Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
08/05/2023, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe
Resource
win10-20230220-en
General
-
Target
ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe
-
Size
479KB
-
MD5
acd593c59f0853ca0f2c5f61ec4100ff
-
SHA1
df9475b4307fecc62218b1a107c6ff35e4f497ab
-
SHA256
ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd
-
SHA512
bfce640b4c28febd6c859e3653298bf4db72f05f3f2431c9e4ae69e226e3cfaca9c77a5d239576363a2254397a66081c97f85b736f2ac2141b12fb45af45431a
-
SSDEEP
12288:nMr9y90PO5CFlJpdYP5c1u31kT+NwzaoVf3PnCPNfS9H1:OyVCFzQXKTawzaIPCtS9H1
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2955377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2955377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2955377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2955377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2955377.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2372 y0966328.exe 2536 k2955377.exe 3916 l3632448.exe 3808 m9438559.exe 4748 oneetx.exe 4364 oneetx.exe 4360 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4392 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2955377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2955377.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0966328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0966328.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2536 k2955377.exe 2536 k2955377.exe 3916 l3632448.exe 3916 l3632448.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2536 k2955377.exe Token: SeDebugPrivilege 3916 l3632448.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3808 m9438559.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2372 2140 ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe 66 PID 2140 wrote to memory of 2372 2140 ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe 66 PID 2140 wrote to memory of 2372 2140 ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe 66 PID 2372 wrote to memory of 2536 2372 y0966328.exe 67 PID 2372 wrote to memory of 2536 2372 y0966328.exe 67 PID 2372 wrote to memory of 2536 2372 y0966328.exe 67 PID 2372 wrote to memory of 3916 2372 y0966328.exe 68 PID 2372 wrote to memory of 3916 2372 y0966328.exe 68 PID 2372 wrote to memory of 3916 2372 y0966328.exe 68 PID 2140 wrote to memory of 3808 2140 ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe 70 PID 2140 wrote to memory of 3808 2140 ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe 70 PID 2140 wrote to memory of 3808 2140 ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe 70 PID 3808 wrote to memory of 4748 3808 m9438559.exe 71 PID 3808 wrote to memory of 4748 3808 m9438559.exe 71 PID 3808 wrote to memory of 4748 3808 m9438559.exe 71 PID 4748 wrote to memory of 3480 4748 oneetx.exe 72 PID 4748 wrote to memory of 3480 4748 oneetx.exe 72 PID 4748 wrote to memory of 3480 4748 oneetx.exe 72 PID 4748 wrote to memory of 3708 4748 oneetx.exe 74 PID 4748 wrote to memory of 3708 4748 oneetx.exe 74 PID 4748 wrote to memory of 3708 4748 oneetx.exe 74 PID 3708 wrote to memory of 404 3708 cmd.exe 76 PID 3708 wrote to memory of 404 3708 cmd.exe 76 PID 3708 wrote to memory of 404 3708 cmd.exe 76 PID 3708 wrote to memory of 4784 3708 cmd.exe 77 PID 3708 wrote to memory of 4784 3708 cmd.exe 77 PID 3708 wrote to memory of 4784 3708 cmd.exe 77 PID 3708 wrote to memory of 1620 3708 cmd.exe 78 PID 3708 wrote to memory of 1620 3708 cmd.exe 78 PID 3708 wrote to memory of 1620 3708 cmd.exe 78 PID 3708 wrote to memory of 4296 3708 cmd.exe 79 PID 3708 wrote to memory of 4296 3708 cmd.exe 79 PID 3708 wrote to memory of 4296 3708 cmd.exe 79 PID 3708 wrote to memory of 3316 3708 cmd.exe 80 PID 3708 wrote to memory of 3316 3708 cmd.exe 80 PID 3708 wrote to memory of 3316 3708 cmd.exe 80 PID 3708 wrote to memory of 4716 3708 cmd.exe 81 PID 3708 wrote to memory of 4716 3708 cmd.exe 81 PID 3708 wrote to memory of 4716 3708 cmd.exe 81 PID 4748 wrote to memory of 4392 4748 oneetx.exe 82 PID 4748 wrote to memory of 4392 4748 oneetx.exe 82 PID 4748 wrote to memory of 4392 4748 oneetx.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe"C:\Users\Admin\AppData\Local\Temp\ed662f9cd920e2dd3183fba80198ec1f050187deb00e43f7059ab9214b6c7dbd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0966328.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0966328.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2955377.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2955377.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3632448.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3632448.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9438559.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9438559.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:404
