Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe
Resource
win10v2004-20230220-en
General
-
Target
cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe
-
Size
479KB
-
MD5
c3c9feb1bb13682f77b213720f366770
-
SHA1
4954a562b71ee96db586df9f6d281f185506584b
-
SHA256
cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb
-
SHA512
a9822d082cd7b4f5d2a4942951a5db60257bcf6c8fb1f730e89eb22481e9341c4ff1c35ae25b6fb625982a4091d5ff4e5f516199dfd35d64fdbe355b73eebe13
-
SSDEEP
12288:9Mrcy90psiQRjSSVCDVrXLozt1tWdSD32bA0:1yCsBj1VCetWdlbl
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k6844771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6844771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6844771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6844771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6844771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6844771.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m6623210.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1556 y5300338.exe 4936 k6844771.exe 2640 l7270357.exe 3680 m6623210.exe 1140 oneetx.exe 1328 oneetx.exe 4964 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3772 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k6844771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6844771.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5300338.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5300338.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3716 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4472 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4936 k6844771.exe 4936 k6844771.exe 2640 l7270357.exe 2640 l7270357.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4936 k6844771.exe Token: SeDebugPrivilege 2640 l7270357.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3680 m6623210.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4772 wrote to memory of 1556 4772 cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe 84 PID 4772 wrote to memory of 1556 4772 cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe 84 PID 4772 wrote to memory of 1556 4772 cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe 84 PID 1556 wrote to memory of 4936 1556 y5300338.exe 85 PID 1556 wrote to memory of 4936 1556 y5300338.exe 85 PID 1556 wrote to memory of 4936 1556 y5300338.exe 85 PID 1556 wrote to memory of 2640 1556 y5300338.exe 89 PID 1556 wrote to memory of 2640 1556 y5300338.exe 89 PID 1556 wrote to memory of 2640 1556 y5300338.exe 89 PID 4772 wrote to memory of 3680 4772 cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe 90 PID 4772 wrote to memory of 3680 4772 cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe 90 PID 4772 wrote to memory of 3680 4772 cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe 90 PID 3680 wrote to memory of 1140 3680 m6623210.exe 91 PID 3680 wrote to memory of 1140 3680 m6623210.exe 91 PID 3680 wrote to memory of 1140 3680 m6623210.exe 91 PID 1140 wrote to memory of 4472 1140 oneetx.exe 92 PID 1140 wrote to memory of 4472 1140 oneetx.exe 92 PID 1140 wrote to memory of 4472 1140 oneetx.exe 92 PID 1140 wrote to memory of 2292 1140 oneetx.exe 94 PID 1140 wrote to memory of 2292 1140 oneetx.exe 94 PID 1140 wrote to memory of 2292 1140 oneetx.exe 94 PID 2292 wrote to memory of 2544 2292 cmd.exe 96 PID 2292 wrote to memory of 2544 2292 cmd.exe 96 PID 2292 wrote to memory of 2544 2292 cmd.exe 96 PID 2292 wrote to memory of 3100 2292 cmd.exe 97 PID 2292 wrote to memory of 3100 2292 cmd.exe 97 PID 2292 wrote to memory of 3100 2292 cmd.exe 97 PID 2292 wrote to memory of 3088 2292 cmd.exe 98 PID 2292 wrote to memory of 3088 2292 cmd.exe 98 PID 2292 wrote to memory of 3088 2292 cmd.exe 98 PID 2292 wrote to memory of 4292 2292 cmd.exe 99 PID 2292 wrote to memory of 4292 2292 cmd.exe 99 PID 2292 wrote to memory of 4292 2292 cmd.exe 99 PID 2292 wrote to memory of 3996 2292 cmd.exe 100 PID 2292 wrote to memory of 3996 2292 cmd.exe 100 PID 2292 wrote to memory of 3996 2292 cmd.exe 100 PID 2292 wrote to memory of 3404 2292 cmd.exe 101 PID 2292 wrote to memory of 3404 2292 cmd.exe 101 PID 2292 wrote to memory of 3404 2292 cmd.exe 101 PID 1140 wrote to memory of 3772 1140 oneetx.exe 108 PID 1140 wrote to memory of 3772 1140 oneetx.exe 108 PID 1140 wrote to memory of 3772 1140 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe"C:\Users\Admin\AppData\Local\Temp\cb040701aa1d6b4106efab4eec5f2355b18af9ebd6e70694931215e51ba430bb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5300338.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5300338.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6844771.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6844771.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7270357.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7270357.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6623210.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6623210.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3404
