Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe
Resource
win10v2004-20230220-en
General
-
Target
18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe
-
Size
479KB
-
MD5
0ad2beb37e5ae872f56fb37b496cec33
-
SHA1
7a7aca0b587d4a51786f932f0fe08935d608ce88
-
SHA256
18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb
-
SHA512
2e6513ed4e161de57862b21e6358b3d3b3e7f20fe8fd0083f8d77e953548078728b2752b594bfd3b9d3d3b271e2aed0057d9336c5be1e469464763771802da54
-
SSDEEP
12288:JMruy90cJq+d8dnSnLEQUgaOUi74WI95LjVP:/ypeSnLEZg+iQ5LRP
Malware Config
Extracted
redline
dona
217.196.96.101:4132
-
auth_value
9fbb198992bbc83a84ab1f21384813e3
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h6817137.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h6817137.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h6817137.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h6817137.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h6817137.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h6817137.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation i7903694.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4852 x8954333.exe 2928 g2315850.exe 2216 h6817137.exe 3164 i7903694.exe 3104 oneetx.exe 4376 oneetx.exe 4440 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1504 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h6817137.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h6817137.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8954333.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8954333.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2928 g2315850.exe 2928 g2315850.exe 2216 h6817137.exe 2216 h6817137.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2928 g2315850.exe Token: SeDebugPrivilege 2216 h6817137.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3164 i7903694.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1876 wrote to memory of 4852 1876 18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe 85 PID 1876 wrote to memory of 4852 1876 18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe 85 PID 1876 wrote to memory of 4852 1876 18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe 85 PID 4852 wrote to memory of 2928 4852 x8954333.exe 86 PID 4852 wrote to memory of 2928 4852 x8954333.exe 86 PID 4852 wrote to memory of 2928 4852 x8954333.exe 86 PID 4852 wrote to memory of 2216 4852 x8954333.exe 93 PID 4852 wrote to memory of 2216 4852 x8954333.exe 93 PID 4852 wrote to memory of 2216 4852 x8954333.exe 93 PID 1876 wrote to memory of 3164 1876 18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe 95 PID 1876 wrote to memory of 3164 1876 18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe 95 PID 1876 wrote to memory of 3164 1876 18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe 95 PID 3164 wrote to memory of 3104 3164 i7903694.exe 96 PID 3164 wrote to memory of 3104 3164 i7903694.exe 96 PID 3164 wrote to memory of 3104 3164 i7903694.exe 96 PID 3104 wrote to memory of 4220 3104 oneetx.exe 97 PID 3104 wrote to memory of 4220 3104 oneetx.exe 97 PID 3104 wrote to memory of 4220 3104 oneetx.exe 97 PID 3104 wrote to memory of 3424 3104 oneetx.exe 99 PID 3104 wrote to memory of 3424 3104 oneetx.exe 99 PID 3104 wrote to memory of 3424 3104 oneetx.exe 99 PID 3424 wrote to memory of 3824 3424 cmd.exe 101 PID 3424 wrote to memory of 3824 3424 cmd.exe 101 PID 3424 wrote to memory of 3824 3424 cmd.exe 101 PID 3424 wrote to memory of 3940 3424 cmd.exe 102 PID 3424 wrote to memory of 3940 3424 cmd.exe 102 PID 3424 wrote to memory of 3940 3424 cmd.exe 102 PID 3424 wrote to memory of 1540 3424 cmd.exe 103 PID 3424 wrote to memory of 1540 3424 cmd.exe 103 PID 3424 wrote to memory of 1540 3424 cmd.exe 103 PID 3424 wrote to memory of 2372 3424 cmd.exe 104 PID 3424 wrote to memory of 2372 3424 cmd.exe 104 PID 3424 wrote to memory of 2372 3424 cmd.exe 104 PID 3424 wrote to memory of 4820 3424 cmd.exe 105 PID 3424 wrote to memory of 4820 3424 cmd.exe 105 PID 3424 wrote to memory of 4820 3424 cmd.exe 105 PID 3424 wrote to memory of 3892 3424 cmd.exe 106 PID 3424 wrote to memory of 3892 3424 cmd.exe 106 PID 3424 wrote to memory of 3892 3424 cmd.exe 106 PID 3104 wrote to memory of 1504 3104 oneetx.exe 108 PID 3104 wrote to memory of 1504 3104 oneetx.exe 108 PID 3104 wrote to memory of 1504 3104 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe"C:\Users\Admin\AppData\Local\Temp\18d0b1d3bc3368f7a23786adf37c128c85e7105cd7866049dbc1402f975e0deb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8954333.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8954333.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2315850.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2315850.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6817137.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6817137.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7903694.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7903694.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3892
