Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    107s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/05/2023, 20:43

General

  • Target

    6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe

  • Size

    480KB

  • MD5

    2568609f8e31351df6b404ca6757b1cf

  • SHA1

    777f9ebd40e158689551777991bc25a82b0a95c6

  • SHA256

    6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3

  • SHA512

    1c3f521577e4c6a3d07725dd2dcbe245eeb8605c22aa087ebd1447bd28f9120429d7c95eff7023d4deb05d80cbae372c2e9aeac11c8655995da428b26958a9ec

  • SSDEEP

    12288:OMrGy90saDqZWvHcuqaWH8OwllgrJbSSas:MyhZOXjK8O5rJb9as

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe
    "C:\Users\Admin\AppData\Local\Temp\6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2938172.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2938172.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2911784.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2911784.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9480696.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9480696.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4912244.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4912244.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3876
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3636
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3704
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4724
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:3516
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:3812
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4036
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:2072
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3748
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4668
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:2584
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3384

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4912244.exe

                Filesize

                208KB

                MD5

                90d90c9d6b992478b828a05906dc2177

                SHA1

                03058fe87b7b7394f549591a3484b00740217c8f

                SHA256

                87637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6

                SHA512

                1d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4912244.exe

                Filesize

                208KB

                MD5

                90d90c9d6b992478b828a05906dc2177

                SHA1

                03058fe87b7b7394f549591a3484b00740217c8f

                SHA256

                87637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6

                SHA512

                1d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2938172.exe

                Filesize

                309KB

                MD5

                3c789867e65da3557ab0894fa401fae7

                SHA1

                d3c7682c50d51b9e938afd3fb5df630597c9fa75

                SHA256

                0c35598dd8ed727139b14692add2961f32d02b9a3e7f8c15cc7558396344a096

                SHA512

                f2b768e8dd007801f5fbb84c2286dd86f5de9c08ddc048d5105e3b3ccdf095e2c79f6b37eac0d875617d5a529f6fd7f7588c207092a5dec56309e7702bf25941

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2938172.exe

                Filesize

                309KB

                MD5

                3c789867e65da3557ab0894fa401fae7

                SHA1

                d3c7682c50d51b9e938afd3fb5df630597c9fa75

                SHA256

                0c35598dd8ed727139b14692add2961f32d02b9a3e7f8c15cc7558396344a096

                SHA512

                f2b768e8dd007801f5fbb84c2286dd86f5de9c08ddc048d5105e3b3ccdf095e2c79f6b37eac0d875617d5a529f6fd7f7588c207092a5dec56309e7702bf25941

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2911784.exe

                Filesize

                176KB

                MD5

                d544d71b76120d1c73295ee58bfba430

                SHA1

                caac9f8772a2615d94929508459e35e1aa875fd8

                SHA256

                a64ba4bfcccd2fc6e8f34de87ee363ce6188e93fad520aa99d0c3f9279f78129

                SHA512

                37b6bc9133792a401958c2a0586c16ddbbaad91af6a8b66238527f4c975312c838cb087c81c6ca2658a276a42a58746f2f5d0c57f37edc382dacf425aae16310

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2911784.exe

                Filesize

                176KB

                MD5

                d544d71b76120d1c73295ee58bfba430

                SHA1

                caac9f8772a2615d94929508459e35e1aa875fd8

                SHA256

                a64ba4bfcccd2fc6e8f34de87ee363ce6188e93fad520aa99d0c3f9279f78129

                SHA512

                37b6bc9133792a401958c2a0586c16ddbbaad91af6a8b66238527f4c975312c838cb087c81c6ca2658a276a42a58746f2f5d0c57f37edc382dacf425aae16310

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9480696.exe

                Filesize

                168KB

                MD5

                3879d75fbcf98730b731a3c55e279c93

                SHA1

                2f3667e42a378226a9b9c40aa2c4055fdf8f3de8

                SHA256

                54ea3b6cfb1f664866644ab1c9fbe563a93a965f11e3bbdabf7a3ae1fd56d457

                SHA512

                1d7ebfc2975c563c0e5f2bdbd301101e8e3e58f1452a8656939e207ab13853650b09bbd8ab96fafa2f69ead6886e37ea0dc8e7283cfa25812882015a64f686cb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9480696.exe

