Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe
Resource
win10v2004-20230220-en
General
-
Target
1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe
-
Size
479KB
-
MD5
f13b39973f62ca987a9e8e421111d32e
-
SHA1
eac1df88a4276b05ab9b3ed8aec85d2b1caf4ecc
-
SHA256
1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105
-
SHA512
bf44badbf34e5a187468cdcff48915b297fc580ae19776fb118e58f8c12e488dd9c3186f877e339411794a3518d3a31583f0ea8869d61b4dbcf715829aff8b54
-
SSDEEP
6144:Kzy+bnr++p0yN90QE43ZkNzeWE1l6OlD+Q/uiZIU88F+zcCXkWPYaeg1rgwXw6b:pMruy90Zg6zEIU88F+YEGs1hLb
Malware Config
Extracted
redline
dona
217.196.96.101:4132
-
auth_value
9fbb198992bbc83a84ab1f21384813e3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7770440.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7770440.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7770440.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7770440.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7770440.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7770440.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m5960893.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 780 y3288519.exe 2432 k7770440.exe 4436 l5794046.exe 5084 m5960893.exe 3752 oneetx.exe 4600 oneetx.exe 5104 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2924 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7770440.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7770440.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3288519.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3288519.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 368 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2432 k7770440.exe 2432 k7770440.exe 4436 l5794046.exe 4436 l5794046.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2432 k7770440.exe Token: SeDebugPrivilege 4436 l5794046.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5084 m5960893.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4228 wrote to memory of 780 4228 1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe 84 PID 4228 wrote to memory of 780 4228 1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe 84 PID 4228 wrote to memory of 780 4228 1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe 84 PID 780 wrote to memory of 2432 780 y3288519.exe 85 PID 780 wrote to memory of 2432 780 y3288519.exe 85 PID 780 wrote to memory of 2432 780 y3288519.exe 85 PID 780 wrote to memory of 4436 780 y3288519.exe 89 PID 780 wrote to memory of 4436 780 y3288519.exe 89 PID 780 wrote to memory of 4436 780 y3288519.exe 89 PID 4228 wrote to memory of 5084 4228 1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe 91 PID 4228 wrote to memory of 5084 4228 1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe 91 PID 4228 wrote to memory of 5084 4228 1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe 91 PID 5084 wrote to memory of 3752 5084 m5960893.exe 92 PID 5084 wrote to memory of 3752 5084 m5960893.exe 92 PID 5084 wrote to memory of 3752 5084 m5960893.exe 92 PID 3752 wrote to memory of 4364 3752 oneetx.exe 93 PID 3752 wrote to memory of 4364 3752 oneetx.exe 93 PID 3752 wrote to memory of 4364 3752 oneetx.exe 93 PID 3752 wrote to memory of 3760 3752 oneetx.exe 95 PID 3752 wrote to memory of 3760 3752 oneetx.exe 95 PID 3752 wrote to memory of 3760 3752 oneetx.exe 95 PID 3760 wrote to memory of 2152 3760 cmd.exe 97 PID 3760 wrote to memory of 2152 3760 cmd.exe 97 PID 3760 wrote to memory of 2152 3760 cmd.exe 97 PID 3760 wrote to memory of 4764 3760 cmd.exe 98 PID 3760 wrote to memory of 4764 3760 cmd.exe 98 PID 3760 wrote to memory of 4764 3760 cmd.exe 98 PID 3760 wrote to memory of 4236 3760 cmd.exe 99 PID 3760 wrote to memory of 4236 3760 cmd.exe 99 PID 3760 wrote to memory of 4236 3760 cmd.exe 99 PID 3760 wrote to memory of 3240 3760 cmd.exe 100 PID 3760 wrote to memory of 3240 3760 cmd.exe 100 PID 3760 wrote to memory of 3240 3760 cmd.exe 100 PID 3760 wrote to memory of 4308 3760 cmd.exe 101 PID 3760 wrote to memory of 4308 3760 cmd.exe 101 PID 3760 wrote to memory of 4308 3760 cmd.exe 101 PID 3760 wrote to memory of 3632 3760 cmd.exe 102 PID 3760 wrote to memory of 3632 3760 cmd.exe 102 PID 3760 wrote to memory of 3632 3760 cmd.exe 102 PID 3752 wrote to memory of 2924 3752 oneetx.exe 108 PID 3752 wrote to memory of 2924 3752 oneetx.exe 108 PID 3752 wrote to memory of 2924 3752 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe"C:\Users\Admin\AppData\Local\Temp\1b5c1227f68c1292cd798ab4a4ff41a1af8dc51d5ce3ac46adcb47b793b7e105.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3288519.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3288519.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7770440.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7770440.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5794046.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5794046.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5960893.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5960893.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4364
