Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe
Resource
win10v2004-20230220-en
General
-
Target
ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe
-
Size
480KB
-
MD5
1d9fd5c822af0848989ae2b69d87ffdf
-
SHA1
88a50a0d717192a5b466d38e5d9c2905cf6404e3
-
SHA256
ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123
-
SHA512
7f3054bf250a5172d03cde1e94b0d3e13a34c1f7cfb42ca1f9160f808167e5bad1bc547d013479a7768784f1ec4e58d717d40a6a9db66ef0086c969dce9657c4
-
SSDEEP
12288:vMrCy90ckanMrK+RRrYsAnxvTob7ld3z/6rd2B:FyVkanCKG+xWltzeO
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1388749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1388749.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1388749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1388749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1388749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1388749.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m3782423.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2192 y0732204.exe 1444 k1388749.exe 3956 l1723373.exe 3964 m3782423.exe 2608 oneetx.exe 1516 oneetx.exe 1376 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3152 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1388749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1388749.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0732204.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0732204.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4844 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1444 k1388749.exe 1444 k1388749.exe 3956 l1723373.exe 3956 l1723373.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1444 k1388749.exe Token: SeDebugPrivilege 3956 l1723373.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3964 m3782423.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2192 4884 ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe 89 PID 4884 wrote to memory of 2192 4884 ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe 89 PID 4884 wrote to memory of 2192 4884 ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe 89 PID 2192 wrote to memory of 1444 2192 y0732204.exe 90 PID 2192 wrote to memory of 1444 2192 y0732204.exe 90 PID 2192 wrote to memory of 1444 2192 y0732204.exe 90 PID 2192 wrote to memory of 3956 2192 y0732204.exe 94 PID 2192 wrote to memory of 3956 2192 y0732204.exe 94 PID 2192 wrote to memory of 3956 2192 y0732204.exe 94 PID 4884 wrote to memory of 3964 4884 ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe 95 PID 4884 wrote to memory of 3964 4884 ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe 95 PID 4884 wrote to memory of 3964 4884 ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe 95 PID 3964 wrote to memory of 2608 3964 m3782423.exe 97 PID 3964 wrote to memory of 2608 3964 m3782423.exe 97 PID 3964 wrote to memory of 2608 3964 m3782423.exe 97 PID 2608 wrote to memory of 1916 2608 oneetx.exe 98 PID 2608 wrote to memory of 1916 2608 oneetx.exe 98 PID 2608 wrote to memory of 1916 2608 oneetx.exe 98 PID 2608 wrote to memory of 2256 2608 oneetx.exe 100 PID 2608 wrote to memory of 2256 2608 oneetx.exe 100 PID 2608 wrote to memory of 2256 2608 oneetx.exe 100 PID 2256 wrote to memory of 236 2256 cmd.exe 102 PID 2256 wrote to memory of 236 2256 cmd.exe 102 PID 2256 wrote to memory of 236 2256 cmd.exe 102 PID 2256 wrote to memory of 3496 2256 cmd.exe 103 PID 2256 wrote to memory of 3496 2256 cmd.exe 103 PID 2256 wrote to memory of 3496 2256 cmd.exe 103 PID 2256 wrote to memory of 1440 2256 cmd.exe 104 PID 2256 wrote to memory of 1440 2256 cmd.exe 104 PID 2256 wrote to memory of 1440 2256 cmd.exe 104 PID 2256 wrote to memory of 1508 2256 cmd.exe 105 PID 2256 wrote to memory of 1508 2256 cmd.exe 105 PID 2256 wrote to memory of 1508 2256 cmd.exe 105 PID 2256 wrote to memory of 4176 2256 cmd.exe 106 PID 2256 wrote to memory of 4176 2256 cmd.exe 106 PID 2256 wrote to memory of 4176 2256 cmd.exe 106 PID 2256 wrote to memory of 532 2256 cmd.exe 107 PID 2256 wrote to memory of 532 2256 cmd.exe 107 PID 2256 wrote to memory of 532 2256 cmd.exe 107 PID 2608 wrote to memory of 3152 2608 oneetx.exe 113 PID 2608 wrote to memory of 3152 2608 oneetx.exe 113 PID 2608 wrote to memory of 3152 2608 oneetx.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe"C:\Users\Admin\AppData\Local\Temp\ce6e0a1fc1c733198c6abba407c1197ada20d199de25227051444460ab4ec123.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0732204.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0732204.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1388749.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1388749.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1723373.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1723373.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3782423.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3782423.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1916