                Filesize

                168KB

                MD5

                3879d75fbcf98730b731a3c55e279c93

                SHA1

                2f3667e42a378226a9b9c40aa2c4055fdf8f3de8

                SHA256

                54ea3b6cfb1f664866644ab1c9fbe563a93a965f11e3bbdabf7a3ae1fd56d457

                SHA512

                1d7ebfc2975c563c0e5f2bdbd301101e8e3e58f1452a8656939e207ab13853650b09bbd8ab96fafa2f69ead6886e37ea0dc8e7283cfa25812882015a64f686cb

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                208KB

                MD5

                90d90c9d6b992478b828a05906dc2177

                SHA1

                03058fe87b7b7394f549591a3484b00740217c8f

                SHA256

                87637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6

                SHA512

                1d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                208KB

                MD5

                90d90c9d6b992478b828a05906dc2177

                SHA1

                03058fe87b7b7394f549591a3484b00740217c8f

                SHA256

                87637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6

                SHA512

                1d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                208KB

                MD5

                90d90c9d6b992478b828a05906dc2177

                SHA1

                03058fe87b7b7394f549591a3484b00740217c8f

                SHA256

                87637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6

                SHA512

                1d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                208KB

                MD5

                90d90c9d6b992478b828a05906dc2177

                SHA1

                03058fe87b7b7394f549591a3484b00740217c8f

                SHA256

                87637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6

                SHA512

                1d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                208KB

                MD5

                90d90c9d6b992478b828a05906dc2177

                SHA1

                03058fe87b7b7394f549591a3484b00740217c8f

                SHA256

                87637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6

                SHA512

                1d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • memory/2444-148-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-150-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-158-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-160-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-162-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-164-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-166-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-168-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-169-0x0000000002430000-0x0000000002440000-memory.dmp

                Filesize

                64KB

              • memory/2444-170-0x0000000002430000-0x0000000002440000-memory.dmp

                Filesize

                64KB

              • memory/2444-171-0x0000000002430000-0x0000000002440000-memory.dmp

                Filesize

                64KB

              • memory/2444-154-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-152-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-135-0x0000000002430000-0x0000000002440000-memory.dmp

                Filesize

                64KB

              • memory/2444-136-0x0000000002300000-0x000000000231A000-memory.dmp

                Filesize

                104KB

              • memory/2444-138-0x0000000004A40000-0x0000000004F3E000-memory.dmp

                Filesize

                5.0MB

              • memory/2444-137-0x0000000002430000-0x0000000002440000-memory.dmp

                Filesize

                64KB

              • memory/2444-139-0x0000000002430000-0x0000000002440000-memory.dmp

                Filesize

                64KB

              • memory/2444-140-0x00000000023B0000-0x00000000023C8000-memory.dmp

                Filesize

                96KB

              • memory/2444-141-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-142-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-144-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-146-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/2444-156-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3188-184-0x0000000005BF0000-0x0000000005C66000-memory.dmp

                Filesize

                472KB

              • memory/3188-180-0x0000000005770000-0x0000000005782000-memory.dmp

                Filesize

                72KB

              • memory/3188-189-0x0000000009000000-0x000000000952C000-memory.dmp

                Filesize

                5.2MB

              • memory/3188-190-0x0000000006BA0000-0x0000000006BF0000-memory.dmp

                Filesize

                320KB

              • memory/3188-186-0x0000000005C70000-0x0000000005CD6000-memory.dmp

                Filesize

                408KB

              • memory/3188-185-0x0000000006370000-0x0000000006402000-memory.dmp

                Filesize

                584KB

              • memory/3188-188-0x0000000007280000-0x0000000007442000-memory.dmp

                Filesize

                1.8MB

              • memory/3188-182-0x0000000005970000-0x00000000059BB000-memory.dmp

                Filesize

                300KB

              • memory/3188-187-0x0000000002FD0000-0x0000000002FE0000-memory.dmp

                Filesize

                64KB

              • memory/3188-181-0x00000000057D0000-0x000000000580E000-memory.dmp

                Filesize

                248KB

              • memory/3188-183-0x0000000002FD0000-0x0000000002FE0000-memory.dmp

                Filesize

                64KB

              • memory/3188-179-0x0000000005860000-0x000000000596A000-memory.dmp

                Filesize

                1.0MB

              • memory/3188-178-0x0000000005D60000-0x0000000006366000-memory.dmp

                Filesize

                6.0MB

              • memory/3188-177-0x0000000002FC0000-0x0000000002FC6000-memory.dmp

                Filesize

                24KB

              • memory/3188-176-0x0000000000E60000-0x0000000000E8E000-memory.dmp

                Filesize

                184KB