Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe
Resource
win10v2004-20230220-en
General
-
Target
78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe
-
Size
479KB
-
MD5
a1e86f08ee5e2a5745b51d7a597d34ff
-
SHA1
ce4c16e6ff24a1d360d5500fabc9836481ddd2aa
-
SHA256
78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da
-
SHA512
1f1236bdd67bd30b44924e2bd5c4a211dc41882b1fb28258d26f312c86152a0583776adf39de8d1ac5488a63af2662e78aff605a80ecdcff1cf354917f74fbac
-
SSDEEP
12288:6MrUy90D75vZtGnA5c1u31tT5FT3RnPyOycxQ3X:6yQB8nIXjTvRnEYa
Malware Config
Extracted
redline
dona
217.196.96.101:4132
-
auth_value
9fbb198992bbc83a84ab1f21384813e3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3471797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3471797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3471797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3471797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3471797.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k3471797.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m5263275.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 2816 y4246353.exe 4432 k3471797.exe 5100 l9562395.exe 860 m5263275.exe 1656 oneetx.exe 2220 oneetx.exe 2676 oneetx.exe 2120 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4912 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3471797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3471797.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4246353.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4246353.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4432 k3471797.exe 4432 k3471797.exe 5100 l9562395.exe 5100 l9562395.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4432 k3471797.exe Token: SeDebugPrivilege 5100 l9562395.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 860 m5263275.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5040 wrote to memory of 2816 5040 78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe 83 PID 5040 wrote to memory of 2816 5040 78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe 83 PID 5040 wrote to memory of 2816 5040 78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe 83 PID 2816 wrote to memory of 4432 2816 y4246353.exe 84 PID 2816 wrote to memory of 4432 2816 y4246353.exe 84 PID 2816 wrote to memory of 4432 2816 y4246353.exe 84 PID 2816 wrote to memory of 5100 2816 y4246353.exe 88 PID 2816 wrote to memory of 5100 2816 y4246353.exe 88 PID 2816 wrote to memory of 5100 2816 y4246353.exe 88 PID 5040 wrote to memory of 860 5040 78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe 89 PID 5040 wrote to memory of 860 5040 78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe 89 PID 5040 wrote to memory of 860 5040 78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe 89 PID 860 wrote to memory of 1656 860 m5263275.exe 90 PID 860 wrote to memory of 1656 860 m5263275.exe 90 PID 860 wrote to memory of 1656 860 m5263275.exe 90 PID 1656 wrote to memory of 1520 1656 oneetx.exe 91 PID 1656 wrote to memory of 1520 1656 oneetx.exe 91 PID 1656 wrote to memory of 1520 1656 oneetx.exe 91 PID 1656 wrote to memory of 324 1656 oneetx.exe 93 PID 1656 wrote