Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/05/2023, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe
Resource
win10-20230220-en
General
-
Target
be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe
-
Size
490KB
-
MD5
315430d06269678ae273287171fa1840
-
SHA1
9bae5247745f246777c702870496c73c09a40e4f
-
SHA256
be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53
-
SHA512
1359dd6009e7f4126495fa25663419d5e37d7e7d2f7189836500870b83b9168b12510804b9b4f4cd1170eb154461bdcf5b7bb17dc9e34d85bee973e08231c16c
-
SSDEEP
12288:BMrEy90qR4x+ZUSJWGiToAc4qavCLQUMmNJoYk2:ZyBTZJneKramHM/Yb
Malware Config
Extracted
redline
lamp
217.196.96.101:4132
-
auth_value
8a3e8bc22f2496c7c5339eb332073902
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o2505389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o2505389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o2505389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o2505389.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o2505389.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3620 z3751002.exe 3940 o2505389.exe 1864 r6698265.exe 3972 s6209321.exe 4508 oneetx.exe 3540 oneetx.exe 2728 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3736 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o2505389.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o2505389.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3751002.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3751002.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3940 o2505389.exe 3940 o2505389.exe 1864 r6698265.exe 1864 r6698265.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3940 o2505389.exe Token: SeDebugPrivilege 1864 r6698265.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3972 s6209321.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3620 5112 be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe 66 PID 5112 wrote to memory of 3620 5112 be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe 66 PID 5112 wrote to memory of 3620 5112 be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe 66 PID 3620 wrote to memory of 3940 3620 z3751002.exe 67 PID 3620 wrote to memory of 3940 3620 z3751002.exe 67 PID 3620 wrote to memory of 3940 3620 z3751002.exe 67 PID 3620 wrote to memory of 1864 3620 z3751002.exe 68 PID 3620 wrote to memory of 1864 3620 z3751002.exe 68 PID 3620 wrote to memory of 1864 3620 z3751002.exe 68 PID 5112 wrote to memory of 3972 5112 be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe 70 PID 5112 wrote to memory of 3972 5112 be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe 70 PID 5112 wrote to memory of 3972 5112 be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe 70 PID 3972 wrote to memory of 4508 3972 s6209321.exe 71 PID 3972 wrote to memory of 4508 3972 s6209321.exe 71 PID 3972 wrote to memory of 4508 3972 s6209321.exe 71 PID 4508 wrote to memory of 4404 4508 oneetx.exe 72 PID 4508 wrote to memory of 4404 4508 oneetx.exe 72 PID 4508 wrote to memory of 4404 4508 oneetx.exe 72 PID 4508 wrote to memory of 3736 4508 oneetx.exe 74 PID 4508 wrote to memory of 3736 4508 oneetx.exe 74 PID 4508 wrote to memory of 3736 4508 oneetx.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe"C:\Users\Admin\AppData\Local\Temp\be03cc54ea52f8a24ccaccee3717ec7d53d34a9025e16aaee472ea38a401fa53.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3751002.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3751002.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2505389.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2505389.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6698265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6698265.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6209321.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6209321.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4404