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3632
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4600
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:5104
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:368
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD58aedbd8e5c73d462a58097c76d204a0c
SHA1198f6049f6ccbbda9e83641cceeb8cb9424a77a6
SHA2569df42df3d7df8338ed35cfb82d1aae58244df64c20a70effb90788c5a6aad3a8
SHA512dce81020f81c922b3be0cad552cbb2ce4d0440f0d6a65605276fe13549832bebfc9c19dc0b4c6b385d2091771c1049ba1f1d7195f39be3d92771be079a27e75c
-
Filesize
210KB
MD58aedbd8e5c73d462a58097c76d204a0c
SHA1198f6049f6ccbbda9e83641cceeb8cb9424a77a6
SHA2569df42df3d7df8338ed35cfb82d1aae58244df64c20a70effb90788c5a6aad3a8
SHA512dce81020f81c922b3be0cad552cbb2ce4d0440f0d6a65605276fe13549832bebfc9c19dc0b4c6b385d2091771c1049ba1f1d7195f39be3d92771be079a27e75c
-
Filesize
307KB
MD5f4db3db6ddb68d6809a087819380569d
SHA1bb708316c4c062943cf6dbc65a5058d96c29ee63
SHA2569e66cf9ebfafdd4ca60a3f1e9cd3eb2ba4f6e597eebc96a8806af097e2d4c4a9
SHA51268ed6edc9dfb739e74bce952bec738bd71dd45252a273eb375361105ec0b4d6533b37a2e66c7b20626e8950140f6e233b15ae5c84008db3a8cd7f1d385e09c2b
-
Filesize
307KB
MD5f4db3db6ddb68d6809a087819380569d
SHA1bb708316c4c062943cf6dbc65a5058d96c29ee63
SHA2569e66cf9ebfafdd4ca60a3f1e9cd3eb2ba4f6e597eebc96a8806af097e2d4c4a9
SHA51268ed6edc9dfb739e74bce952bec738bd71dd45252a273eb375361105ec0b4d6533b37a2e66c7b20626e8950140f6e233b15ae5c84008db3a8cd7f1d385e09c2b
-
Filesize
179KB
MD5aeaa57fd9654ae231d5d07edbb2712c6
SHA13ffb164529ec0a895423c57000da7d0a9e76cd72
SHA256d10793b7d9dce709e4f8f2365686e192545df464dfa7b3037c656b9678053e50
SHA512f49d7099e91a3d63cbb7fc0fa6b6ed7babd2e0fb1c837f5040ec6e1ac246437777d86d40f4411fa2abda0d5721418fa10b90218eda21ced31641fbcd93a33dcc
-
Filesize
179KB
MD5aeaa57fd9654ae231d5d07edbb2712c6
SHA13ffb164529ec0a895423c57000da7d0a9e76cd72
SHA256d10793b7d9dce709e4f8f2365686e192545df464dfa7b3037c656b9678053e50
SHA512f49d7099e91a3d63cbb7fc0fa6b6ed7babd2e0fb1c837f5040ec6e1ac246437777d86d40f4411fa2abda0d5721418fa10b90218eda21ced31641fbcd93a33dcc
-
Filesize
168KB
MD558554465d2629fe54a85fe78cfa349ed
SHA1a53cda13c4882422976f1c795ec56a638f52e500
SHA256734171c635b6a71e0c2cbe6cd5c07e99208cd0a715f33e34b2f916ee4bc2ad41
SHA51256d452b8e9e8991a7fe60607f10d7e827ef3b0a2c7b5cb742160ee72bb32e069e468aeae9846effb393909226e6a315edc645b885b2668a03cb17049b824a35c
-
Filesize
168KB
MD558554465d2629fe54a85fe78cfa349ed
SHA1a53cda13c4882422976f1c795ec56a638f52e500
SHA256734171c635b6a71e0c2cbe6cd5c07e99208cd0a715f33e34b2f916ee4bc2ad41
SHA51256d452b8e9e8991a7fe60607f10d7e827ef3b0a2c7b5cb742160ee72bb32e069e468aeae9846effb393909226e6a315edc645b885b2668a03cb17049b824a35c
-
Filesize
210KB
MD58aedbd8e5c73d462a58097c76d204a0c
SHA1198f6049f6ccbbda9e83641cceeb8cb9424a77a6
SHA2569df42df3d7df8338ed35cfb82d1aae58244df64c20a70effb90788c5a6aad3a8
SHA512dce81020f81c922b3be0cad552cbb2ce4d0440f0d6a65605276fe13549832bebfc9c19dc0b4c6b385d2091771c1049ba1f1d7195f39be3d92771be079a27e75c
-
Filesize
210KB
MD58aedbd8e5c73d462a58097c76d204a0c
SHA1198f6049f6ccbbda9e83641cceeb8cb9424a77a6
SHA2569df42df3d7df8338ed35cfb82d1aae58244df64c20a70effb90788c5a6aad3a8
SHA512dce81020f81c922b3be0cad552cbb2ce4d0440f0d6a65605276fe13549832bebfc9c19dc0b4c6b385d2091771c1049ba1f1d7195f39be3d92771be079a27e75c
-
Filesize
210KB
MD58aedbd8e5c73d462a58097c76d204a0c
SHA1198f6049f6ccbbda9e83641cceeb8cb9424a77a6
SHA2569df42df3d7df8338ed35cfb82d1aae58244df64c20a70effb90788c5a6aad3a8
SHA512dce81020f81c922b3be0cad552cbb2ce4d0440f0d6a65605276fe13549832bebfc9c19dc0b4c6b385d2091771c1049ba1f1d7195f39be3d92771be079a27e75c
-
Filesize
210KB
MD58aedbd8e5c73d462a58097c76d204a0c
SHA1198f6049f6ccbbda9e83641cceeb8cb9424a77a6
SHA2569df42df3d7df8338ed35cfb82d1aae58244df64c20a70effb90788c5a6aad3a8
SHA512dce81020f81c922b3be0cad552cbb2ce4d0440f0d6a65605276fe13549832bebfc9c19dc0b4c6b385d2091771c1049ba1f1d7195f39be3d92771be079a27e75c
-
Filesize
210KB
MD58aedbd8e5c73d462a58097c76d204a0c
SHA1198f6049f6ccbbda9e83641cceeb8cb9424a77a6
SHA2569df42df3d7df8338ed35cfb82d1aae58244df64c20a70effb90788c5a6aad3a8
SHA512dce81020f81c922b3be0cad552cbb2ce4d0440f0d6a65605276fe13549832bebfc9c19dc0b4c6b385d2091771c1049ba1f1d7195f39be3d92771be079a27e75c
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5