Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe
Resource
win10v2004-20230220-en
General
-
Target
0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe
-
Size
479KB
-
MD5
ff5d9ea6383516b1e2895ba9cc0aa950
-
SHA1
5ad4065ebacf732898e6ea4e850ff94d7b22ea84
-
SHA256
0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c
-
SHA512
0f304f8ee169d296c624b57ecb5372e69b4347a51dcfab2261aef9c9ff1a3c1d2d818f4ee2250f72ee43f5eb09ed40aff3ef29cfd682af7e2f456e03c10667d5
-
SSDEEP
12288:NMrZy905W5I9h4NEmx+nNNu7TbRsCYT+rkcj:cyO9qNP+NNu7rLgO
Malware Config
Extracted
redline
ditro
217.196.96.101:4132
-
auth_value
8f24ed370a9b24aa28d3d634ea57912e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8152145.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8152145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8152145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8152145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8152145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8152145.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation m7211958.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 3876 y1943237.exe 5076 k8152145.exe 3812 l4928198.exe 3688 m7211958.exe 2244 oneetx.exe 2480 oneetx.exe 2032 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3320 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8152145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8152145.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1943237.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1943237.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3260 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5076 k8152145.exe 5076 k8152145.exe 3812 l4928198.exe 3812 l4928198.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5076 k8152145.exe Token: SeDebugPrivilege 3812 l4928198.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3688 m7211958.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3140 wrote to memory of 3876 3140 0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe 80 PID 3140 wrote to memory of 3876 3140 0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe 80 PID 3140 wrote to memory of 3876 3140 0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe 80 PID 3876 wrote to memory of 5076 3876 y1943237.exe 81 PID 3876 wrote to memory of 5076 3876 y1943237.exe 81 PID 3876 wrote to memory of 5076 3876 y1943237.exe 81 PID 3876 wrote to memory of 3812 3876 y1943237.exe 86 PID 3876 wrote to memory of 3812 3876 y1943237.exe 86 PID 3876 wrote to memory of 3812 3876 y1943237.exe 86 PID 3140 wrote to memory of 3688 3140 0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe 87 PID 3140 wrote to memory of 3688 3140 0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe 87 PID 3140 wrote to memory of 3688 3140 0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe 87 PID 3688 wrote to memory of 2244 3688 m7211958.exe 88 PID 3688 wrote to memory of 2244 3688 m7211958.exe 88 PID 3688 wrote to memory of 2244 3688 m7211958.exe 88 PID 2244 wrote to memory of 4312 2244 oneetx.exe 89 PID 2244 wrote to memory of 4312 2244 oneetx.exe 89 PID 2244 wrote to memory of 4312 2244 oneetx.exe 89 PID 2244 wrote to memory of 640 2244 oneetx.exe 91 PID 2244 wrote to memory of 640 2244 oneetx.exe 91 PID 2244 wrote to memory of 640 2244 oneetx.exe 91 PID 640 wrote to memory of 3684 640 cmd.exe 93 PID 640 wrote to memory of 3684 640 cmd.exe 93 PID 640 wrote to memory of 3684 640 cmd.exe 93 PID 640 wrote to memory of 3832 640 cmd.exe 94 PID 640 wrote to memory of 3832 640 cmd.exe 94 PID 640 wrote to memory of 3832 640 cmd.exe 94 PID 640 wrote to memory of 312 640 cmd.exe 95 PID 640 wrote to memory of 312 640 cmd.exe 95 PID 640 wrote to memory of 312 640 cmd.exe 95 PID 640 wrote to memory of 232 640 cmd.exe 96 PID 640 wrote to memory of 232 640 cmd.exe 96 PID 640 wrote to memory of 232 640 cmd.exe 96 PID 640 wrote to memory of 208 640 cmd.exe 97 PID 640 wrote to memory of 208 640 cmd.exe 97 PID 640 wrote to memory of 208 640 cmd.exe 97 PID 640 wrote to memory of 2532 640 cmd.exe 98 PID 640 wrote to memory of 2532 640 cmd.exe 98 PID 640 wrote to memory of 2532 640 cmd.exe 98 PID 2244 wrote to memory of 3320 2244 oneetx.exe 105 PID 2244 wrote to memory of 3320 2244 oneetx.exe 105 PID 2244 wrote to memory of 3320 2244 oneetx.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe"C:\Users\Admin\AppData\Local\Temp\0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1943237.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1943237.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8152145.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8152145.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4928198.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4928198.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m7211958.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m7211958.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:232
