Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/05/2023, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe
Resource
win10-20230220-en
General
-
Target
286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe
-
Size
481KB
-
MD5
75aeca15f9482c83fef3ec725721bf14
-
SHA1
131bb41ffd1adb74e32ac9857c628f21f9c25cf5
-
SHA256
286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c
-
SHA512
a935ca628724181a619f4d7b022e434f2249c62ac459169dcb3235e4409c4a46e5274f630157e4d4367d197366938c0d3c4becd733f550af6afba128b4685647
-
SSDEEP
12288:XMrhy90HP5y6FwFhi47xAEBGZt1e+9YG:Oy0jwtlA8GFeTG
Malware Config
Extracted
redline
mofun
217.196.96.101:4132
-
auth_value
da5d4987d25c2de43d34fcc99b29fff3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6096695.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6096695.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6096695.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6096695.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6096695.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2504 v6594266.exe 2960 a6096695.exe 3540 b1097391.exe 1484 d0459430.exe 4808 oneetx.exe 4680 oneetx.exe 4984 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4328 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6096695.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6096695.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6594266.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6594266.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2960 a6096695.exe 2960 a6096695.exe 3540 b1097391.exe 3540 b1097391.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2960 a6096695.exe Token: SeDebugPrivilege 3540 b1097391.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1484 d0459430.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2504 2452 286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe 66 PID 2452 wrote to memory of 2504 2452 286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe 66 PID 2452 wrote to memory of 2504 2452 286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe 66 PID 2504 wrote to memory of 2960 2504 v6594266.exe 67 PID 2504 wrote to memory of 2960 2504 v6594266.exe 67 PID 2504 wrote to memory of 2960 2504 v6594266.exe 67 PID 2504 wrote to memory of 3540 2504 v6594266.exe 68 PID 2504 wrote to memory of 3540 2504 v6594266.exe 68 PID 2504 wrote to memory of 3540 2504 v6594266.exe 68 PID 2452 wrote to memory of 1484 2452 286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe 70 PID 2452 wrote to memory of 1484 2452 286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe 70 PID 2452 wrote to memory of 1484 2452 286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe 70 PID 1484 wrote to memory of 4808 1484 d0459430.exe 71 PID 1484 wrote to memory of 4808 1484 d0459430.exe 71 PID 1484 wrote to memory of 4808 1484 d0459430.exe 71 PID 4808 wrote to memory of 4904 4808 oneetx.exe 72 PID 4808 wrote to memory of 4904 4808 oneetx.exe 72 PID 4808 wrote to memory of 4904 4808 oneetx.exe 72 PID 4808 wrote to memory of 4932 4808 oneetx.exe 74 PID 4808 wrote to memory of 4932 4808 oneetx.exe 74 PID 4808 wrote to memory of 4932 4808 oneetx.exe 74 PID 4932 wrote to memory of 3016 4932 cmd.exe 76 PID 4932 wrote to memory of 3016 4932 cmd.exe 76 PID 4932 wrote to memory of 3016 4932 cmd.exe 76 PID 4932 wrote to memory of 3704 4932 cmd.exe 77 PID 4932 wrote to memory of 3704 4932 cmd.exe 77 PID 4932 wrote to memory of 3704 4932 cmd.exe 77 PID 4932 wrote to memory of 768 4932 cmd.exe 78 PID 4932 wrote to memory of 768 4932 cmd.exe 78 PID 4932 wrote to memory of 768 4932 cmd.exe 78 PID 4932 wrote to memory of 4136 4932 cmd.exe 79 PID 4932 wrote to memory of 4136 4932 cmd.exe 79 PID 4932 wrote to memory of 4136 4932 cmd.exe 79 PID 4932 wrote to memory of 3856 4932 cmd.exe 80 PID 4932 wrote to memory of 3856 4932 cmd.exe 80 PID 4932 wrote to memory of 3856 4932 cmd.exe 80 PID 4932 wrote to memory of 776 4932 cmd.exe 81 PID 4932 wrote to memory of 776 4932 cmd.exe 81 PID 4932 wrote to memory of 776 4932 cmd.exe 81 PID 4808 wrote to memory of 4328 4808 oneetx.exe 83 PID 4808 wrote to memory of 4328 4808 oneetx.exe 83 PID 4808 wrote to memory of 4328 4808 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe"C:\Users\Admin\AppData\Local\Temp\286e2f0005e5dd19e3b8ef0d62313c2114ec78d646e5e172b75c3dc5055e170c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6594266.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6594266.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6096695.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6096695.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1097391.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b1097391.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0459430.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0459430.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4136
