Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe
Resource
win10v2004-20230220-en
General
-
Target
4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe
-
Size
479KB
-
MD5
c099511b05a276739e6854d5f927854f
-
SHA1
61191387fb320ce9153769cb405f4b61c443cbe5
-
SHA256
4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e
-
SHA512
8511a71c48eda1b5305fc626a68931371489f3c1b1839c269b4dc3ee9f2d89d2ab49c2834c53b306bf61ff68e27f461b257d7fc526bdec93c5b38c09a616f53d
-
SSDEEP
6144:Kly+bnr+Ap0yN90QEq4dQhlaZglvafwstPxQxsz6lGRoYy1f2Lw4Pd8s+3ZYL:LMrIy9044AlWCvJstSi2VQv9O2
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h2627871.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h2627871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h2627871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h2627871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h2627871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h2627871.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation i6025939.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4156 x7930477.exe 1164 g8092928.exe 3668 h2627871.exe 4944 i6025939.exe 1480 oneetx.exe 1352 oneetx.exe 1332 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4480 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h2627871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h2627871.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7930477.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7930477.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1164 g8092928.exe 1164 g8092928.exe 3668 h2627871.exe 3668 h2627871.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1164 g8092928.exe Token: SeDebugPrivilege 3668 h2627871.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4944 i6025939.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3312 wrote to memory of 4156 3312 4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe 84 PID 3312 wrote to memory of 4156 3312 4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe 84 PID 3312 wrote to memory of 4156 3312 4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe 84 PID 4156 wrote to memory of 1164 4156 x7930477.exe 85 PID 4156 wrote to memory of 1164 4156 x7930477.exe 85 PID 4156 wrote to memory of 1164 4156 x7930477.exe 85 PID 4156 wrote to memory of 3668 4156 x7930477.exe 92 PID 4156 wrote to memory of 3668 4156 x7930477.exe 92 PID 4156 wrote to memory of 3668 4156 x7930477.exe 92 PID 3312 wrote to memory of 4944 3312 4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe 93 PID 3312 wrote to memory of 4944 3312 4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe 93 PID 3312 wrote to memory of 4944 3312 4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe 93 PID 4944 wrote to memory of 1480 4944 i6025939.exe 94 PID 4944 wrote to memory of 1480 4944 i6025939.exe 94 PID 4944 wrote to memory of 1480 4944 i6025939.exe 94 PID 1480 wrote to memory of 2648 1480 oneetx.exe 95 PID 1480 wrote to memory of 2648 1480 oneetx.exe 95 PID 1480 wrote to memory of 2648 1480 oneetx.exe 95 PID 1480 wrote to memory of 1788 1480 oneetx.exe 97 PID 1480 wrote to memory of 1788 1480 oneetx.exe 97 PID 1480 wrote to memory of 1788 1480 oneetx.exe 97 PID 1788 wrote to memory of 4776 1788 cmd.exe 99 PID 1788 wrote to memory of 4776 1788 cmd.exe 99 PID 1788 wrote to memory of 4776 1788 cmd.exe 99 PID 1788 wrote to memory of 3436 1788 cmd.exe 100 PID 1788 wrote to memory of 3436 1788 cmd.exe 100 PID 1788 wrote to memory of 3436 1788 cmd.exe 100 PID 1788 wrote to memory of 4756 1788 cmd.exe 101 PID 1788 wrote to memory of 4756 1788 cmd.exe 101 PID 1788 wrote to memory of 4756 1788 cmd.exe 101 PID 1788 wrote to memory of 448 1788 cmd.exe 103 PID 1788 wrote to memory of 448 1788 cmd.exe 103 PID 1788 wrote to memory of 448 1788 cmd.exe 103 PID 1788 wrote to memory of 1228 1788 cmd.exe 104 PID 1788 wrote to memory of 1228 1788 cmd.exe 104 PID 1788 wrote to memory of 1228 1788 cmd.exe 104 PID 1788 wrote to memory of 2704 1788 cmd.exe 105 PID 1788 wrote to memory of 2704 1788 cmd.exe 105 PID 1788 wrote to memory of 2704 1788 cmd.exe 105 PID 1480 wrote to memory of 4480 1480 oneetx.exe 109 PID 1480 wrote to memory of 4480 1480 oneetx.exe 109 PID 1480 wrote to memory of 4480 1480 oneetx.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe"C:\Users\Admin\AppData\Local\Temp\4fe174034d8acc970e9175f7b2a709d0c61332007f754c7f6de0438cccda3d7e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7930477.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7930477.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8092928.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8092928.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2627871.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2627871.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6025939.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6025939.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2648