to memory of 324 1656 oneetx.exe 93 PID 1656 wrote to memory of 324 1656 oneetx.exe 93 PID 324 wrote to memory of 1324 324 cmd.exe 95 PID 324 wrote to memory of 1324 324 cmd.exe 95 PID 324 wrote to memory of 1324 324 cmd.exe 95 PID 324 wrote to memory of 4044 324 cmd.exe 96 PID 324 wrote to memory of 4044 324 cmd.exe 96 PID 324 wrote to memory of 4044 324 cmd.exe 96 PID 324 wrote to memory of 3788 324 cmd.exe 97 PID 324 wrote to memory of 3788 324 cmd.exe 97 PID 324 wrote to memory of 3788 324 cmd.exe 97 PID 324 wrote to memory of 4744 324 cmd.exe 98 PID 324 wrote to memory of 4744 324 cmd.exe 98 PID 324 wrote to memory of 4744 324 cmd.exe 98 PID 324 wrote to memory of 404 324 cmd.exe 99 PID 324 wrote to memory of 404 324 cmd.exe 99 PID 324 wrote to memory of 404 324 cmd.exe 99 PID 324 wrote to memory of 4908 324 cmd.exe 100 PID 324 wrote to memory of 4908 324 cmd.exe 100 PID 324 wrote to memory of 4908 324 cmd.exe 100 PID 1656 wrote to memory of 4912 1656 oneetx.exe 107 PID 1656 wrote to memory of 4912 1656 oneetx.exe 107 PID 1656 wrote to memory of 4912 1656 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe"C:\Users\Admin\AppData\Local\Temp\78925821dd8bc3a8ce911af6f285f7fa82813588e19b1d301a1be0e8507176da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4246353.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4246353.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3471797.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3471797.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9562395.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9562395.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5263275.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5263275.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4044
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:404
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4908
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2220
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2676
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD52104a618f017280bb3deb31910935df3
SHA1b086be6ae2a152a781b0756192e91e173f7ff7a3
SHA256db62bc48ce6d72b61b50401314421c646780e273b0e4eb8c220e253cb9a80b08
SHA512fe4c5e618dd082aa7528b7d7a10c7ea09505b62301248376fd9429c6e1d275f13220a2cb2a4f1bfab582d27f8770bcdcdac0fd4dabb7358d85f45977fda796ee
-
Filesize
210KB
MD52104a618f017280bb3deb31910935df3
SHA1b086be6ae2a152a781b0756192e91e173f7ff7a3
SHA256db62bc48ce6d72b61b50401314421c646780e273b0e4eb8c220e253cb9a80b08
SHA512fe4c5e618dd082aa7528b7d7a10c7ea09505b62301248376fd9429c6e1d275f13220a2cb2a4f1bfab582d27f8770bcdcdac0fd4dabb7358d85f45977fda796ee
-
Filesize
307KB
MD5c1c35e4d5b791b84fa65665761fc8909
SHA126a99e72380b0b4af232c60d80466cc4132829e8
SHA2560d7ef9173a92470a17a502ea4c833318d8859f0fc495350075a8e1c9213bb2b3
SHA512b6044bd0d6ef0e35e8279981c5eb79e825f98793ad6a6f44a9b08fc2eeaed88d907da7317523b782e9443c2e923f78fdbb70844f683e6f834fc643c7767ee443
-
Filesize
307KB
MD5c1c35e4d5b791b84fa65665761fc8909
SHA126a99e72380b0b4af232c60d80466cc4132829e8
SHA2560d7ef9173a92470a17a502ea4c833318d8859f0fc495350075a8e1c9213bb2b3
