Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
107s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/05/2023, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe
Resource
win10-20230220-en
General
-
Target
6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe
-
Size
480KB
-
MD5
2568609f8e31351df6b404ca6757b1cf
-
SHA1
777f9ebd40e158689551777991bc25a82b0a95c6
-
SHA256
6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3
-
SHA512
1c3f521577e4c6a3d07725dd2dcbe245eeb8605c22aa087ebd1447bd28f9120429d7c95eff7023d4deb05d80cbae372c2e9aeac11c8655995da428b26958a9ec
-
SSDEEP
12288:OMrGy90saDqZWvHcuqaWH8OwllgrJbSSas:MyhZOXjK8O5rJb9as
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2911784.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2911784.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2911784.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2911784.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2911784.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2196 y2938172.exe 2444 k2911784.exe 3188 l9480696.exe 3876 m4912244.exe 2656 oneetx.exe 2584 oneetx.exe 3384 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4668 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2911784.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2911784.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2938172.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2938172.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3636 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2444 k2911784.exe 2444 k2911784.exe 3188 l9480696.exe 3188 l9480696.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2444 k2911784.exe Token: SeDebugPrivilege 3188 l9480696.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3876 m4912244.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2196 2040 6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe 66 PID 2040 wrote to memory of 2196 2040 6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe 66 PID 2040 wrote to memory of 2196 2040 6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe 66 PID 2196 wrote to memory of 2444 2196 y2938172.exe 67 PID 2196 wrote to memory of 2444 2196 y2938172.exe 67 PID 2196 wrote to memory of 2444 2196 y2938172.exe 67 PID 2196 wrote to memory of 3188 2196 y2938172.exe 68 PID 2196 wrote to memory of 3188 2196 y2938172.exe 68 PID 2196 wrote to memory of 3188 2196 y2938172.exe 68 PID 2040 wrote to memory of 3876 2040 6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe 70 PID 2040 wrote to memory of 3876 2040 6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe 70 PID 2040 wrote to memory of 3876 2040 6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe 70 PID 3876 wrote to memory of 2656 3876 m4912244.exe 71 PID 3876 wrote to memory of 2656 3876 m4912244.exe 71 PID 3876 wrote to memory of 2656 3876 m4912244.exe 71 PID 2656 wrote to memory of 3636 2656 oneetx.exe 72 PID 2656 wrote to memory of 3636 2656 oneetx.exe 72 PID 2656 wrote to memory of 3636 2656 oneetx.exe 72 PID 2656 wrote to memory of 3704 2656 oneetx.exe 74 PID 2656 wrote to memory of 3704 2656 oneetx.exe 74 PID 2656 wrote to memory of 3704 2656 oneetx.exe 74 PID 3704 wrote to memory of 4724 3704 cmd.exe 76 PID 3704 wrote to memory of 4724 3704 cmd.exe 76 PID 3704 wrote to memory of 4724 3704 cmd.exe 76 PID 3704 wrote to memory of 3516 3704 cmd.exe 77 PID 3704 wrote to memory of 3516 3704 cmd.exe 77 PID 3704 wrote to memory of 3516 3704 cmd.exe 77 PID 3704 wrote to memory of 3812 3704 cmd.exe 78 PID 3704 wrote to memory of 3812 3704 cmd.exe 78 PID 3704 wrote to memory of 3812 3704 cmd.exe 78 PID 3704 wrote to memory of 4036 3704 cmd.exe 79 PID 3704 wrote to memory of 4036 3704 cmd.exe 79 PID 3704 wrote to memory of 4036 3704 cmd.exe 79 PID 3704 wrote to memory of 2072 3704 cmd.exe 80 PID 3704 wrote to memory of 2072 3704 cmd.exe 80 PID 3704 wrote to memory of 2072 3704 cmd.exe 80 PID 3704 wrote to memory of 3748 3704 cmd.exe 81 PID 3704 wrote to memory of 3748 3704 cmd.exe 81 PID 3704 wrote to memory of 3748 3704 cmd.exe 81 PID 2656 wrote to memory of 4668 2656 oneetx.exe 83 PID 2656 wrote to memory of 4668 2656 oneetx.exe 83 PID 2656 wrote to memory of 4668 2656 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe"C:\Users\Admin\AppData\Local\Temp\6b616213dea815dab6500a8be63c4c862f182d515d85d51ee7523a3ffd5b96b3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2938172.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2938172.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2911784.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2911784.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9480696.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9480696.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4912244.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4912244.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2072
