Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe
Resource
win10v2004-20230220-en
General
-
Target
b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe
-
Size
491KB
-
MD5
be01b0be55418c473a081786fd0c9958
-
SHA1
efa508046c8246b43dd7265be232c4c82aca33cf
-
SHA256
b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05
-
SHA512
d1fbd4b9507329fcbd30985253b732fd58602ac2910ae0a7a7095dcb11805fca8cfd0c5e56f0d37cb7bf77d44852116e68a5c3d906ef3640720ba2191489a4dd
-
SSDEEP
12288:mMrIy90psSlikXbwgnebe+XYCuw1yF+DbknY:6y6XvneS+3nyF+R
Malware Config
Extracted
redline
lagu
217.196.96.101:4132
-
auth_value
8c4969092a4e18461b2347c0aa54b6a5
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o7413032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o7413032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o7413032.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o7413032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o7413032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o7413032.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation s0731303.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1316 z9497658.exe 1804 o7413032.exe 4128 r7590457.exe 1972 s0731303.exe 2220 oneetx.exe 5056 oneetx.exe 4680 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4864 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o7413032.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o7413032.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9497658.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9497658.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1804 o7413032.exe 1804 o7413032.exe 4128 r7590457.exe 4128 r7590457.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1804 o7413032.exe Token: SeDebugPrivilege 4128 r7590457.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 s0731303.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2588 wrote to memory of 1316 2588 b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe 83 PID 2588 wrote to memory of 1316 2588 b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe 83 PID 2588 wrote to memory of 1316 2588 b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe 83 PID 1316 wrote to memory of 1804 1316 z9497658.exe 84 PID 1316 wrote to memory of 1804 1316 z9497658.exe 84 PID 1316 wrote to memory of 1804 1316 z9497658.exe 84 PID 1316 wrote to memory of 4128 1316 z9497658.exe 89 PID 1316 wrote to memory of 4128 1316 z9497658.exe 89 PID 1316 wrote to memory of 4128 1316 z9497658.exe 89 PID 2588 wrote to memory of 1972 2588 b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe 90 PID 2588 wrote to memory of 1972 2588 b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe 90 PID 2588 wrote to memory of 1972 2588 b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe 90 PID 1972 wrote to memory of 2220 1972 s0731303.exe 91 PID 1972 wrote to memory of 2220 1972 s0731303.exe 91 PID 1972 wrote to memory of 2220 1972 s0731303.exe 91 PID 2220 wrote to memory of 5076 2220 oneetx.exe 92 PID 2220 wrote to memory of 5076 2220 oneetx.exe 92 PID 2220 wrote to memory of 5076 2220 oneetx.exe 92 PID 2220 wrote to memory of 4864 2220 oneetx.exe 100 PID 2220 wrote to memory of 4864 2220 oneetx.exe 100 PID 2220 wrote to memory of 4864 2220 oneetx.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe"C:\Users\Admin\AppData\Local\Temp\b0b03bdd59c1a032054a9da8ea927a45fe64a148077a8eff7c610f2b93507f05.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9497658.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9497658.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o7413032.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o7413032.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7590457.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7590457.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731303.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731303.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:5076
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:5056