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:532
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1516
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1376
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5066e3e935dd6ed85cd15e546af8a13e2
SHA14277e1c1b6090fd84a92d2db09a9860ff7fc1fc2
SHA2561383abfbddd9dd000fe491b28791f51f40425740379ae04a3cbd589589a57649
SHA5128ec3137bdc72d5faba012926d2ef00d0fe0460a211372cf25169f2b85c9633b8205d0a1f26a1997b33e2710c006dfbe47aa9815f3f17df3ca4462e1dd7ade6e1
-
Filesize
208KB
MD5066e3e935dd6ed85cd15e546af8a13e2
SHA14277e1c1b6090fd84a92d2db09a9860ff7fc1fc2
SHA2561383abfbddd9dd000fe491b28791f51f40425740379ae04a3cbd589589a57649
SHA5128ec3137bdc72d5faba012926d2ef00d0fe0460a211372cf25169f2b85c9633b8205d0a1f26a1997b33e2710c006dfbe47aa9815f3f17df3ca4462e1dd7ade6e1
-
Filesize
309KB
MD55a84dd55b9674bd45a55baa015882129
SHA1bc6547417a33477e1ba6e475f24766f07b6ab3b8
SHA256a9d3ff8647dfb315f396f2e855e8c94fa87744b456f9e817eddc781a40e4d12c
SHA512a2de990ac55f438c3b5563f1845c218908066c3a9df5f74a289e530f678d1b042e9f1d00e9e30112eed71a26700931396d1c51a32e83b92e6492299658456b24
-
Filesize
309KB
MD55a84dd55b9674bd45a55baa015882129
SHA1bc6547417a33477e1ba6e475f24766f07b6ab3b8
SHA256a9d3ff8647dfb315f396f2e855e8c94fa87744b456f9e817eddc781a40e4d12c
SHA512a2de990ac55f438c3b5563f1845c218908066c3a9df5f74a289e530f678d1b042e9f1d00e9e30112eed71a26700931396d1c51a32e83b92e6492299658456b24
-
Filesize
176KB
MD53a3fb8ba55676a39a66d330886b6cdf1
SHA1b3cf4d617371e962ed939a16e07a1c6f070dade8
SHA256a26fce552e07ddb43475a21ff6622fa6fe5eb55c2109a7ffe1ceb7a5baa7ddfe
SHA512fc4348ee8bf6c8b94ccb354828a3f979e53b7589e41837e8dd8e0e66b180cf031b7a7421af7dbdb5255ca159b3da8ca0495b9edaa4fc1ecb817b6159e8e6a81d
-
Filesize
176KB
MD53a3fb8ba55676a39a66d330886b6cdf1
SHA1b3cf4d617371e962ed939a16e07a1c6f070dade8
SHA256a26fce552e07ddb43475a21ff6622fa6fe5eb55c2109a7ffe1ceb7a5baa7ddfe
SHA512fc4348ee8bf6c8b94ccb354828a3f979e53b7589e41837e8dd8e0e66b180cf031b7a7421af7dbdb5255ca159b3da8ca0495b9edaa4fc1ecb817b6159e8e6a81d
-
Filesize
168KB
MD5f1b9f50ce79e26474163540e4c63f1fb
SHA148b7dc00bb6f56c089b1e835fa38072d8caef185
SHA2568ff999254b874903e67beb2a1854f816d56901813e6ae82ff3d2e57c4743b4f7
SHA512dd5f7d23148fca980229cb8775b42a2466debb7e715e269469ce97143d9645a2131e50e198236036d36704733e37542b5acded945ef4a68ec4ba36ea34548f5f
-
Filesize
168KB
MD5f1b9f50ce79e26474163540e4c63f1fb
SHA148b7dc00bb6f56c089b1e835fa38072d8caef185
SHA2568ff999254b874903e67beb2a1854f816d56901813e6ae82ff3d2e57c4743b4f7
SHA512dd5f7d23148fca980229cb8775b42a2466debb7e715e269469ce97143d9645a2131e50e198236036d36704733e37542b5acded945ef4a68ec4ba36ea34548f5f
-
Filesize
208KB
MD5066e3e935dd6ed85cd15e546af8a13e2
SHA14277e1c1b6090fd84a92d2db09a9860ff7fc1fc2
SHA2561383abfbddd9dd000fe491b28791f51f40425740379ae04a3cbd589589a57649
SHA5128ec3137bdc72d5faba012926d2ef00d0fe0460a211372cf25169f2b85c9633b8205d0a1f26a1997b33e2710c006dfbe47aa9815f3f17df3ca4462e1dd7ade6e1
-
Filesize
208KB
MD5066e3e935dd6ed85cd15e546af8a13e2
SHA14277e1c1b6090fd84a92d2db09a9860ff7fc1fc2
SHA2561383abfbddd9dd000fe491b28791f51f40425740379ae04a3cbd589589a57649
SHA5128ec3137bdc72d5faba012926d2ef00d0fe0460a211372cf25169f2b85c9633b8205d0a1f26a1997b33e2710c006dfbe47aa9815f3f17df3ca4462e1dd7ade6e1
-
Filesize
208KB
MD5066e3e935dd6ed85cd15e546af8a13e2
SHA14277e1c1b6090fd84a92d2db09a9860ff7fc1fc2
SHA2561383abfbddd9dd000fe491b28791f51f40425740379ae04a3cbd589589a57649
SHA5128ec3137bdc72d5faba012926d2ef00d0fe0460a211372cf25169f2b85c9633b8205d0a1f26a1997b33e2710c006dfbe47aa9815f3f17df3ca4462e1dd7ade6e1
-
Filesize
208KB
MD5066e3e935dd6ed85cd15e546af8a13e2
SHA14277e1c1b6090fd84a92d2db09a9860ff7fc1fc2
SHA2561383abfbddd9dd000fe491b28791f51f40425740379ae04a3cbd589589a57649
SHA5128ec3137bdc72d5faba012926d2ef00d0fe0460a211372cf25169f2b85c9633b8205d0a1f26a1997b33e2710c006dfbe47aa9815f3f17df3ca4462e1dd7ade6e1
-
Filesize
208KB
MD5066e3e935dd6ed85cd15e546af8a13e2
SHA14277e1c1b6090fd84a92d2db09a9860ff7fc1fc2
SHA2561383abfbddd9dd000fe491b28791f51f40425740379ae04a3cbd589589a57649
SHA5128ec3137bdc72d5faba012926d2ef00d0fe0460a211372cf25169f2b85c9633b8205d0a1f26a1997b33e2710c006dfbe47aa9815f3f17df3ca4462e1dd7ade6e1
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5