520 wrote to memory of 4128 3520 cmd.exe 100 PID 3520 wrote to memory of 4596 3520 cmd.exe 101 PID 3520 wrote to memory of 4596 3520 cmd.exe 101 PID 3520 wrote to memory of 4596 3520 cmd.exe 101 PID 3520 wrote to memory of 512 3520 cmd.exe 102 PID 3520 wrote to memory of 512 3520 cmd.exe 102 PID 3520 wrote to memory of 512 3520 cmd.exe 102 PID 3520 wrote to memory of 2624 3520 cmd.exe 103 PID 3520 wrote to memory of 2624 3520 cmd.exe 103 PID 3520 wrote to memory of 2624 3520 cmd.exe 103 PID 1964 wrote to memory of 4572 1964 oneetx.exe 106 PID 1964 wrote to memory of 4572 1964 oneetx.exe 106 PID 1964 wrote to memory of 4572 1964 oneetx.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe"C:\Users\Admin\AppData\Local\Temp\9197ac690941a3e091585557a233b85f593bfec76cc539ef027c406264a94e27.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1364542.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1364542.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2792624.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2792624.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7853172.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7853172.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0502541.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0502541.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:64
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2624
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4248
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5316f0761fbd786a66e906784882d8697
SHA1750ea32bc01571d29a80271faa9eebb65fe69f51
SHA256c8777011232ead1a0ee0e34507c18eccc6a101f5fe648ce280cf1f008841cd4c
SHA512d1216144dfeee97ad1f9b857823aca264822dea587efcd238f4942085bc3480ee469eb211c36094811b21235721e1010adfd0b295363413dabc876afe397905e
-
Filesize
208KB
MD5316f0761fbd786a66e906784882d8697
SHA1750ea32bc01571d29a80271faa9eebb65fe69f51
SHA256c8777011232ead1a0ee0e34507c18eccc6a101f5fe648ce280cf1f008841cd4c
SHA512d1216144dfeee97ad1f9b857823aca264822dea587efcd238f4942085bc3480ee469eb211c36094811b21235721e1010adfd0b295363413dabc876afe397905e
-
Filesize
307KB
MD55c102157a4a8a484f2083331af378c41
SHA1d2ac76c8fb7ab9d5fe653bbce6b70a03472f75b3
SHA256d37388522c461178bd606599c8fb27f4cc1ac4a3e7b06f18ab1e151bbd27c7dc
SHA512ba6a2595433e05d787dfc72b878a35c8fb680965d690a8e2fbbaf855dd7987dab9e09bc8b2a5feca1e5c8c7ee123c4bafed4e63d0e5b58cbf057ed36ed6e201a
-
Filesize
307KB
MD55c102157a4a8a484f2083331af378c41
SHA1d2ac76c8fb7ab9d5fe653bbce6b70a03472f75b3
SHA256d37388522c461178bd606599c8fb27f4cc1ac4a3e7b06f18ab1e151bbd27c7dc
SHA512ba6a2595433e05d787dfc72b878a35c8fb680965d690a8e2fbbaf855dd7987dab9e09bc8b2a5feca1e5c8c7ee123c4bafed4e63d0e5b58cbf057ed36ed6e201a
-
Filesize
168KB
MD54b655791ce8030d04e0359926b09bea4
SHA154ec060cbae2f081f0698bbfa0febf26c33c0849
SHA256082a2111979ac648bdd1fe8e541c2263c1f7224ce3e7008420fe615ba247a1b3
SHA512c7274e4e0187e4677c5abbf86265377379f9e0eb4a8f3c4b3cfa5c7c6ee1fa68b1f5adcdb6a6f9c014707d482c12793c0a3dcf1bf5797b551650d79e73ff9f63
-
Filesize
168KB
MD54b655791ce8030d04e0359926b09bea4
SHA154ec060cbae2f081f0698bbfa0febf26c33c0849
SHA256082a2111979ac648bdd1fe8e541c2263c1f7224ce3e7008420fe615ba247a1b3
SHA512c7274e4e0187e4677c5abbf86265377379f9e0eb4a8f3c4b3cfa5c7c6ee1fa68b1f5adcdb6a6f9c014707d482c12793c0a3dcf1bf5797b551650d79e73ff9f63
-
Filesize
176KB
MD5fa220fc1885a10f10b3981c9aa89f438
SHA1cd794c25183bab28d95fb0be4a3d24340e973379
SHA25698c290827da0f73c3930b8ae14f667eb51abdf6ee12baacbedeeb889a3aa777b
SHA5128184cdde80f2c021a198269b4c80575aa9897b1ec1f6792292ea0d57b8653758211c656e2b5ffb8087317cb3d17d7eb6c1f327c6c2c3bec0de028fb938a25161
-
Filesize
176KB
MD5fa220fc1885a10f10b3981c9aa89f438
SHA1cd794c25183bab28d95fb0be4a3d24340e973379
SHA25698c290827da0f73c3930b8ae14f667eb51abdf6ee12baacbedeeb889a3aa777b
SHA5128184cdde80f2c021a198269b4c80575aa9897b1ec1f6792292ea0d57b8653758211c656e2b5ffb8087317cb3d17d7eb6c1f327c6c2c3bec0de028fb938a25161
-
Filesize
208KB
MD5316f0761fbd786a66e906784882d8697
SHA1750ea32bc01571d29a80271faa9eebb65fe69f51
SHA256c8777011232ead1a0ee0e34507c18eccc6a101f5fe648ce280cf1f008841cd4c
SHA512d1216144dfeee97ad1f9b857823aca264822dea587efcd238f4942085bc3480ee469eb211c36094811b21235721e1010adfd0b295363413dabc876afe397905e
-
Filesize
208KB
MD5316f0761fbd786a66e906784882d8697
SHA1750ea32bc01571d29a80271faa9eebb65fe69f51
SHA256c8777011232ead1a0ee0e34507c18eccc6a101f5fe648ce280cf1f008841cd4c
SHA512d1216144dfeee97ad1f9b857823aca264822dea587efcd238f4942085bc3480ee469eb211c36094811b21235721e1010adfd0b295363413dabc876afe397905e
-
Filesize
208KB
MD5316f0761fbd786a66e906784882d8697
SHA1750ea32bc01571d29a80271faa9eebb65fe69f51
SHA256c8777011232ead1a0ee0e34507c18eccc6a101f5fe648ce280cf1f008841cd4c
SHA512d1216144dfeee97ad1f9b857823aca264822dea587efcd238f4942085bc3480ee469eb211c36094811b21235721e1010adfd0b295363413dabc876afe397905e
-
Filesize
208KB
MD5316f0761fbd786a66e906784882d8697
SHA1750ea32bc01571d29a80271faa9eebb65fe69f51
SHA256c8777011232ead1a0ee0e34507c18eccc6a101f5fe648ce280cf1f008841cd4c
SHA512d1216144dfeee97ad1f9b857823aca264822dea587efcd238f4942085bc3480ee469eb211c36094811b21235721e1010adfd0b295363413dabc876afe397905e
-
Filesize
208KB
MD5316f0761fbd786a66e906784882d8697
SHA1750ea32bc01571d29a80271faa9eebb65fe69f51
SHA256c8777011232ead1a0ee0e34507c18eccc6a101f5fe648ce280cf1f008841cd4c
SHA512d1216144dfeee97ad1f9b857823aca264822dea587efcd238f4942085bc3480ee469eb211c36094811b21235721e1010adfd0b295363413dabc876afe397905e
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5