Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe
Resource
win10v2004-20230220-en
General
-
Target
07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe
-
Size
479KB
-
MD5
c97c8971d5d18e8a914b3f5e00bd6eb5
-
SHA1
e6b8196b368efc9b1ca0886a53c41bf0a8d3111b
-
SHA256
07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e
-
SHA512
7ffb2153c1506246bd13e02232c3e2c3c7788ef51167c4c2924ad9fa02ec9c79f4205d0031429053417f21a9c12f5ad1e1700e50bfcb01b01327be3f8a645c2d
-
SSDEEP
12288:gMrby90AhiWSk+tmeEBBRzf85GBEfNn1Unx6Du9d6:ryBwHkx+5fn18x3d6
Malware Config
Extracted
redline
dona
217.196.96.101:4132
-
auth_value
9fbb198992bbc83a84ab1f21384813e3
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2731584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2731584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2731584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2731584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2731584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2731584.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m1478422.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4964 y6315117.exe 4904 k2731584.exe 2600 l6375686.exe 936 m1478422.exe 4040 oneetx.exe 2140 oneetx.exe 1972 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3744 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2731584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2731584.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6315117.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6315117.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2384 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4904 k2731584.exe 4904 k2731584.exe 2600 l6375686.exe 2600 l6375686.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4904 k2731584.exe Token: SeDebugPrivilege 2600 l6375686.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 936 m1478422.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4964 4628 07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe 84 PID 4628 wrote to memory of 4964 4628 07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe 84 PID 4628 wrote to memory of 4964 4628 07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe 84 PID 4964 wrote to memory of 4904 4964 y6315117.exe 85 PID 4964 wrote to memory of 4904 4964 y6315117.exe 85 PID 4964 wrote to memory of 4904 4964 y6315117.exe 85 PID 4964 wrote to memory of 2600 4964 y6315117.exe 89 PID 4964 wrote to memory of 2600 4964 y6315117.exe 89 PID 4964 wrote to memory of 2600 4964 y6315117.exe 89 PID 4628 wrote to memory of 936 4628 07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe 90 PID 4628 wrote to memory of 936 4628 07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe 90 PID 4628 wrote to memory of 936 4628 07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe 90 PID 936 wrote to memory of 4040 936 m1478422.exe 91 PID 936 wrote to memory of 4040 936 m1478422.exe 91 PID 936 wrote to memory of 4040 936 m1478422.exe 91 PID 4040 wrote to memory of 4112 4040 oneetx.exe 93 PID 4040 wrote to memory of 4112 4040 oneetx.exe 93 PID 4040 wrote to memory of 4112 4040 oneetx.exe 93 PID 4040 wrote to memory of 372 4040 oneetx.exe 95 PID 4040 wrote to memory of 372 4040 oneetx.exe 95 PID 4040 wrote to memory of 372 4040 oneetx.exe 95 PID 372 wrote to memory of 1336 372 cmd.exe 97 PID 372 wrote to memory of 1336 372 cmd.exe 97 PID 372 wrote to memory of 1336 372 cmd.exe 97 PID 372 wrote to memory of 3332 372 cmd.exe 98 PID 372 wrote to memory of 3332 372 cmd.exe 98 PID 372 wrote to memory of 3332 372 cmd.exe 98 PID 372 wrote to memory of 2788 372 cmd.exe 99 PID 372 wrote to memory of 2788 372 cmd.exe 99 PID 372 wrote to memory of 2788 372 cmd.exe 99 PID 372 wrote to memory of 340 372 cmd.exe 100 PID 372 wrote to memory of 340 372 cmd.exe 100 PID 372 wrote to memory of 340 372 cmd.exe 100 PID 372 wrote to memory of 2660 372 cmd.exe 101 PID 372 wrote to memory of 2660 372 cmd.exe 101 PID 372 wrote to memory of 2660 372 cmd.exe 101 PID 372 wrote to memory of 2748 372 cmd.exe 102 PID 372 wrote to memory of 2748 372 cmd.exe 102 PID 372 wrote to memory of 2748 372 cmd.exe 102 PID 4040 wrote to memory of 3744 4040 oneetx.exe 107 PID 4040 wrote to memory of 3744 4040 oneetx.exe 107 PID 4040 wrote to memory of 3744 4040 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe"C:\Users\Admin\AppData\Local\Temp\07c3c82edd5569661f983566b2208bf3c4e263e20c44c3ce27634c8db10f1d8e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6315117.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6315117.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2731584.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2731584.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6375686.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6375686.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1478422.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1478422.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2748