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:4680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5c92fb5abbe7ad35ff73a2cb2d90cd87d
SHA1552f578c293a34ee131cf421e7cb97080bb8bc19
SHA256347b1a6d4c554b49bdf9ae324a6034b53f27ec0e2d8d8f2246265834cc5f9448
SHA512df7504c316303510ae7a0363b1dd095077e4ac5cd5d15686a0a73a450a7a994b7009b132648051eab816b47869d0f3631047a4cd25ea83731c1c3766bcd8e40d
-
Filesize
231KB
MD5c92fb5abbe7ad35ff73a2cb2d90cd87d
SHA1552f578c293a34ee131cf421e7cb97080bb8bc19
SHA256347b1a6d4c554b49bdf9ae324a6034b53f27ec0e2d8d8f2246265834cc5f9448
SHA512df7504c316303510ae7a0363b1dd095077e4ac5cd5d15686a0a73a450a7a994b7009b132648051eab816b47869d0f3631047a4cd25ea83731c1c3766bcd8e40d
-
Filesize
231KB
MD5c92fb5abbe7ad35ff73a2cb2d90cd87d
SHA1552f578c293a34ee131cf421e7cb97080bb8bc19
SHA256347b1a6d4c554b49bdf9ae324a6034b53f27ec0e2d8d8f2246265834cc5f9448
SHA512df7504c316303510ae7a0363b1dd095077e4ac5cd5d15686a0a73a450a7a994b7009b132648051eab816b47869d0f3631047a4cd25ea83731c1c3766bcd8e40d
-
Filesize
231KB
MD5c92fb5abbe7ad35ff73a2cb2d90cd87d
SHA1552f578c293a34ee131cf421e7cb97080bb8bc19
SHA256347b1a6d4c554b49bdf9ae324a6034b53f27ec0e2d8d8f2246265834cc5f9448
SHA512df7504c316303510ae7a0363b1dd095077e4ac5cd5d15686a0a73a450a7a994b7009b132648051eab816b47869d0f3631047a4cd25ea83731c1c3766bcd8e40d
-
Filesize
231KB
MD5c92fb5abbe7ad35ff73a2cb2d90cd87d
SHA1552f578c293a34ee131cf421e7cb97080bb8bc19
SHA256347b1a6d4c554b49bdf9ae324a6034b53f27ec0e2d8d8f2246265834cc5f9448
SHA512df7504c316303510ae7a0363b1dd095077e4ac5cd5d15686a0a73a450a7a994b7009b132648051eab816b47869d0f3631047a4cd25ea83731c1c3766bcd8e40d
-
Filesize
231KB
MD5c92fb5abbe7ad35ff73a2cb2d90cd87d
SHA1552f578c293a34ee131cf421e7cb97080bb8bc19
SHA256347b1a6d4c554b49bdf9ae324a6034b53f27ec0e2d8d8f2246265834cc5f9448
SHA512df7504c316303510ae7a0363b1dd095077e4ac5cd5d15686a0a73a450a7a994b7009b132648051eab816b47869d0f3631047a4cd25ea83731c1c3766bcd8e40d
-
Filesize
231KB
MD5c92fb5abbe7ad35ff73a2cb2d90cd87d
SHA1552f578c293a34ee131cf421e7cb97080bb8bc19
SHA256347b1a6d4c554b49bdf9ae324a6034b53f27ec0e2d8d8f2246265834cc5f9448
SHA512df7504c316303510ae7a0363b1dd095077e4ac5cd5d15686a0a73a450a7a994b7009b132648051eab816b47869d0f3631047a4cd25ea83731c1c3766bcd8e40d
-
Filesize
309KB
MD574a410f425b302da1c8f4398af5f5ad9
SHA1039a51b25a1f1cf62edc8e3a494830bc775e48a6
SHA256bb0701e7a1bd50c67b442f7c9075a729d5d00c5b3288cc8c32b749229f357594
SHA512f57fc22a4988859be25895c588e1c421b3cff0b96d0c9c274cb91ed11d058faecabd70bc186fa9f3641e9d07fd6c8e28a8cecca0a9c1d404c699cf9326e1163a
-
Filesize
309KB
MD574a410f425b302da1c8f4398af5f5ad9
SHA1039a51b25a1f1cf62edc8e3a494830bc775e48a6
SHA256bb0701e7a1bd50c67b442f7c9075a729d5d00c5b3288cc8c32b749229f357594
SHA512f57fc22a4988859be25895c588e1c421b3cff0b96d0c9c274cb91ed11d058faecabd70bc186fa9f3641e9d07fd6c8e28a8cecca0a9c1d404c699cf9326e1163a
-
Filesize
179KB
MD5f6d47157b0ace004b5afb75d623aa278
SHA1e59760af39832490b274306b535307a08d015cd9
SHA2560b5c9b44514b57dd7f62b8c84f132d798dc43e882d99ad7f5ba1e6104d0b2f68
SHA5123b1957f702a261a59cc851375e77bfd27ac79dd57e5442f92aeaef2ae90e61449fe7ee6ce960dab844cb37c0bea0188a909107d58a71043eaa6a9e59c19a9c5d
-
Filesize
179KB
MD5f6d47157b0ace004b5afb75d623aa278
SHA1e59760af39832490b274306b535307a08d015cd9
SHA2560b5c9b44514b57dd7f62b8c84f132d798dc43e882d99ad7f5ba1e6104d0b2f68
SHA5123b1957f702a261a59cc851375e77bfd27ac79dd57e5442f92aeaef2ae90e61449fe7ee6ce960dab844cb37c0bea0188a909107d58a71043eaa6a9e59c19a9c5d
-
Filesize
168KB
MD544e00bb5d68bffa02a3998bf8f26d385
SHA1ae04609a368d49c4ae43c8828cb0aebf9faf5f33
SHA2562455200a3adafc965fb90c5bbfe79f735ff12b14b283cfc7dd3867dc45bebd28
SHA512b9e6bfe9523a342194974e8ce584e166daef7f8058391fafbbebaf051f915c69553b4bf764f3c4f6b12c4313d716c4788e3b001ac62ea5a7a331c74b9d47b298
-
Filesize
168KB
MD544e00bb5d68bffa02a3998bf8f26d385
SHA1ae04609a368d49c4ae43c8828cb0aebf9faf5f33
SHA2562455200a3adafc965fb90c5bbfe79f735ff12b14b283cfc7dd3867dc45bebd28
SHA512b9e6bfe9523a342194974e8ce584e166daef7f8058391fafbbebaf051f915c69553b4bf764f3c4f6b12c4313d716c4788e3b001ac62ea5a7a331c74b9d47b298
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5