Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe
Resource
win10v2004-20230220-en
General
-
Target
5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe
-
Size
479KB
-
MD5
4273929f460efa3c6bad7d61b291e7a3
-
SHA1
839b2c23b5210841e391c7236c4a82f121736029
-
SHA256
5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d
-
SHA512
010da4467f3b479732a015c3d1d8818bf976bf3a3a7e1db10375bace905b67da4ba98c8b805b95e66db61f7599dc60daa19fb80fb51e947ff4acad366558be26
-
SSDEEP
6144:Kpy+bnr+qp0yN90QEtTvSovepEUIcnebXkzmBS2QqY+aget9R252UoXAqrnAlygo:bMrqy907vDc609GY+agEZOB4eBc
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7416380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7416380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7416380.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h7416380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7416380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7416380.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation i3521752.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4944 x6234638.exe 2148 g0291075.exe 1172 h7416380.exe 4064 i3521752.exe 3080 oneetx.exe 3432 oneetx.exe 4740 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4484 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h7416380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h7416380.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6234638.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6234638.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 496 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2148 g0291075.exe 2148 g0291075.exe 1172 h7416380.exe 1172 h7416380.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2148 g0291075.exe Token: SeDebugPrivilege 1172 h7416380.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4064 i3521752.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1128 wrote to memory of 4944 1128 5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe 85 PID 1128 wrote to memory of 4944 1128 5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe 85 PID 1128 wrote to memory of 4944 1128 5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe 85 PID 4944 wrote to memory of 2148 4944 x6234638.exe 86 PID 4944 wrote to memory of 2148 4944 x6234638.exe 86 PID 4944 wrote to memory of 2148 4944 x6234638.exe 86 PID 4944 wrote to memory of 1172 4944 x6234638.exe 93 PID 4944 wrote to memory of 1172 4944 x6234638.exe 93 PID 4944 wrote to memory of 1172 4944 x6234638.exe 93 PID 1128 wrote to memory of 4064 1128 5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe 94 PID 1128 wrote to memory of 4064 1128 5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe 94 PID 1128 wrote to memory of 4064 1128 5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe 94 PID 4064 wrote to memory of 3080 4064 i3521752.exe 95 PID 4064 wrote to memory of 3080 4064 i3521752.exe 95 PID 4064 wrote to memory of 3080 4064 i3521752.exe 95 PID 3080 wrote to memory of 496 3080 oneetx.exe 96 PID 3080 wrote to memory of 496 3080 oneetx.exe 96 PID 3080 wrote to memory of 496 3080 oneetx.exe 96 PID 3080 wrote to memory of 2548 3080 oneetx.exe 98 PID 3080 wrote to memory of 2548 3080 oneetx.exe 98 PID 3080 wrote to memory of 2548 3080 oneetx.exe 98 PID 2548 wrote to memory of 5048 2548 cmd.exe 100 PID 2548 wrote to memory of 5048 2548 cmd.exe 100 PID 2548 wrote to memory of 5048 2548 cmd.exe 100 PID 2548 wrote to memory of 2832 2548 cmd.exe 101 PID 2548 wrote to memory of 2832 2548 cmd.exe 101 PID 2548 wrote to memory of 2832 2548 cmd.exe 101 PID 2548 wrote to memory of 4964 2548 cmd.exe 102 PID 2548 wrote to memory of 4964 2548 cmd.exe 102 PID 2548 wrote to memory of 4964 2548 cmd.exe 102 PID 2548 wrote to memory of 336 2548 cmd.exe 103 PID 2548 wrote to memory of 336 2548 cmd.exe 103 PID 2548 wrote to memory of 336 2548 cmd.exe 103 PID 2548 wrote to memory of 3748 2548 cmd.exe 104 PID 2548 wrote to memory of 3748 2548 cmd.exe 104 PID 2548 wrote to memory of 3748 2548 cmd.exe 104 PID 2548 wrote to memory of 1148 2548 cmd.exe 105 PID 2548 wrote to memory of 1148 2548 cmd.exe 105 PID 2548 wrote to memory of 1148 2548 cmd.exe 105 PID 3080 wrote to memory of 4484 3080 oneetx.exe 108 PID 3080 wrote to memory of 4484 3080 oneetx.exe 108 PID 3080 wrote to memory of 4484 3080 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe"C:\Users\Admin\AppData\Local\Temp\5b1a0da1e9cbb380b0692073dd1f036dcb920d7df7e0967744f00cac9fd6dc3d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6234638.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6234638.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0291075.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0291075.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7416380.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7416380.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3521752.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3521752.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:496
