Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe
Resource
win10v2004-20230220-en
General
-
Target
992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe
-
Size
479KB
-
MD5
23adc67e3feef2275360ad317ebf0e6d
-
SHA1
38f536434b99d19c0f117546a2479ef090e4198f
-
SHA256
992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50
-
SHA512
7b8fbd0b4f1fcb4790ae09344c431fbb75516e48f556225570b3ce7ac8c8cc967cb688fdf3ce21f656f56282e4aaa0727266742141ed277b749502482af0ba32
-
SSDEEP
12288:XMrMy900fhqOX7PUgmg/DoOob702Ax9UPss:ry/f1X7PUpgrop0p9g
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h1444141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1444141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1444141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1444141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1444141.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1444141.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation i0682926.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 5108 x8430102.exe 5024 g2412125.exe 4732 h1444141.exe 1740 i0682926.exe 4820 oneetx.exe 4668 oneetx.exe 4484 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3812 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h1444141.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h1444141.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8430102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8430102.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5024 g2412125.exe 5024 g2412125.exe 4732 h1444141.exe 4732 h1444141.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5024 g2412125.exe Token: SeDebugPrivilege 4732 h1444141.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 i0682926.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3524 wrote to memory of 5108 3524 992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe 84 PID 3524 wrote to memory of 5108 3524 992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe 84 PID 3524 wrote to memory of 5108 3524 992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe 84 PID 5108 wrote to memory of 5024 5108 x8430102.exe 85 PID 5108 wrote to memory of 5024 5108 x8430102.exe 85 PID 5108 wrote to memory of 5024 5108 x8430102.exe 85 PID 5108 wrote to memory of 4732 5108 x8430102.exe 92 PID 5108 wrote to memory of 4732 5108 x8430102.exe 92 PID 5108 wrote to memory of 4732 5108 x8430102.exe 92 PID 3524 wrote to memory of 1740 3524 992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe 93 PID 3524 wrote to memory of 1740 3524 992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe 93 PID 3524 wrote to memory of 1740 3524 992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe 93 PID 1740 wrote to memory of 4820 1740 i0682926.exe 94 PID 1740 wrote to memory of 4820 1740 i0682926.exe 94 PID 1740 wrote to memory of 4820 1740 i0682926.exe 94 PID 4820 wrote to memory of 2480 4820 oneetx.exe 95 PID 4820 wrote to memory of 2480 4820 oneetx.exe 95 PID 4820 wrote to memory of 2480 4820 oneetx.exe 95 PID 4820 wrote to memory of 4664 4820 oneetx.exe 97 PID 4820 wrote to memory of 4664 4820 oneetx.exe 97 PID 4820 wrote to memory of 4664 4820 oneetx.exe 97 PID 4664 wrote to memory of 4372 4664 cmd.exe 99 PID 4664 wrote to memory of 4372 4664 cmd.exe 99 PID 4664 wrote to memory of 4372 4664 cmd.exe 99 PID 4664 wrote to memory of 2908 4664 cmd.exe 100 PID 4664 wrote to memory of 2908 4664 cmd.exe 100 PID 4664 wrote to memory of 2908 4664 cmd.exe 100 PID 4664 wrote to memory of 4016 4664 cmd.exe 101 PID 4664 wrote to memory of 4016 4664 cmd.exe 101 PID 4664 wrote to memory of 4016 4664 cmd.exe 101 PID 4664 wrote to memory of 984 4664 cmd.exe 102 PID 4664 wrote to memory of 984 4664 cmd.exe 102 PID 4664 wrote to memory of 984 4664 cmd.exe 102 PID 4664 wrote to memory of 4500 4664 cmd.exe 103 PID 4664 wrote to memory of 4500 4664 cmd.exe 103 PID 4664 wrote to memory of 4500 4664 cmd.exe 103 PID 4664 wrote to memory of 1656 4664 cmd.exe 104 PID 4664 wrote to memory of 1656 4664 cmd.exe 104 PID 4664 wrote to memory of 1656 4664 cmd.exe 104 PID 4820 wrote to memory of 3812 4820 oneetx.exe 107 PID 4820 wrote to memory of 3812 4820 oneetx.exe 107 PID 4820 wrote to memory of 3812 4820 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe"C:\Users\Admin\AppData\Local\Temp\992ac788e351a2f48f75378c9784b4a6d482234ac10ebe806f34076ba58b4c50.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8430102.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8430102.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2412125.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2412125.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1444141.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1444141.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0682926.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0682926.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2908