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3856
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:776
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4680
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5b3e8f97eef2800a5c691c4b7cf1c6933
SHA15ce8a89bc0cb41cffc01f00e1de7c05c1519b111
SHA256d3dad357b95c58d7f609c007061822aa60ab5492a76e1dd49387e2a9f217d399
SHA512ad6e43a79d17c3169b7cf75a2209075a149ff5cc137f07c5e20397992d392598957c4957e3b39d391590815547d6bb0133637eeb2667ca54de24a9fabf9435ae
-
Filesize
211KB
MD5b3e8f97eef2800a5c691c4b7cf1c6933
SHA15ce8a89bc0cb41cffc01f00e1de7c05c1519b111
SHA256d3dad357b95c58d7f609c007061822aa60ab5492a76e1dd49387e2a9f217d399
SHA512ad6e43a79d17c3169b7cf75a2209075a149ff5cc137f07c5e20397992d392598957c4957e3b39d391590815547d6bb0133637eeb2667ca54de24a9fabf9435ae
-
Filesize
309KB
MD5ba7b428bddf9680d208cbbadbba0fc29
SHA1e06c0e57e9c5064a9c9ee7fa8d71b190da32158b
SHA2568d5c7eafb8bdfa6ba4a9ab0d377ef5d10a65ab5262c115ca37ca77e9299edfc9
SHA51271921218287ca04a1aeb6476a37d192f890f97b25347b012726cf420de1cd5d4800aaf2c2b069990bf15c6391095aa0542593d76800f737ccf1a8c8bc074db55
-
Filesize
309KB
MD5ba7b428bddf9680d208cbbadbba0fc29
SHA1e06c0e57e9c5064a9c9ee7fa8d71b190da32158b
SHA2568d5c7eafb8bdfa6ba4a9ab0d377ef5d10a65ab5262c115ca37ca77e9299edfc9
SHA51271921218287ca04a1aeb6476a37d192f890f97b25347b012726cf420de1cd5d4800aaf2c2b069990bf15c6391095aa0542593d76800f737ccf1a8c8bc074db55
-
Filesize
180KB
MD5ab67a17f59e4423b3ce737082d69f4b6
SHA1890eed4f49023528eda98f3f386a37583dba6be2
SHA256606de6416a0b004a4735c0103eda1516365d4c2c8e221fbea99de2a088def1bd
SHA512b1619d8a439895ec6b97a459282d1180d4488eacc2e0b8f22e028e071601de6f73ee7a8be464711b638d5f23c06ec091931d5ae2db9806c9022d86b4123369f0
-
Filesize
180KB
MD5ab67a17f59e4423b3ce737082d69f4b6
SHA1890eed4f49023528eda98f3f386a37583dba6be2
SHA256606de6416a0b004a4735c0103eda1516365d4c2c8e221fbea99de2a088def1bd
SHA512b1619d8a439895ec6b97a459282d1180d4488eacc2e0b8f22e028e071601de6f73ee7a8be464711b638d5f23c06ec091931d5ae2db9806c9022d86b4123369f0
-
Filesize
168KB
MD5673f3c207577991e57826e99763a49f3
SHA1c77cd1003fe735e0a6fd4c7dc83bbb8bb3bdcc99
SHA256b517d962faa5ed9aa6401815927f73dc534c8eeb86c745a8ff95837d87cf3e71
SHA512628db979faabe0dc9beca8397f64481780523763e45ed03f776dff48c3006980e3243e7b7a3d16fc15ebc4ddafa426689db2bdd7c88fd3ca16f675e91b8f5c3d
-
Filesize
168KB
MD5673f3c207577991e57826e99763a49f3
SHA1c77cd1003fe735e0a6fd4c7dc83bbb8bb3bdcc99
SHA256b517d962faa5ed9aa6401815927f73dc534c8eeb86c745a8ff95837d87cf3e71
SHA512628db979faabe0dc9beca8397f64481780523763e45ed03f776dff48c3006980e3243e7b7a3d16fc15ebc4ddafa426689db2bdd7c88fd3ca16f675e91b8f5c3d
-
Filesize
211KB
MD5b3e8f97eef2800a5c691c4b7cf1c6933
SHA15ce8a89bc0cb41cffc01f00e1de7c05c1519b111
SHA256d3dad357b95c58d7f609c007061822aa60ab5492a76e1dd49387e2a9f217d399
SHA512ad6e43a79d17c3169b7cf75a2209075a149ff5cc137f07c5e20397992d392598957c4957e3b39d391590815547d6bb0133637eeb2667ca54de24a9fabf9435ae
-
Filesize
211KB
MD5b3e8f97eef2800a5c691c4b7cf1c6933
SHA15ce8a89bc0cb41cffc01f00e1de7c05c1519b111
SHA256d3dad357b95c58d7f609c007061822aa60ab5492a76e1dd49387e2a9f217d399
SHA512ad6e43a79d17c3169b7cf75a2209075a149ff5cc137f07c5e20397992d392598957c4957e3b39d391590815547d6bb0133637eeb2667ca54de24a9fabf9435ae
-
Filesize
211KB
MD5b3e8f97eef2800a5c691c4b7cf1c6933
SHA15ce8a89bc0cb41cffc01f00e1de7c05c1519b111
SHA256d3dad357b95c58d7f609c007061822aa60ab5492a76e1dd49387e2a9f217d399
SHA512ad6e43a79d17c3169b7cf75a2209075a149ff5cc137f07c5e20397992d392598957c4957e3b39d391590815547d6bb0133637eeb2667ca54de24a9fabf9435ae
-
Filesize
211KB
MD5b3e8f97eef2800a5c691c4b7cf1c6933
SHA15ce8a89bc0cb41cffc01f00e1de7c05c1519b111
SHA256d3dad357b95c58d7f609c007061822aa60ab5492a76e1dd49387e2a9f217d399
SHA512ad6e43a79d17c3169b7cf75a2209075a149ff5cc137f07c5e20397992d392598957c4957e3b39d391590815547d6bb0133637eeb2667ca54de24a9fabf9435ae
-
Filesize
211KB
MD5b3e8f97eef2800a5c691c4b7cf1c6933
SHA15ce8a89bc0cb41cffc01f00e1de7c05c1519b111
SHA256d3dad357b95c58d7f609c007061822aa60ab5492a76e1dd49387e2a9f217d399
SHA512ad6e43a79d17c3169b7cf75a2209075a149ff5cc137f07c5e20397992d392598957c4957e3b39d391590815547d6bb0133637eeb2667ca54de24a9fabf9435ae
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53