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1148
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3432
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5753b2f8c8c94464ed6c1d1f1cc9f3957
SHA19668d2960ed2442e46377a2ca28eacd671f80816
SHA2560b44cc0586512cc3898087894445a5928156ec339f6427a2eed642c28375e354
SHA5123c05faf313dbdcf29cf23d2894914083d5d64cf9b9f67614ca4db3b6cd3af0dadd6f2d3e4acc60c0ce85b1a0fad8ad5bf06f3642df1ddaeae78bda607ca51a81
-
Filesize
210KB
MD5753b2f8c8c94464ed6c1d1f1cc9f3957
SHA19668d2960ed2442e46377a2ca28eacd671f80816
SHA2560b44cc0586512cc3898087894445a5928156ec339f6427a2eed642c28375e354
SHA5123c05faf313dbdcf29cf23d2894914083d5d64cf9b9f67614ca4db3b6cd3af0dadd6f2d3e4acc60c0ce85b1a0fad8ad5bf06f3642df1ddaeae78bda607ca51a81
-
Filesize
307KB
MD561eef9bc1dfbd6863ba3fd6043fdfd34
SHA1fe96bf501f4354c8d3517bb57f726e18448ef968
SHA256ae886e98e1326f482fdf6e7e1bcaf7d662f0bd021a94b7eee3e6bec0298759cf
SHA512d68790d3f8fa9757520f6f7a630029a8799416a1f61a9ad1a1d0f5a16c33fece646ad8c20583b34de45fdedadc64e0437190ea123620f85f86dc3d827637fe92
-
Filesize
307KB
MD561eef9bc1dfbd6863ba3fd6043fdfd34
SHA1fe96bf501f4354c8d3517bb57f726e18448ef968
SHA256ae886e98e1326f482fdf6e7e1bcaf7d662f0bd021a94b7eee3e6bec0298759cf
SHA512d68790d3f8fa9757520f6f7a630029a8799416a1f61a9ad1a1d0f5a16c33fece646ad8c20583b34de45fdedadc64e0437190ea123620f85f86dc3d827637fe92
-
Filesize
168KB
MD54c35b0e803f6c961930db300a2beb7d4
SHA17d4fa8b5509bb33058fe510938ce98ebd401a503
SHA2566914e695d1d42e521c8960417307489630cbe10bc29935dfa00a0ea61906e407
SHA5121cfa2f0440b3d7a9ac726e3dfea24997abc66430deba9d014d3dae16664251bf544d219592f85194a570214ff2953bbe016522370cc46ed7451864dd87683320
-
Filesize
168KB
MD54c35b0e803f6c961930db300a2beb7d4
SHA17d4fa8b5509bb33058fe510938ce98ebd401a503
SHA2566914e695d1d42e521c8960417307489630cbe10bc29935dfa00a0ea61906e407
SHA5121cfa2f0440b3d7a9ac726e3dfea24997abc66430deba9d014d3dae16664251bf544d219592f85194a570214ff2953bbe016522370cc46ed7451864dd87683320
-
Filesize
179KB
MD51cc89d986d84d7398ec496e00c9b245e
SHA1ca163e7d82f34adc69000c68174b056bb9cd4240
SHA256517eabaab22a429f2ac9bece0f94e839adf1b98e4d79790ee1db6464b13cba6a
SHA5120d52e10f7120536ed5a8d1d85a2c5732f918492cb4a8fcbdacb246537237ef593998965e2bd3b641e2f154170a2f940128b538537bfbddf5bedd1e9539031155
-
Filesize
179KB
MD51cc89d986d84d7398ec496e00c9b245e
SHA1ca163e7d82f34adc69000c68174b056bb9cd4240
SHA256517eabaab22a429f2ac9bece0f94e839adf1b98e4d79790ee1db6464b13cba6a
SHA5120d52e10f7120536ed5a8d1d85a2c5732f918492cb4a8fcbdacb246537237ef593998965e2bd3b641e2f154170a2f940128b538537bfbddf5bedd1e9539031155
-
Filesize
210KB
MD5753b2f8c8c94464ed6c1d1f1cc9f3957
SHA19668d2960ed2442e46377a2ca28eacd671f80816
SHA2560b44cc0586512cc3898087894445a5928156ec339f6427a2eed642c28375e354
SHA5123c05faf313dbdcf29cf23d2894914083d5d64cf9b9f67614ca4db3b6cd3af0dadd6f2d3e4acc60c0ce85b1a0fad8ad5bf06f3642df1ddaeae78bda607ca51a81
-
Filesize
210KB
MD5753b2f8c8c94464ed6c1d1f1cc9f3957
SHA19668d2960ed2442e46377a2ca28eacd671f80816
SHA2560b44cc0586512cc3898087894445a5928156ec339f6427a2eed642c28375e354
SHA5123c05faf313dbdcf29cf23d2894914083d5d64cf9b9f67614ca4db3b6cd3af0dadd6f2d3e4acc60c0ce85b1a0fad8ad5bf06f3642df1ddaeae78bda607ca51a81
-
Filesize
210KB
MD5753b2f8c8c94464ed6c1d1f1cc9f3957
SHA19668d2960ed2442e46377a2ca28eacd671f80816
SHA2560b44cc0586512cc3898087894445a5928156ec339f6427a2eed642c28375e354
SHA5123c05faf313dbdcf29cf23d2894914083d5d64cf9b9f67614ca4db3b6cd3af0dadd6f2d3e4acc60c0ce85b1a0fad8ad5bf06f3642df1ddaeae78bda607ca51a81
-
Filesize
210KB
MD5753b2f8c8c94464ed6c1d1f1cc9f3957
SHA19668d2960ed2442e46377a2ca28eacd671f80816
SHA2560b44cc0586512cc3898087894445a5928156ec339f6427a2eed642c28375e354
SHA5123c05faf313dbdcf29cf23d2894914083d5d64cf9b9f67614ca4db3b6cd3af0dadd6f2d3e4acc60c0ce85b1a0fad8ad5bf06f3642df1ddaeae78bda607ca51a81
-
Filesize
210KB
MD5753b2f8c8c94464ed6c1d1f1cc9f3957
SHA19668d2960ed2442e46377a2ca28eacd671f80816
SHA2560b44cc0586512cc3898087894445a5928156ec339f6427a2eed642c28375e354
SHA5123c05faf313dbdcf29cf23d2894914083d5d64cf9b9f67614ca4db3b6cd3af0dadd6f2d3e4acc60c0ce85b1a0fad8ad5bf06f3642df1ddaeae78bda607ca51a81
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5