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2140
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1972
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5230e702c489479031dc14f914a0952b9
SHA156bc69f8a18b1fe9b02c57e44a987e8f60f22011
SHA256f7e6ae2b7d0f197718468bddb19be7684f9991b5f4ecdecc368c9f286bd38df5
SHA512b014f14e377e21c7230774c8f616c950a602a1dbbfcb6e05aa7911c114567bb4dc43c68ce42e9426c9df36cca4f5cca38efe06bcbe8aff693625f40029150e8f
-
Filesize
210KB
MD5230e702c489479031dc14f914a0952b9
SHA156bc69f8a18b1fe9b02c57e44a987e8f60f22011
SHA256f7e6ae2b7d0f197718468bddb19be7684f9991b5f4ecdecc368c9f286bd38df5
SHA512b014f14e377e21c7230774c8f616c950a602a1dbbfcb6e05aa7911c114567bb4dc43c68ce42e9426c9df36cca4f5cca38efe06bcbe8aff693625f40029150e8f
-
Filesize
307KB
MD5fe35dcb9a401453be09fda899c2c0d4e
SHA19d4a67a60ccee947b79bd37030d25429c6450412
SHA2567706f573cb7115bff5217c915c6f48c8556131718a612cedb90ae9c970e13240
SHA512770df72f80e86a2d0c2ba0c128e8791f08deeddfb5907965d7add1919cb24bc7248eec795019a4d76d2d7c04d8300bf2797dc813774d2bf27f37b01ee5bbb3d2
-
Filesize
307KB
MD5fe35dcb9a401453be09fda899c2c0d4e
SHA19d4a67a60ccee947b79bd37030d25429c6450412
SHA2567706f573cb7115bff5217c915c6f48c8556131718a612cedb90ae9c970e13240
SHA512770df72f80e86a2d0c2ba0c128e8791f08deeddfb5907965d7add1919cb24bc7248eec795019a4d76d2d7c04d8300bf2797dc813774d2bf27f37b01ee5bbb3d2
-
Filesize
179KB
MD53daa4e791107df7947a96d5aaedef9e6
SHA1e3b5938c05371c89dd4fef16f95dd92f2bc9a58c
SHA256a8498b29d3c7e29a9d7ee176c903fa01ed129de3719fac89482c126ff6d74b77
SHA5124a45dcf03b22dd04338577effa8a81c10a211cf7f86af2c0e8d36d99ceaea1217a21c4179578cdedf8a34d84ee5871270c210436c6b9c1fab0eeae227d80f0eb
-
Filesize
179KB
MD53daa4e791107df7947a96d5aaedef9e6
SHA1e3b5938c05371c89dd4fef16f95dd92f2bc9a58c
SHA256a8498b29d3c7e29a9d7ee176c903fa01ed129de3719fac89482c126ff6d74b77
SHA5124a45dcf03b22dd04338577effa8a81c10a211cf7f86af2c0e8d36d99ceaea1217a21c4179578cdedf8a34d84ee5871270c210436c6b9c1fab0eeae227d80f0eb
-
Filesize
168KB
MD54becba14a5004a15e5c0cd04975d3442
SHA1db60be955678fbe7763ee8f5bbeb3f1d61f381c2
SHA2565fd3b2232c4f378cf4a1e4748a9165f4af7aa801adcd9f260bf0bef146a65dd6
SHA512e509ac20b4e43301df023fa5f017b33c3c34008c4112cb3abc75fd96479ba1a627df1c381ace6229ea797b4789f6ebb2dcbf6820f4080a1e7547b3775407f285
-
Filesize
168KB
MD54becba14a5004a15e5c0cd04975d3442
SHA1db60be955678fbe7763ee8f5bbeb3f1d61f381c2
SHA2565fd3b2232c4f378cf4a1e4748a9165f4af7aa801adcd9f260bf0bef146a65dd6
SHA512e509ac20b4e43301df023fa5f017b33c3c34008c4112cb3abc75fd96479ba1a627df1c381ace6229ea797b4789f6ebb2dcbf6820f4080a1e7547b3775407f285
-
Filesize
210KB
MD5230e702c489479031dc14f914a0952b9
SHA156bc69f8a18b1fe9b02c57e44a987e8f60f22011
SHA256f7e6ae2b7d0f197718468bddb19be7684f9991b5f4ecdecc368c9f286bd38df5
SHA512b014f14e377e21c7230774c8f616c950a602a1dbbfcb6e05aa7911c114567bb4dc43c68ce42e9426c9df36cca4f5cca38efe06bcbe8aff693625f40029150e8f
-
Filesize
210KB
MD5230e702c489479031dc14f914a0952b9
SHA156bc69f8a18b1fe9b02c57e44a987e8f60f22011
SHA256f7e6ae2b7d0f197718468bddb19be7684f9991b5f4ecdecc368c9f286bd38df5
SHA512b014f14e377e21c7230774c8f616c950a602a1dbbfcb6e05aa7911c114567bb4dc43c68ce42e9426c9df36cca4f5cca38efe06bcbe8aff693625f40029150e8f
-
Filesize
210KB
MD5230e702c489479031dc14f914a0952b9
SHA156bc69f8a18b1fe9b02c57e44a987e8f60f22011
SHA256f7e6ae2b7d0f197718468bddb19be7684f9991b5f4ecdecc368c9f286bd38df5
SHA512b014f14e377e21c7230774c8f616c950a602a1dbbfcb6e05aa7911c114567bb4dc43c68ce42e9426c9df36cca4f5cca38efe06bcbe8aff693625f40029150e8f
-
Filesize
210KB
MD5230e702c489479031dc14f914a0952b9
SHA156bc69f8a18b1fe9b02c57e44a987e8f60f22011
SHA256f7e6ae2b7d0f197718468bddb19be7684f9991b5f4ecdecc368c9f286bd38df5
SHA512b014f14e377e21c7230774c8f616c950a602a1dbbfcb6e05aa7911c114567bb4dc43c68ce42e9426c9df36cca4f5cca38efe06bcbe8aff693625f40029150e8f
-
Filesize
210KB
MD5230e702c489479031dc14f914a0952b9
SHA156bc69f8a18b1fe9b02c57e44a987e8f60f22011
SHA256f7e6ae2b7d0f197718468bddb19be7684f9991b5f4ecdecc368c9f286bd38df5
SHA512b014f14e377e21c7230774c8f616c950a602a1dbbfcb6e05aa7911c114567bb4dc43c68ce42e9426c9df36cca4f5cca38efe06bcbe8aff693625f40029150e8f
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5