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:3540
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD56e83cc85886ef7d70d01cf056b20a77f
SHA16327a7780feecb510112764c96fdc5cc4e3f49ff
SHA25662da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64
SHA51261adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75
-
Filesize
231KB
MD56e83cc85886ef7d70d01cf056b20a77f
SHA16327a7780feecb510112764c96fdc5cc4e3f49ff
SHA25662da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64
SHA51261adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75
-
Filesize
231KB
MD56e83cc85886ef7d70d01cf056b20a77f
SHA16327a7780feecb510112764c96fdc5cc4e3f49ff
SHA25662da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64
SHA51261adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75
-
Filesize
231KB
MD56e83cc85886ef7d70d01cf056b20a77f
SHA16327a7780feecb510112764c96fdc5cc4e3f49ff
SHA25662da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64
SHA51261adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75
-
Filesize
231KB
MD56e83cc85886ef7d70d01cf056b20a77f
SHA16327a7780feecb510112764c96fdc5cc4e3f49ff
SHA25662da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64
SHA51261adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75
-
Filesize
231KB
MD56e83cc85886ef7d70d01cf056b20a77f
SHA16327a7780feecb510112764c96fdc5cc4e3f49ff
SHA25662da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64
SHA51261adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75
-
Filesize
231KB
MD56e83cc85886ef7d70d01cf056b20a77f
SHA16327a7780feecb510112764c96fdc5cc4e3f49ff
SHA25662da4aefde160f39d624d655aafb8d4789248a1700868258abb6a4ea5441ab64
SHA51261adf882247ba8a1b6df11d14dbaaed87a8f155f9c63d3a7ccf656838ca3a473d2ec48fd767dfe6860f358a8a9d3a2073bd9e6bb02e3101544fb82aee79c3d75
-
Filesize
307KB
MD5d5ac6dd7379356c70f0447e8eacd0f15
SHA161697c88c618fc053c1d745f109aa86d0cc36dde
SHA2561dca69fd27abfd511900acd0e1412bb88b9357fdfe3c4d3894031638d5d15c65
SHA512f8365be8ed6d4267497e926387d051d271545eab0317f3079e21bcb3db9ca0af58e0b27c070037f132de675eb56b0cdca38726df00b640719099b68e6d9b6928
-
Filesize
307KB
MD5d5ac6dd7379356c70f0447e8eacd0f15
SHA161697c88c618fc053c1d745f109aa86d0cc36dde
SHA2561dca69fd27abfd511900acd0e1412bb88b9357fdfe3c4d3894031638d5d15c65
SHA512f8365be8ed6d4267497e926387d051d271545eab0317f3079e21bcb3db9ca0af58e0b27c070037f132de675eb56b0cdca38726df00b640719099b68e6d9b6928
-
Filesize
180KB
MD55b12f1112f52005ce41d7b6f4b30a338
SHA1bc3f8930009db6069a558bbe148e312f4bc832c6
SHA2565072171406d138d2ab7ad916d6942015e7d4a283d223a0fc7bdde428c0e3b9ac
SHA5122e9e5d3e65718ec6475c4a2479592f86ba102e5f5c12842e20fc5ae3d38aa006d99a5c1db606ca121eaee34549fb1358176b299dfcd9649caa8819932777c4a8
-
Filesize
180KB
MD55b12f1112f52005ce41d7b6f4b30a338
SHA1bc3f8930009db6069a558bbe148e312f4bc832c6
SHA2565072171406d138d2ab7ad916d6942015e7d4a283d223a0fc7bdde428c0e3b9ac
SHA5122e9e5d3e65718ec6475c4a2479592f86ba102e5f5c12842e20fc5ae3d38aa006d99a5c1db606ca121eaee34549fb1358176b299dfcd9649caa8819932777c4a8
-
Filesize
168KB
MD577cdcaabd4b85bcddbb86709286b32ad
SHA1650ee94a877b5259e313324066e70295c427800b
SHA256547b80e1414b329deb48e9281e5c38ec6e09d24cebdfb067828d955c4cf20dd4
SHA51274eae74e556c054b4b3948100bcca4462cb9c89353419539dcaa88fd4bf932d378cbb6e8b2a908a3583ebeeef62e730e09ff578b8c97ddc3de23b37e364fc955
-
Filesize
168KB
MD577cdcaabd4b85bcddbb86709286b32ad
SHA1650ee94a877b5259e313324066e70295c427800b
SHA256547b80e1414b329deb48e9281e5c38ec6e09d24cebdfb067828d955c4cf20dd4
SHA51274eae74e556c054b4b3948100bcca4462cb9c89353419539dcaa88fd4bf932d378cbb6e8b2a908a3583ebeeef62e730e09ff578b8c97ddc3de23b37e364fc955
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817