Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2023, 23:48

General

  • Target

    fad3e161d6e82a52158038a282d282ee6f6646c0cf381c1be15b2b06cd2bbb09.exe

  • Size

    479KB

  • MD5

    ec7d260805312f26cefc91811baef48d

  • SHA1

    9676ee1054e3bc8706be1ab5c69e3a47daaa259f

  • SHA256

    fad3e161d6e82a52158038a282d282ee6f6646c0cf381c1be15b2b06cd2bbb09

  • SHA512

    2d8a10c3e1e8ef2bbf8c0a52318c18992515049df0099114bfd221f2e2862792a534e505eebec3a1f4f31b13366d5a1cfb887b6e646b8abb57002d20b28855c6

  • SSDEEP

    12288:XMrqy90uBua5GJGt5smezYUcmn6URoelGzVfZi:9yoaUJi500UcY6SocGzVfZi

Malware Config

Extracted

Family

redline

Botnet

ditro

C2

217.196.96.101:4132

Attributes
  • auth_value

    8f24ed370a9b24aa28d3d634ea57912e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fad3e161d6e82a52158038a282d282ee6f6646c0cf381c1be15b2b06cd2bbb09.exe
    "C:\Users\Admin\AppData\Local\Temp\fad3e161d6e82a52158038a282d282ee6f6646c0cf381c1be15b2b06cd2bbb09.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6778717.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6778717.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0782213.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0782213.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0026575.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0026575.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0696833.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0696833.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3288
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3736
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2452
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4604
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:3912
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:2388
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2400
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:5108
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:5112
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4420
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3732
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4932

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0696833.exe

                Filesize

                209KB

                MD5

                b08be322da02f16c47891b0df72d6130

                SHA1

                15d66f53565a239026575e42f41fc724ee9be2fb

                SHA256

                05b5790c723086a17be1c2cceb55dcd527774a6e65ded346b5cf6eaf56304bdf

                SHA512

                470de39869532fbcd56d53425f051f008a4a006bba8b5479358231446dcd0726f66c9084397e7bd6a7d7357e43c9be296a9efd08738e2327ea6e770bbb2703e1

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0696833.exe

                Filesize

                209KB

                MD5

                b08be322da02f16c47891b0df72d6130

                SHA1

                15d66f53565a239026575e42f41fc724ee9be2fb

                SHA256

                05b5790c723086a17be1c2cceb55dcd527774a6e65ded346b5cf6eaf56304bdf

                SHA512

                470de39869532fbcd56d53425f051f008a4a006bba8b5479358231446dcd0726f66c9084397e7bd6a7d7357e43c9be296a9efd08738e2327ea6e770bbb2703e1

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6778717.exe

                Filesize

                307KB

                MD5

                fab8b7f1e8dfa53652a48bcb0ec8c79a

                SHA1

                bb071a491d3384454bc875950ac428e4674b831a

                SHA256

                2bcd9375e94de52629efdd7b9dc93e6ab7c423c7aa558d48482023dbb7c93902

                SHA512

                105dbb6f825cab20b2eb5654e601a174a5b66dd2f6012cad92db8141e57c50b8c3d463c1778e147fef429edc7b653baecad26ae6e82f7381ed60e24ac6fc90fa

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6778717.exe

                Filesize

                307KB

                MD5

                fab8b7f1e8dfa53652a48bcb0ec8c79a

                SHA1

                bb071a491d3384454bc875950ac428e4674b831a

                SHA256

                2bcd9375e94de52629efdd7b9dc93e6ab7c423c7aa558d48482023dbb7c93902

                SHA512

                105dbb6f825cab20b2eb5654e601a174a5b66dd2f6012cad92db8141e57c50b8c3d463c1778e147fef429edc7b653baecad26ae6e82f7381ed60e24ac6fc90fa

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0782213.exe

                Filesize

                168KB

                MD5

                b9307f5446459233f25c227790f33e08

                SHA1

                0c94caa052db0e908fe8317fdd92216a7edeb663

                SHA256

                902398d7d6ebee96da419fb8356fd8ecaea4c86f741df441fdfe329069fd81c4

                SHA512

                171883001f899f37dd9e6be711f07440b0c07f7de593022d3a692c6e3aef377c6c085790f27eb856a9b80e008aa2ba03d16badeb98ab6cfc1cbc7ac159f45b63

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0782213.exe

                Filesize

                168KB

                MD5

                b9307f5446459233f25c227790f33e08

                SHA1

                0c94caa052db0e908fe8317fdd92216a7edeb663

                SHA256

                902398d7d6ebee96da419fb8356fd8ecaea4c86f741df441fdfe329069fd81c4

                SHA512

                171883001f899f37dd9e6be711f07440b0c07f7de593022d3a692c6e3aef377c6c085790f27eb856a9b80e008aa2ba03d16badeb98ab6cfc1cbc7ac159f45b63

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0026575.exe

                Filesize

                178KB

                MD5

                a571f6fcc29a84af40d899f36beab44f

                SHA1

                ad0e0006c6f92a48a2856833d190ba15adcf9510

                SHA256

                be5d468264b9b0b5cc80c3cf155c98bbb686f11d94e6cc0f7b060d4861ecf450

                SHA512

                be799d2a82c5253cda6b6d45c89ec71cc07afc8d86ac8c2fff054631b62ac8bde9bbf1ba8f21996af5b3c81588f43b6ee7e5b0320ba250cfb46a416acc4032f2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0026575.exe