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3748
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2584
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD590d90c9d6b992478b828a05906dc2177
SHA103058fe87b7b7394f549591a3484b00740217c8f
SHA25687637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6
SHA5121d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd
-
Filesize
208KB
MD590d90c9d6b992478b828a05906dc2177
SHA103058fe87b7b7394f549591a3484b00740217c8f
SHA25687637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6
SHA5121d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd
-
Filesize
309KB
MD53c789867e65da3557ab0894fa401fae7
SHA1d3c7682c50d51b9e938afd3fb5df630597c9fa75
SHA2560c35598dd8ed727139b14692add2961f32d02b9a3e7f8c15cc7558396344a096
SHA512f2b768e8dd007801f5fbb84c2286dd86f5de9c08ddc048d5105e3b3ccdf095e2c79f6b37eac0d875617d5a529f6fd7f7588c207092a5dec56309e7702bf25941
-
Filesize
309KB
MD53c789867e65da3557ab0894fa401fae7
SHA1d3c7682c50d51b9e938afd3fb5df630597c9fa75
SHA2560c35598dd8ed727139b14692add2961f32d02b9a3e7f8c15cc7558396344a096
SHA512f2b768e8dd007801f5fbb84c2286dd86f5de9c08ddc048d5105e3b3ccdf095e2c79f6b37eac0d875617d5a529f6fd7f7588c207092a5dec56309e7702bf25941
-
Filesize
176KB
MD5d544d71b76120d1c73295ee58bfba430
SHA1caac9f8772a2615d94929508459e35e1aa875fd8
SHA256a64ba4bfcccd2fc6e8f34de87ee363ce6188e93fad520aa99d0c3f9279f78129
SHA51237b6bc9133792a401958c2a0586c16ddbbaad91af6a8b66238527f4c975312c838cb087c81c6ca2658a276a42a58746f2f5d0c57f37edc382dacf425aae16310
-
Filesize
176KB
MD5d544d71b76120d1c73295ee58bfba430
SHA1caac9f8772a2615d94929508459e35e1aa875fd8
SHA256a64ba4bfcccd2fc6e8f34de87ee363ce6188e93fad520aa99d0c3f9279f78129
SHA51237b6bc9133792a401958c2a0586c16ddbbaad91af6a8b66238527f4c975312c838cb087c81c6ca2658a276a42a58746f2f5d0c57f37edc382dacf425aae16310
-
Filesize
168KB
MD53879d75fbcf98730b731a3c55e279c93
SHA12f3667e42a378226a9b9c40aa2c4055fdf8f3de8
SHA25654ea3b6cfb1f664866644ab1c9fbe563a93a965f11e3bbdabf7a3ae1fd56d457
SHA5121d7ebfc2975c563c0e5f2bdbd301101e8e3e58f1452a8656939e207ab13853650b09bbd8ab96fafa2f69ead6886e37ea0dc8e7283cfa25812882015a64f686cb
-
Filesize
168KB
MD53879d75fbcf98730b731a3c55e279c93
SHA12f3667e42a378226a9b9c40aa2c4055fdf8f3de8
SHA25654ea3b6cfb1f664866644ab1c9fbe563a93a965f11e3bbdabf7a3ae1fd56d457
SHA5121d7ebfc2975c563c0e5f2bdbd301101e8e3e58f1452a8656939e207ab13853650b09bbd8ab96fafa2f69ead6886e37ea0dc8e7283cfa25812882015a64f686cb
-
Filesize
208KB
MD590d90c9d6b992478b828a05906dc2177
SHA103058fe87b7b7394f549591a3484b00740217c8f
SHA25687637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6
SHA5121d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd
-
Filesize
208KB
MD590d90c9d6b992478b828a05906dc2177
SHA103058fe87b7b7394f549591a3484b00740217c8f
SHA25687637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6
SHA5121d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd
-
Filesize
208KB
MD590d90c9d6b992478b828a05906dc2177
SHA103058fe87b7b7394f549591a3484b00740217c8f
SHA25687637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6
SHA5121d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd
-
Filesize
208KB
MD590d90c9d6b992478b828a05906dc2177
SHA103058fe87b7b7394f549591a3484b00740217c8f
SHA25687637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6
SHA5121d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd
-
Filesize
208KB
MD590d90c9d6b992478b828a05906dc2177
SHA103058fe87b7b7394f549591a3484b00740217c8f
SHA25687637d6b261fabe40e8f5e279db387d835dda8b280cc578b278df73d073a8af6
SHA5121d7fae985678768cf90b2ea12d1936fd70cb106595f43ecf7e78e9f1737dd2017779eb8d4d63a469ed313b07f0bde7740d568f00402c5d581b22b791ba983bcd
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53