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2704
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1352
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5618dbd17350a9b5e85bd64b638dfd4d8
SHA1688562f7df4046ece6bdbfabd33c17988aca1e1f
SHA2564fa8a146907dd99b3fc6202e6679e1a4a7d97836013f5518fced2f40fb565517
SHA512d9a82613d3ac95d8bd55d7d229683708cd70c4f4de79db0e783080e57db0f3f322962e7613759db0cc99ad6c9bb6b88edf5f90e6109422ed6d1776d75356b528
-
Filesize
210KB
MD5618dbd17350a9b5e85bd64b638dfd4d8
SHA1688562f7df4046ece6bdbfabd33c17988aca1e1f
SHA2564fa8a146907dd99b3fc6202e6679e1a4a7d97836013f5518fced2f40fb565517
SHA512d9a82613d3ac95d8bd55d7d229683708cd70c4f4de79db0e783080e57db0f3f322962e7613759db0cc99ad6c9bb6b88edf5f90e6109422ed6d1776d75356b528
-
Filesize
307KB
MD5eaa2bc694248ab45f7be7e09fa54086d
SHA175ca319c0e303dd9cf35257aedbae70a77f318c7
SHA2568c06d1e8760e626eea66b84d1c4180dfc0b9402653fea9b6cb4ec61f8a886f72
SHA5129b25ce2b07e24829cd04a56e4a72c037c7fd7ea879c6a76cdaaf48b6442e71a382d77287effae93047f04baf7ed9c906bfee15bb1e1d1dec05d16746d6822f60
-
Filesize
307KB
MD5eaa2bc694248ab45f7be7e09fa54086d
SHA175ca319c0e303dd9cf35257aedbae70a77f318c7
SHA2568c06d1e8760e626eea66b84d1c4180dfc0b9402653fea9b6cb4ec61f8a886f72
SHA5129b25ce2b07e24829cd04a56e4a72c037c7fd7ea879c6a76cdaaf48b6442e71a382d77287effae93047f04baf7ed9c906bfee15bb1e1d1dec05d16746d6822f60
-
Filesize
168KB
MD51337bc77729170b6bac7100d5a945e02
SHA16c28c1ac201e46fea0c57428be4386c88b6b409b
SHA2565d584d94f3442e54f03535e89412e19e611f142e7dae5787e7ec45d484d636a9
SHA5122ef590293447470d5666d17744ea86780c8e256f3411db7c6dff29ad844031e22c0fe5efba9d9177992377166f066eb4d6446e520cfbead573fd7bc428bd17e9
-
Filesize
168KB
MD51337bc77729170b6bac7100d5a945e02
SHA16c28c1ac201e46fea0c57428be4386c88b6b409b
SHA2565d584d94f3442e54f03535e89412e19e611f142e7dae5787e7ec45d484d636a9
SHA5122ef590293447470d5666d17744ea86780c8e256f3411db7c6dff29ad844031e22c0fe5efba9d9177992377166f066eb4d6446e520cfbead573fd7bc428bd17e9
-
Filesize
179KB
MD58a0148e951456704bb630dc8962c3a2f
SHA18d06b5e2d51955eb2856f0af56b2c9d9311fbcf1
SHA25651c12c6643413caa8a6fd5a8ab925f506155241be63e95b008b6edbbe31a078b
SHA5127cb10566e9439fe2a35856f972bdef0790d27bea446f7c99d5beb9dfe02f348bddf0046acfdd64ad78e4596ad12e6459cee7207782f9893934ce72755bf2e2f1
-
Filesize
179KB
MD58a0148e951456704bb630dc8962c3a2f
SHA18d06b5e2d51955eb2856f0af56b2c9d9311fbcf1
SHA25651c12c6643413caa8a6fd5a8ab925f506155241be63e95b008b6edbbe31a078b
SHA5127cb10566e9439fe2a35856f972bdef0790d27bea446f7c99d5beb9dfe02f348bddf0046acfdd64ad78e4596ad12e6459cee7207782f9893934ce72755bf2e2f1
-
Filesize
210KB
MD5618dbd17350a9b5e85bd64b638dfd4d8
SHA1688562f7df4046ece6bdbfabd33c17988aca1e1f
SHA2564fa8a146907dd99b3fc6202e6679e1a4a7d97836013f5518fced2f40fb565517
SHA512d9a82613d3ac95d8bd55d7d229683708cd70c4f4de79db0e783080e57db0f3f322962e7613759db0cc99ad6c9bb6b88edf5f90e6109422ed6d1776d75356b528
-
Filesize
210KB
MD5618dbd17350a9b5e85bd64b638dfd4d8
SHA1688562f7df4046ece6bdbfabd33c17988aca1e1f
SHA2564fa8a146907dd99b3fc6202e6679e1a4a7d97836013f5518fced2f40fb565517
SHA512d9a82613d3ac95d8bd55d7d229683708cd70c4f4de79db0e783080e57db0f3f322962e7613759db0cc99ad6c9bb6b88edf5f90e6109422ed6d1776d75356b528
-
Filesize
210KB
MD5618dbd17350a9b5e85bd64b638dfd4d8
SHA1688562f7df4046ece6bdbfabd33c17988aca1e1f
SHA2564fa8a146907dd99b3fc6202e6679e1a4a7d97836013f5518fced2f40fb565517
SHA512d9a82613d3ac95d8bd55d7d229683708cd70c4f4de79db0e783080e57db0f3f322962e7613759db0cc99ad6c9bb6b88edf5f90e6109422ed6d1776d75356b528
-
Filesize
210KB
MD5618dbd17350a9b5e85bd64b638dfd4d8
SHA1688562f7df4046ece6bdbfabd33c17988aca1e1f
SHA2564fa8a146907dd99b3fc6202e6679e1a4a7d97836013f5518fced2f40fb565517
SHA512d9a82613d3ac95d8bd55d7d229683708cd70c4f4de79db0e783080e57db0f3f322962e7613759db0cc99ad6c9bb6b88edf5f90e6109422ed6d1776d75356b528
-
Filesize
210KB
MD5618dbd17350a9b5e85bd64b638dfd4d8
SHA1688562f7df4046ece6bdbfabd33c17988aca1e1f
SHA2564fa8a146907dd99b3fc6202e6679e1a4a7d97836013f5518fced2f40fb565517
SHA512d9a82613d3ac95d8bd55d7d229683708cd70c4f4de79db0e783080e57db0f3f322962e7613759db0cc99ad6c9bb6b88edf5f90e6109422ed6d1776d75356b528
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5