                Filesize

                178KB

                MD5

                a571f6fcc29a84af40d899f36beab44f

                SHA1

                ad0e0006c6f92a48a2856833d190ba15adcf9510

                SHA256

                be5d468264b9b0b5cc80c3cf155c98bbb686f11d94e6cc0f7b060d4861ecf450

                SHA512

                be799d2a82c5253cda6b6d45c89ec71cc07afc8d86ac8c2fff054631b62ac8bde9bbf1ba8f21996af5b3c81588f43b6ee7e5b0320ba250cfb46a416acc4032f2

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                b08be322da02f16c47891b0df72d6130

                SHA1

                15d66f53565a239026575e42f41fc724ee9be2fb

                SHA256

                05b5790c723086a17be1c2cceb55dcd527774a6e65ded346b5cf6eaf56304bdf

                SHA512

                470de39869532fbcd56d53425f051f008a4a006bba8b5479358231446dcd0726f66c9084397e7bd6a7d7357e43c9be296a9efd08738e2327ea6e770bbb2703e1

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                b08be322da02f16c47891b0df72d6130

                SHA1

                15d66f53565a239026575e42f41fc724ee9be2fb

                SHA256

                05b5790c723086a17be1c2cceb55dcd527774a6e65ded346b5cf6eaf56304bdf

                SHA512

                470de39869532fbcd56d53425f051f008a4a006bba8b5479358231446dcd0726f66c9084397e7bd6a7d7357e43c9be296a9efd08738e2327ea6e770bbb2703e1

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                b08be322da02f16c47891b0df72d6130

                SHA1

                15d66f53565a239026575e42f41fc724ee9be2fb

                SHA256

                05b5790c723086a17be1c2cceb55dcd527774a6e65ded346b5cf6eaf56304bdf

                SHA512

                470de39869532fbcd56d53425f051f008a4a006bba8b5479358231446dcd0726f66c9084397e7bd6a7d7357e43c9be296a9efd08738e2327ea6e770bbb2703e1

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                b08be322da02f16c47891b0df72d6130

                SHA1

                15d66f53565a239026575e42f41fc724ee9be2fb

                SHA256

                05b5790c723086a17be1c2cceb55dcd527774a6e65ded346b5cf6eaf56304bdf

                SHA512

                470de39869532fbcd56d53425f051f008a4a006bba8b5479358231446dcd0726f66c9084397e7bd6a7d7357e43c9be296a9efd08738e2327ea6e770bbb2703e1

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                b08be322da02f16c47891b0df72d6130

                SHA1

                15d66f53565a239026575e42f41fc724ee9be2fb

                SHA256

                05b5790c723086a17be1c2cceb55dcd527774a6e65ded346b5cf6eaf56304bdf

                SHA512

                470de39869532fbcd56d53425f051f008a4a006bba8b5479358231446dcd0726f66c9084397e7bd6a7d7357e43c9be296a9efd08738e2327ea6e770bbb2703e1

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/232-194-0x0000000004A80000-0x0000000004A90000-memory.dmp

                Filesize

                64KB

              • memory/232-188-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-195-0x0000000004A80000-0x0000000004A90000-memory.dmp

                Filesize

                64KB

              • memory/232-165-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-166-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-168-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-170-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-172-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-174-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-176-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-178-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-180-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-182-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-184-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-186-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-193-0x0000000004A80000-0x0000000004A90000-memory.dmp

                Filesize

                64KB

              • memory/232-190-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/232-192-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1164-154-0x000000000A3E0000-0x000000000A472000-memory.dmp

                Filesize

                584KB

              • memory/1164-148-0x000000000A4A0000-0x000000000AAB8000-memory.dmp

                Filesize

                6.1MB

              • memory/1164-159-0x000000000BFF0000-0x000000000C51C000-memory.dmp

                Filesize

                5.2MB

              • memory/1164-157-0x000000000B010000-0x000000000B060000-memory.dmp

                Filesize

                320KB

              • memory/1164-156-0x000000000ABC0000-0x000000000AC26000-memory.dmp

                Filesize

                408KB

              • memory/1164-155-0x000000000B070000-0x000000000B614000-memory.dmp

                Filesize

                5.6MB

              • memory/1164-152-0x0000000004980000-0x0000000004990000-memory.dmp

                Filesize

                64KB

              • memory/1164-160-0x0000000004980000-0x0000000004990000-memory.dmp

                Filesize

                64KB

              • memory/1164-158-0x000000000B8F0000-0x000000000BAB2000-memory.dmp

                Filesize

                1.8MB

              • memory/1164-151-0x0000000009FB0000-0x0000000009FEC000-memory.dmp

                Filesize

                240KB

              • memory/1164-150-0x0000000009F50000-0x0000000009F62000-memory.dmp

                Filesize

                72KB

              • memory/1164-149-0x000000000A020000-0x000000000A12A000-memory.dmp

                Filesize

                1.0MB

              • memory/1164-153-0x000000000A2C0000-0x000000000A336000-memory.dmp

                Filesize

                472KB

              • memory/1164-147-0x00000000000A0000-0x00000000000D0000-memory.dmp

                Filesize

                192KB