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4500
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1656
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4668
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD55c21f308a4fdafa202598234a29f15ed
SHA1281f42af831f646bd18c7b691b7aa8f31fbd36d2
SHA256d6d12c4c8ec3e1a94b78381d13294ce268890965d1f241b114833a8736599ed9
SHA5125b6e78004f1db97eb20fb90cc0d629d89e5f484aef78b88b006cecb326fca09250c63f5ac26a082d8208a7dc97b76d0572b78055d9019367c8489ba8eb094efd
-
Filesize
210KB
MD55c21f308a4fdafa202598234a29f15ed
SHA1281f42af831f646bd18c7b691b7aa8f31fbd36d2
SHA256d6d12c4c8ec3e1a94b78381d13294ce268890965d1f241b114833a8736599ed9
SHA5125b6e78004f1db97eb20fb90cc0d629d89e5f484aef78b88b006cecb326fca09250c63f5ac26a082d8208a7dc97b76d0572b78055d9019367c8489ba8eb094efd
-
Filesize
307KB
MD552133d3ed56840a8071ae68811f664f7
SHA1293b1a25ab3e29aa730f4f31f3b2ea10f22e52e3
SHA2564d885961b44b19b22134ca930126faa2cbb45cd9ce6d90ace4799dac2d5bf9c3
SHA5128f8f592df33230dc4b7645809ddb20a076024f0219fd7db1c0e2175260873572d969b0eff95ff7378ec806427b23e857cc93ec406af25e74c3e00a33485d9d9e
-
Filesize
307KB
MD552133d3ed56840a8071ae68811f664f7
SHA1293b1a25ab3e29aa730f4f31f3b2ea10f22e52e3
SHA2564d885961b44b19b22134ca930126faa2cbb45cd9ce6d90ace4799dac2d5bf9c3
SHA5128f8f592df33230dc4b7645809ddb20a076024f0219fd7db1c0e2175260873572d969b0eff95ff7378ec806427b23e857cc93ec406af25e74c3e00a33485d9d9e
-
Filesize
168KB
MD5870bb708357b767b38eabbb6cba1503c
SHA1984c3ffcb839e5f695794d334273af6f42b6d979
SHA25694d0a9d03ec755ddc0ad6d4aa1530ea22ead11af8242ba42c64334877f682a2c
SHA51205297720ba949964980f95a3e0df1fcac0b7fe1c689582429984eee19a977eaa8bf312d565b5618ee07ef0db8afe37b17b09f43756b9242903dbb5bbdb37e76a
-
Filesize
168KB
MD5870bb708357b767b38eabbb6cba1503c
SHA1984c3ffcb839e5f695794d334273af6f42b6d979
SHA25694d0a9d03ec755ddc0ad6d4aa1530ea22ead11af8242ba42c64334877f682a2c
SHA51205297720ba949964980f95a3e0df1fcac0b7fe1c689582429984eee19a977eaa8bf312d565b5618ee07ef0db8afe37b17b09f43756b9242903dbb5bbdb37e76a
-
Filesize
180KB
MD5f7a1a798a1f942db27a790e2bf122390
SHA16c4cf2a06ff7415fce19804ca0558dd151fcda8a
SHA25612b4a54f8c0327af10fe7231c808939d9e5a895abc0fedf9a8eb5f68f96771df
SHA51281bcb5f8fdc9e8c36b248f199c7a9794d6c867d374340291eb891a789429ced65e31d4e5b5a8a3d0dba4bb5ed891a4ffb5388e84f4d803c04496cc905f1f092b
-
Filesize
180KB
MD5f7a1a798a1f942db27a790e2bf122390
SHA16c4cf2a06ff7415fce19804ca0558dd151fcda8a
SHA25612b4a54f8c0327af10fe7231c808939d9e5a895abc0fedf9a8eb5f68f96771df
SHA51281bcb5f8fdc9e8c36b248f199c7a9794d6c867d374340291eb891a789429ced65e31d4e5b5a8a3d0dba4bb5ed891a4ffb5388e84f4d803c04496cc905f1f092b
-
Filesize
210KB
MD55c21f308a4fdafa202598234a29f15ed
SHA1281f42af831f646bd18c7b691b7aa8f31fbd36d2
SHA256d6d12c4c8ec3e1a94b78381d13294ce268890965d1f241b114833a8736599ed9
SHA5125b6e78004f1db97eb20fb90cc0d629d89e5f484aef78b88b006cecb326fca09250c63f5ac26a082d8208a7dc97b76d0572b78055d9019367c8489ba8eb094efd
-
Filesize
210KB
MD55c21f308a4fdafa202598234a29f15ed
SHA1281f42af831f646bd18c7b691b7aa8f31fbd36d2
SHA256d6d12c4c8ec3e1a94b78381d13294ce268890965d1f241b114833a8736599ed9
SHA5125b6e78004f1db97eb20fb90cc0d629d89e5f484aef78b88b006cecb326fca09250c63f5ac26a082d8208a7dc97b76d0572b78055d9019367c8489ba8eb094efd
-
Filesize
210KB
MD55c21f308a4fdafa202598234a29f15ed
SHA1281f42af831f646bd18c7b691b7aa8f31fbd36d2
SHA256d6d12c4c8ec3e1a94b78381d13294ce268890965d1f241b114833a8736599ed9
SHA5125b6e78004f1db97eb20fb90cc0d629d89e5f484aef78b88b006cecb326fca09250c63f5ac26a082d8208a7dc97b76d0572b78055d9019367c8489ba8eb094efd
-
Filesize
210KB
MD55c21f308a4fdafa202598234a29f15ed
SHA1281f42af831f646bd18c7b691b7aa8f31fbd36d2
SHA256d6d12c4c8ec3e1a94b78381d13294ce268890965d1f241b114833a8736599ed9
SHA5125b6e78004f1db97eb20fb90cc0d629d89e5f484aef78b88b006cecb326fca09250c63f5ac26a082d8208a7dc97b76d0572b78055d9019367c8489ba8eb094efd
-
Filesize
210KB
MD55c21f308a4fdafa202598234a29f15ed
SHA1281f42af831f646bd18c7b691b7aa8f31fbd36d2
SHA256d6d12c4c8ec3e1a94b78381d13294ce268890965d1f241b114833a8736599ed9
SHA5125b6e78004f1db97eb20fb90cc0d629d89e5f484aef78b88b006cecb326fca09250c63f5ac26a082d8208a7dc97b76d0572b78055d9019367c8489ba8eb094efd
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5