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4784
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4716
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4364
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD502c282f29e95d17f69a1edabb3be4dfd
SHA11f5452d7157f2bb583db5ac7a867e8269a7985f9
SHA2564a36f9735596ab37f38a09c7dcc6db64855587cdf5b6a53316c6e0bd0de633cf
SHA5120c4ee9720def7dac50487133eed851fcfcc4b1641ebfe6830d622047a54e14ab3e249b7d8b68746173e89f4b48f40cb6b5b54c2c935df5feb48d5c9ae1c4eafc
-
Filesize
210KB
MD502c282f29e95d17f69a1edabb3be4dfd
SHA11f5452d7157f2bb583db5ac7a867e8269a7985f9
SHA2564a36f9735596ab37f38a09c7dcc6db64855587cdf5b6a53316c6e0bd0de633cf
SHA5120c4ee9720def7dac50487133eed851fcfcc4b1641ebfe6830d622047a54e14ab3e249b7d8b68746173e89f4b48f40cb6b5b54c2c935df5feb48d5c9ae1c4eafc
-
Filesize
307KB
MD5edbecbbc6add948127bdf9a46a85a0cc
SHA1aae77adc4c79e1f9380c0c87689d64cc0771b6a8
SHA25669a78b825f6823c68283fc868ff57d8329244105f89348416a9254dd6cb44c05
SHA512298b542d42a05fedf8b6acc6e39a2aaaadbf6d64ef356d326fe721b314ba660dfba5a873fee6f2d21331ace0fd1464537441037507d9942bde9b37508a9de3dd
-
Filesize
307KB
MD5edbecbbc6add948127bdf9a46a85a0cc
SHA1aae77adc4c79e1f9380c0c87689d64cc0771b6a8
SHA25669a78b825f6823c68283fc868ff57d8329244105f89348416a9254dd6cb44c05
SHA512298b542d42a05fedf8b6acc6e39a2aaaadbf6d64ef356d326fe721b314ba660dfba5a873fee6f2d21331ace0fd1464537441037507d9942bde9b37508a9de3dd
-
Filesize
180KB
MD50744a2ca2c81512d547d71e07e16ad7a
SHA12bd9b3fde9402eac50708fa18b155b322adef852
SHA256f60501fc40e295a2d9bb5c03f50b948db22243a72dbe50fa1f71241d2ddc5f60
SHA5129b6dd1c7c465fdf50461775a2cf21f733b9dc304c7afd94e754139bc5e00706965037329b4d84659cb36c76df87fa642ba60bc1c3e7b63001cc4a0fda286bcd7
-
Filesize
180KB
MD50744a2ca2c81512d547d71e07e16ad7a
SHA12bd9b3fde9402eac50708fa18b155b322adef852
SHA256f60501fc40e295a2d9bb5c03f50b948db22243a72dbe50fa1f71241d2ddc5f60
SHA5129b6dd1c7c465fdf50461775a2cf21f733b9dc304c7afd94e754139bc5e00706965037329b4d84659cb36c76df87fa642ba60bc1c3e7b63001cc4a0fda286bcd7
-
Filesize
168KB
MD59acd4b5c6c8bbab09b43859e92b71570
SHA1d62638f88d3d57401e6fe6f8f195f1f77e5a4b3d
SHA25691c4c6127117d4f0743eebc34f59ad05bac1c46811dc55337bd21835ac6fd63d
SHA5120398bd1a34328ddbe4b53db20847d1d8b58708dfc5672e7ba7f27621907fe76354299b6e616c738d447c0d7319de765b73aa7f95a71b2d3f2f227af09647d11d
-
Filesize
168KB
MD59acd4b5c6c8bbab09b43859e92b71570
SHA1d62638f88d3d57401e6fe6f8f195f1f77e5a4b3d
SHA25691c4c6127117d4f0743eebc34f59ad05bac1c46811dc55337bd21835ac6fd63d
SHA5120398bd1a34328ddbe4b53db20847d1d8b58708dfc5672e7ba7f27621907fe76354299b6e616c738d447c0d7319de765b73aa7f95a71b2d3f2f227af09647d11d
-
Filesize
210KB
MD502c282f29e95d17f69a1edabb3be4dfd
SHA11f5452d7157f2bb583db5ac7a867e8269a7985f9
SHA2564a36f9735596ab37f38a09c7dcc6db64855587cdf5b6a53316c6e0bd0de633cf
SHA5120c4ee9720def7dac50487133eed851fcfcc4b1641ebfe6830d622047a54e14ab3e249b7d8b68746173e89f4b48f40cb6b5b54c2c935df5feb48d5c9ae1c4eafc
-
Filesize
210KB
MD502c282f29e95d17f69a1edabb3be4dfd
SHA11f5452d7157f2bb583db5ac7a867e8269a7985f9
SHA2564a36f9735596ab37f38a09c7dcc6db64855587cdf5b6a53316c6e0bd0de633cf
SHA5120c4ee9720def7dac50487133eed851fcfcc4b1641ebfe6830d622047a54e14ab3e249b7d8b68746173e89f4b48f40cb6b5b54c2c935df5feb48d5c9ae1c4eafc
-
Filesize
210KB
MD502c282f29e95d17f69a1edabb3be4dfd
SHA11f5452d7157f2bb583db5ac7a867e8269a7985f9
SHA2564a36f9735596ab37f38a09c7dcc6db64855587cdf5b6a53316c6e0bd0de633cf
SHA5120c4ee9720def7dac50487133eed851fcfcc4b1641ebfe6830d622047a54e14ab3e249b7d8b68746173e89f4b48f40cb6b5b54c2c935df5feb48d5c9ae1c4eafc
-
Filesize
210KB
MD502c282f29e95d17f69a1edabb3be4dfd
SHA11f5452d7157f2bb583db5ac7a867e8269a7985f9
SHA2564a36f9735596ab37f38a09c7dcc6db64855587cdf5b6a53316c6e0bd0de633cf
SHA5120c4ee9720def7dac50487133eed851fcfcc4b1641ebfe6830d622047a54e14ab3e249b7d8b68746173e89f4b48f40cb6b5b54c2c935df5feb48d5c9ae1c4eafc
-
Filesize
210KB
MD502c282f29e95d17f69a1edabb3be4dfd
SHA11f5452d7157f2bb583db5ac7a867e8269a7985f9
SHA2564a36f9735596ab37f38a09c7dcc6db64855587cdf5b6a53316c6e0bd0de633cf
SHA5120c4ee9720def7dac50487133eed851fcfcc4b1641ebfe6830d622047a54e14ab3e249b7d8b68746173e89f4b48f40cb6b5b54c2c935df5feb48d5c9ae1c4eafc
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53