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1328
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4964
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD52346af7f51895c29a54c03808eafbe0c
SHA11c47faedca072536219b53ba9cf4346ec91e4106
SHA25638cdcc94868576a42d2439b4038e3989304f6c35c452274946d2b11679bae459
SHA512396de114e6fd359d59254b8b0a7d9d947eb4d73b0eae3386c526a161968c6f551d404b5a67a064289ad4e435970566615edbf1d17ef7ca02acf216f872cee8a5
-
Filesize
211KB
MD52346af7f51895c29a54c03808eafbe0c
SHA11c47faedca072536219b53ba9cf4346ec91e4106
SHA25638cdcc94868576a42d2439b4038e3989304f6c35c452274946d2b11679bae459
SHA512396de114e6fd359d59254b8b0a7d9d947eb4d73b0eae3386c526a161968c6f551d404b5a67a064289ad4e435970566615edbf1d17ef7ca02acf216f872cee8a5
-
Filesize
307KB
MD57f7842e20de5f6d0924d4f0fcd819d50
SHA12707887f20f655e349d5a717fdf3e84dc9f0bf2b
SHA256d4b01da213e7e57f011a4b270cb471fe70d6bf129298f43c19b926facbaddd50
SHA512aa02a0adff16f0f2de2640dbf9a95d77c99859d983fcc4eb4ae69f1e5e8f525f9071a3c62a0fc96a4875111d33c7ca8ad0d20ce6655dd34f48b478352e168c25
-
Filesize
307KB
MD57f7842e20de5f6d0924d4f0fcd819d50
SHA12707887f20f655e349d5a717fdf3e84dc9f0bf2b
SHA256d4b01da213e7e57f011a4b270cb471fe70d6bf129298f43c19b926facbaddd50
SHA512aa02a0adff16f0f2de2640dbf9a95d77c99859d983fcc4eb4ae69f1e5e8f525f9071a3c62a0fc96a4875111d33c7ca8ad0d20ce6655dd34f48b478352e168c25
-
Filesize
180KB
MD58f10e2c6a1366ce3b60754002d4e3397
SHA171c84d7bacd8f91870d0d9c475ff4cc3ed68c1fc
SHA2560ca6337b92efa5ea1b3727b35802d2dc8c087c55d71855a003d39db15ea7e651
SHA512cf3604029dca8cbcacdcd23a92fa4727631ce8539afc5c4bdd20ff318f905cdbfa6a499efb993f3de0a5677d7eb8ed52e4be35820cca8bd45a29fd383f26fb1e
-
Filesize
180KB
MD58f10e2c6a1366ce3b60754002d4e3397
SHA171c84d7bacd8f91870d0d9c475ff4cc3ed68c1fc
SHA2560ca6337b92efa5ea1b3727b35802d2dc8c087c55d71855a003d39db15ea7e651
SHA512cf3604029dca8cbcacdcd23a92fa4727631ce8539afc5c4bdd20ff318f905cdbfa6a499efb993f3de0a5677d7eb8ed52e4be35820cca8bd45a29fd383f26fb1e
-
Filesize
168KB
MD5112fbb25c1e0d8b4450cc1a6277ea209
SHA1d7fe1325f1db47db64516432ce69245f608f01aa
SHA25620c8937ff9050e68e1e2fc9dd5a4f3e6327d175023d045d9e8350d3d35c9651c
SHA512f6245df620a5df986240bd1dd3184cff4f8b15eec94ad1dc1e0f4c78409b874d76f06e02f00e05ec7663ac5963988f93c8eddb7d997acdd6996839f5284fa8e6
-
Filesize
168KB
MD5112fbb25c1e0d8b4450cc1a6277ea209
SHA1d7fe1325f1db47db64516432ce69245f608f01aa
SHA25620c8937ff9050e68e1e2fc9dd5a4f3e6327d175023d045d9e8350d3d35c9651c
SHA512f6245df620a5df986240bd1dd3184cff4f8b15eec94ad1dc1e0f4c78409b874d76f06e02f00e05ec7663ac5963988f93c8eddb7d997acdd6996839f5284fa8e6
-
Filesize
211KB
MD52346af7f51895c29a54c03808eafbe0c
SHA11c47faedca072536219b53ba9cf4346ec91e4106
SHA25638cdcc94868576a42d2439b4038e3989304f6c35c452274946d2b11679bae459
SHA512396de114e6fd359d59254b8b0a7d9d947eb4d73b0eae3386c526a161968c6f551d404b5a67a064289ad4e435970566615edbf1d17ef7ca02acf216f872cee8a5
-
Filesize
211KB
MD52346af7f51895c29a54c03808eafbe0c
SHA11c47faedca072536219b53ba9cf4346ec91e4106
SHA25638cdcc94868576a42d2439b4038e3989304f6c35c452274946d2b11679bae459
SHA512396de114e6fd359d59254b8b0a7d9d947eb4d73b0eae3386c526a161968c6f551d404b5a67a064289ad4e435970566615edbf1d17ef7ca02acf216f872cee8a5
-
Filesize
211KB
MD52346af7f51895c29a54c03808eafbe0c
SHA11c47faedca072536219b53ba9cf4346ec91e4106
SHA25638cdcc94868576a42d2439b4038e3989304f6c35c452274946d2b11679bae459
SHA512396de114e6fd359d59254b8b0a7d9d947eb4d73b0eae3386c526a161968c6f551d404b5a67a064289ad4e435970566615edbf1d17ef7ca02acf216f872cee8a5
-
Filesize
211KB
MD52346af7f51895c29a54c03808eafbe0c
SHA11c47faedca072536219b53ba9cf4346ec91e4106
SHA25638cdcc94868576a42d2439b4038e3989304f6c35c452274946d2b11679bae459
SHA512396de114e6fd359d59254b8b0a7d9d947eb4d73b0eae3386c526a161968c6f551d404b5a67a064289ad4e435970566615edbf1d17ef7ca02acf216f872cee8a5
-
Filesize
211KB
MD52346af7f51895c29a54c03808eafbe0c
SHA11c47faedca072536219b53ba9cf4346ec91e4106
SHA25638cdcc94868576a42d2439b4038e3989304f6c35c452274946d2b11679bae459
SHA512396de114e6fd359d59254b8b0a7d9d947eb4d73b0eae3386c526a161968c6f551d404b5a67a064289ad4e435970566615edbf1d17ef7ca02acf216f872cee8a5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5