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4376
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5095b199adab66e17606154d64e71c4fe
SHA155d6cdc20f0fc470445c165b139858ad6065e311
SHA256737b4f9f00df50244d9a58919ab911c91f6352af1e6d71742d1f6f48fd88ed6b
SHA512461d325fa93f98f481729e7a38d90afc51c957829c7f494a1d65fe16730b114dc07710e254c36b076ebc8fbba1d1e6f2b3338d7fcd6d4423f96cd4a9efe3f502
-
Filesize
210KB
MD5095b199adab66e17606154d64e71c4fe
SHA155d6cdc20f0fc470445c165b139858ad6065e311
SHA256737b4f9f00df50244d9a58919ab911c91f6352af1e6d71742d1f6f48fd88ed6b
SHA512461d325fa93f98f481729e7a38d90afc51c957829c7f494a1d65fe16730b114dc07710e254c36b076ebc8fbba1d1e6f2b3338d7fcd6d4423f96cd4a9efe3f502
-
Filesize
307KB
MD5796be0db625e6bd0c456be8e05d89b6c
SHA1f45337ecdc436c94f12c4f58a217cac9dc7a60c9
SHA256b1ab083d8566f243d5e3d9faf616aa79b32c2ab764098766fb81749ea8719cc7
SHA512daf69e8efd18cf68c9792c5266261ddbfabd1f34a509d128ad5410948a6aea9756ee3f59c5c68eda352d4328da3da5fead59bf06b3f9ef38443c3cd0056a3b64
-
Filesize
307KB
MD5796be0db625e6bd0c456be8e05d89b6c
SHA1f45337ecdc436c94f12c4f58a217cac9dc7a60c9
SHA256b1ab083d8566f243d5e3d9faf616aa79b32c2ab764098766fb81749ea8719cc7
SHA512daf69e8efd18cf68c9792c5266261ddbfabd1f34a509d128ad5410948a6aea9756ee3f59c5c68eda352d4328da3da5fead59bf06b3f9ef38443c3cd0056a3b64
-
Filesize
168KB
MD524055c44b02b89756dedaec3f3036ad0
SHA165d364a7c1e91ca71c1ea68b8de154b4ad3fe8ba
SHA256f56c71af6ad7c5470b0511065357347f41903af059e8310edde6ea940c84be83
SHA512682a7dde8ecc8bbd4287bf0d2459c9341abe45e51a162a151d0034179af913803b6b616268c36a4a2567bbaa1e4b7220e4404a66180bc1a7677456ba88c0ba46
-
Filesize
168KB
MD524055c44b02b89756dedaec3f3036ad0
SHA165d364a7c1e91ca71c1ea68b8de154b4ad3fe8ba
SHA256f56c71af6ad7c5470b0511065357347f41903af059e8310edde6ea940c84be83
SHA512682a7dde8ecc8bbd4287bf0d2459c9341abe45e51a162a151d0034179af913803b6b616268c36a4a2567bbaa1e4b7220e4404a66180bc1a7677456ba88c0ba46
-
Filesize
179KB
MD5e048230f7499688d1cbe9fe80eb77d6c
SHA111a1c080ea63fb38bb93dbdd09f1509c94c89c41
SHA256fe2f165419f9c378c039b285d4f2868be674ecb7a55e979b4b17fb2cbce9345e
SHA51239fcd05c1c7b68cb7d5a5d0ac671b7720e3393c201ea041acce7ccb16ed6ac9dc3c658dddd3f692871ec8f7cb481036f6927f9eb97ad8af7fc9b31b7b2252e4e
-
Filesize
179KB
MD5e048230f7499688d1cbe9fe80eb77d6c
SHA111a1c080ea63fb38bb93dbdd09f1509c94c89c41
SHA256fe2f165419f9c378c039b285d4f2868be674ecb7a55e979b4b17fb2cbce9345e
SHA51239fcd05c1c7b68cb7d5a5d0ac671b7720e3393c201ea041acce7ccb16ed6ac9dc3c658dddd3f692871ec8f7cb481036f6927f9eb97ad8af7fc9b31b7b2252e4e
-
Filesize
210KB
MD5095b199adab66e17606154d64e71c4fe
SHA155d6cdc20f0fc470445c165b139858ad6065e311
SHA256737b4f9f00df50244d9a58919ab911c91f6352af1e6d71742d1f6f48fd88ed6b
SHA512461d325fa93f98f481729e7a38d90afc51c957829c7f494a1d65fe16730b114dc07710e254c36b076ebc8fbba1d1e6f2b3338d7fcd6d4423f96cd4a9efe3f502
-
Filesize
210KB
MD5095b199adab66e17606154d64e71c4fe
SHA155d6cdc20f0fc470445c165b139858ad6065e311
SHA256737b4f9f00df50244d9a58919ab911c91f6352af1e6d71742d1f6f48fd88ed6b
SHA512461d325fa93f98f481729e7a38d90afc51c957829c7f494a1d65fe16730b114dc07710e254c36b076ebc8fbba1d1e6f2b3338d7fcd6d4423f96cd4a9efe3f502
-
Filesize
210KB
MD5095b199adab66e17606154d64e71c4fe
SHA155d6cdc20f0fc470445c165b139858ad6065e311
SHA256737b4f9f00df50244d9a58919ab911c91f6352af1e6d71742d1f6f48fd88ed6b
SHA512461d325fa93f98f481729e7a38d90afc51c957829c7f494a1d65fe16730b114dc07710e254c36b076ebc8fbba1d1e6f2b3338d7fcd6d4423f96cd4a9efe3f502
-
Filesize
210KB
MD5095b199adab66e17606154d64e71c4fe
SHA155d6cdc20f0fc470445c165b139858ad6065e311
SHA256737b4f9f00df50244d9a58919ab911c91f6352af1e6d71742d1f6f48fd88ed6b
SHA512461d325fa93f98f481729e7a38d90afc51c957829c7f494a1d65fe16730b114dc07710e254c36b076ebc8fbba1d1e6f2b3338d7fcd6d4423f96cd4a9efe3f502
-
Filesize
210KB
MD5095b199adab66e17606154d64e71c4fe
SHA155d6cdc20f0fc470445c165b139858ad6065e311
SHA256737b4f9f00df50244d9a58919ab911c91f6352af1e6d71742d1f6f48fd88ed6b
SHA512461d325fa93f98f481729e7a38d90afc51c957829c7f494a1d65fe16730b114dc07710e254c36b076ebc8fbba1d1e6f2b3338d7fcd6d4423f96cd4a9efe3f502
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5