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:208
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2532
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2480
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2032
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD57b4ebd0e890d06af7c2d54c9a8bb6e76
SHA1ea9bc63096d1ac7239c641824e1ca819c048a672
SHA2566c96715843587b639b2ae664e13adeb17fde4e6df541c1a29cac5ba14a6abb8f
SHA51250db6fb2f1a5b9a3e9723c8431e5d2d8897fcbd48285658b37b1e9f65b49f2cdd768c8678454bb4bfdf9182d259dbea3556a5ec4bedfb6ea6d34f04a45d0ceff
-
Filesize
210KB
MD57b4ebd0e890d06af7c2d54c9a8bb6e76
SHA1ea9bc63096d1ac7239c641824e1ca819c048a672
SHA2566c96715843587b639b2ae664e13adeb17fde4e6df541c1a29cac5ba14a6abb8f
SHA51250db6fb2f1a5b9a3e9723c8431e5d2d8897fcbd48285658b37b1e9f65b49f2cdd768c8678454bb4bfdf9182d259dbea3556a5ec4bedfb6ea6d34f04a45d0ceff
-
Filesize
307KB
MD55a7617dce89e308b93ad459f8b61dec5
SHA108361f02ae1b5fa432fa31350c7a133224107eab
SHA2560f5eff87d2c1f66d5d3298a9293bc1c11ca6af701eef004d095b91f8bd4d29ac
SHA5121025812e90430496ecd6bfb349246b819fcfbed2cdf9fea71f39b6eb5ea216b8244345271cfe1df3417fd50bf19c04e145d311839d8177e7feb1cf3151f9600a
-
Filesize
307KB
MD55a7617dce89e308b93ad459f8b61dec5
SHA108361f02ae1b5fa432fa31350c7a133224107eab
SHA2560f5eff87d2c1f66d5d3298a9293bc1c11ca6af701eef004d095b91f8bd4d29ac
SHA5121025812e90430496ecd6bfb349246b819fcfbed2cdf9fea71f39b6eb5ea216b8244345271cfe1df3417fd50bf19c04e145d311839d8177e7feb1cf3151f9600a
-
Filesize
179KB
MD547fd879d6705aaa687a79026448352b3
SHA13a454b8d336eb896114e517fb33015e22815b36f
SHA256cffad90ae7b341e69d55c4d657ebf1899c5b1b1e09b9d93ccad45d434c00b1de
SHA512d8f1f5a32ac822df2f90a3929d6fd89903327b0b1180eda0db8aedd6f9626f89dab66266ea2c5a04f0cc302d96de10635241167383112551f3d444d9658347d0
-
Filesize
179KB
MD547fd879d6705aaa687a79026448352b3
SHA13a454b8d336eb896114e517fb33015e22815b36f
SHA256cffad90ae7b341e69d55c4d657ebf1899c5b1b1e09b9d93ccad45d434c00b1de
SHA512d8f1f5a32ac822df2f90a3929d6fd89903327b0b1180eda0db8aedd6f9626f89dab66266ea2c5a04f0cc302d96de10635241167383112551f3d444d9658347d0
-
Filesize
168KB
MD5555726a2678430eca340424dfb1ac8b7
SHA12e7c243746e5086ebb2e8464e18396a1172203fa
SHA2567c8733e14c40591f407a66bd8e4d3a756895b59d2886405dfe6d77f85ff3d7b4
SHA512b290847e039c336ab01c426e309e90495da5ee8046898eae57db542a49d08bea33b710e4ba814d782fd657a684961b1d4b8657fb5b5af5fcf5227df757298d3a
-
Filesize
168KB
MD5555726a2678430eca340424dfb1ac8b7
SHA12e7c243746e5086ebb2e8464e18396a1172203fa
SHA2567c8733e14c40591f407a66bd8e4d3a756895b59d2886405dfe6d77f85ff3d7b4
SHA512b290847e039c336ab01c426e309e90495da5ee8046898eae57db542a49d08bea33b710e4ba814d782fd657a684961b1d4b8657fb5b5af5fcf5227df757298d3a
-
Filesize
210KB
MD57b4ebd0e890d06af7c2d54c9a8bb6e76
SHA1ea9bc63096d1ac7239c641824e1ca819c048a672
SHA2566c96715843587b639b2ae664e13adeb17fde4e6df541c1a29cac5ba14a6abb8f
SHA51250db6fb2f1a5b9a3e9723c8431e5d2d8897fcbd48285658b37b1e9f65b49f2cdd768c8678454bb4bfdf9182d259dbea3556a5ec4bedfb6ea6d34f04a45d0ceff
-
Filesize
210KB
MD57b4ebd0e890d06af7c2d54c9a8bb6e76
SHA1ea9bc63096d1ac7239c641824e1ca819c048a672
SHA2566c96715843587b639b2ae664e13adeb17fde4e6df541c1a29cac5ba14a6abb8f
SHA51250db6fb2f1a5b9a3e9723c8431e5d2d8897fcbd48285658b37b1e9f65b49f2cdd768c8678454bb4bfdf9182d259dbea3556a5ec4bedfb6ea6d34f04a45d0ceff
-
Filesize
210KB
MD57b4ebd0e890d06af7c2d54c9a8bb6e76
SHA1ea9bc63096d1ac7239c641824e1ca819c048a672
SHA2566c96715843587b639b2ae664e13adeb17fde4e6df541c1a29cac5ba14a6abb8f
SHA51250db6fb2f1a5b9a3e9723c8431e5d2d8897fcbd48285658b37b1e9f65b49f2cdd768c8678454bb4bfdf9182d259dbea3556a5ec4bedfb6ea6d34f04a45d0ceff
-
Filesize
210KB
MD57b4ebd0e890d06af7c2d54c9a8bb6e76
SHA1ea9bc63096d1ac7239c641824e1ca819c048a672
SHA2566c96715843587b639b2ae664e13adeb17fde4e6df541c1a29cac5ba14a6abb8f
SHA51250db6fb2f1a5b9a3e9723c8431e5d2d8897fcbd48285658b37b1e9f65b49f2cdd768c8678454bb4bfdf9182d259dbea3556a5ec4bedfb6ea6d34f04a45d0ceff
-
Filesize
210KB
MD57b4ebd0e890d06af7c2d54c9a8bb6e76
SHA1ea9bc63096d1ac7239c641824e1ca819c048a672
SHA2566c96715843587b639b2ae664e13adeb17fde4e6df541c1a29cac5ba14a6abb8f
SHA51250db6fb2f1a5b9a3e9723c8431e5d2d8897fcbd48285658b37b1e9f65b49f2cdd768c8678454bb4bfdf9182d259dbea3556a5ec4bedfb6ea6d34f04a45d0ceff
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5