SHA512b6044bd0d6ef0e35e8279981c5eb79e825f98793ad6a6f44a9b08fc2eeaed88d907da7317523b782e9443c2e923f78fdbb70844f683e6f834fc643c7767ee443
-
Filesize
179KB
MD51caff6b3c9a254d6acf326a787f5b654
SHA1bd91f373b40e659f371649e39e09a971f4bd17cc
SHA25671c9a567c188f7923cae37b5c6db52cc2688cf6e4cb022a6d9314271813b2c0a
SHA5126efc66d799e794268f74a00fa82a231dee3efad7fdf30f3ba891b75bbe5b798e938564b9d0a198472b48d826472e62fee189fb25c4e17a6ebbbe1ea379e5c2b2
-
Filesize
179KB
MD51caff6b3c9a254d6acf326a787f5b654
SHA1bd91f373b40e659f371649e39e09a971f4bd17cc
SHA25671c9a567c188f7923cae37b5c6db52cc2688cf6e4cb022a6d9314271813b2c0a
SHA5126efc66d799e794268f74a00fa82a231dee3efad7fdf30f3ba891b75bbe5b798e938564b9d0a198472b48d826472e62fee189fb25c4e17a6ebbbe1ea379e5c2b2
-
Filesize
168KB
MD5f170115e1810a4540337c94570b0b2c3
SHA1ab385f362e0542eab44c098dfcb15c4e38b87001
SHA256209ae69dce265d4eb957ac8af5fb7dc5bf7ae20c61736f28c8fe9ccbfa18a537
SHA512d24b6b236d583811db1370fcd278b0d4b3dc4f9a0ed08ae674c082612fba3ab35a1f5d003c26b41c6fd6265596914a756cc083093feef7903a5f54e576ac87a1
-
Filesize
168KB
MD5f170115e1810a4540337c94570b0b2c3
SHA1ab385f362e0542eab44c098dfcb15c4e38b87001
SHA256209ae69dce265d4eb957ac8af5fb7dc5bf7ae20c61736f28c8fe9ccbfa18a537
SHA512d24b6b236d583811db1370fcd278b0d4b3dc4f9a0ed08ae674c082612fba3ab35a1f5d003c26b41c6fd6265596914a756cc083093feef7903a5f54e576ac87a1
-
Filesize
210KB
MD52104a618f017280bb3deb31910935df3
SHA1b086be6ae2a152a781b0756192e91e173f7ff7a3
SHA256db62bc48ce6d72b61b50401314421c646780e273b0e4eb8c220e253cb9a80b08
SHA512fe4c5e618dd082aa7528b7d7a10c7ea09505b62301248376fd9429c6e1d275f13220a2cb2a4f1bfab582d27f8770bcdcdac0fd4dabb7358d85f45977fda796ee
-
Filesize
210KB
MD52104a618f017280bb3deb31910935df3
SHA1b086be6ae2a152a781b0756192e91e173f7ff7a3
SHA256db62bc48ce6d72b61b50401314421c646780e273b0e4eb8c220e253cb9a80b08
SHA512fe4c5e618dd082aa7528b7d7a10c7ea09505b62301248376fd9429c6e1d275f13220a2cb2a4f1bfab582d27f8770bcdcdac0fd4dabb7358d85f45977fda796ee
-
Filesize
210KB
MD52104a618f017280bb3deb31910935df3
SHA1b086be6ae2a152a781b0756192e91e173f7ff7a3
SHA256db62bc48ce6d72b61b50401314421c646780e273b0e4eb8c220e253cb9a80b08
SHA512fe4c5e618dd082aa7528b7d7a10c7ea09505b62301248376fd9429c6e1d275f13220a2cb2a4f1bfab582d27f8770bcdcdac0fd4dabb7358d85f45977fda796ee
-
Filesize
210KB
MD52104a618f017280bb3deb31910935df3
SHA1b086be6ae2a152a781b0756192e91e173f7ff7a3
SHA256db62bc48ce6d72b61b50401314421c646780e273b0e4eb8c220e253cb9a80b08
SHA512fe4c5e618dd082aa7528b7d7a10c7ea09505b62301248376fd9429c6e1d275f13220a2cb2a4f1bfab582d27f8770bcdcdac0fd4dabb7358d85f45977fda796ee
-
Filesize
210KB
MD52104a618f017280bb3deb31910935df3
SHA1b086be6ae2a152a781b0756192e91e173f7ff7a3
SHA256db62bc48ce6d72b61b50401314421c646780e273b0e4eb8c220e253cb9a80b08
SHA512fe4c5e618dd082aa7528b7d7a10c7ea09505b62301248376fd9429c6e1d275f13220a2cb2a4f1bfab582d27f8770bcdcdac0fd4dabb7358d85f45977fda796ee
-
Filesize
210KB
MD52104a618f017280bb3deb31910935df3
SHA1b086be6ae2a152a781b0756192e91e173f7ff7a3
SHA256db62bc48ce6d72b61b50401314421c646780e273b0e4eb8c220e253cb9a80b08
SHA512fe4c5e618dd082aa7528b7d7a10c7ea09505b62301248376fd9429c6e1d275f13220a2cb2a4f1bfab582d27f8770bcdcdac0fd4dabb7358d85f45977fda796ee
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5