Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe
Resource
win10v2004-20230220-en
General
-
Target
cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe
-
Size
489KB
-
MD5
7a11bca5e77d649c9d4d8183e3c5f542
-
SHA1
807cf3f34e1633f7498f2b07b110b678ca6d73c0
-
SHA256
cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0
-
SHA512
c5ee8a0f57229bbbfcd1e54d6297c4899b6a340d8f3a96081454483c1d3bf2d828e3d7b531299cc13aa2a27bd9666769e56207257f6438df79623172cc82ff06
-
SSDEEP
12288:DMryy9071AK2o5c1u31BT37mD7+hUa4kB:Ny8LxXTTr1hNDB
Malware Config
Extracted
redline
lour
217.196.96.101:4132
-
auth_value
ff6e6cdd20301c2004e1ff3599daa2f8
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o1442617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o1442617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o1442617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o1442617.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o1442617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o1442617.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation s3505510.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1936 z9608386.exe 2500 o1442617.exe 1208 r4084501.exe 2216 s3505510.exe 4880 oneetx.exe 4584 oneetx.exe 1312 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2772 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o1442617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o1442617.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9608386.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9608386.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3328 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2500 o1442617.exe 2500 o1442617.exe 1208 r4084501.exe 1208 r4084501.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2500 o1442617.exe Token: SeDebugPrivilege 1208 r4084501.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 s3505510.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4392 wrote to memory of 1936 4392 cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe 87 PID 4392 wrote to memory of 1936 4392 cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe 87 PID 4392 wrote to memory of 1936 4392 cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe 87 PID 1936 wrote to memory of 2500 1936 z9608386.exe 88 PID 1936 wrote to memory of 2500 1936 z9608386.exe 88 PID 1936 wrote to memory of 2500 1936 z9608386.exe 88 PID 1936 wrote to memory of 1208 1936 z9608386.exe 92 PID 1936 wrote to memory of 1208 1936 z9608386.exe 92 PID 1936 wrote to memory of 1208 1936 z9608386.exe 92 PID 4392 wrote to memory of 2216 4392 cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe 94 PID 4392 wrote to memory of 2216 4392 cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe 94 PID 4392 wrote to memory of 2216 4392 cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe 94 PID 2216 wrote to memory of 4880 2216 s3505510.exe 95 PID 2216 wrote to memory of 4880 2216 s3505510.exe 95 PID 2216 wrote to memory of 4880 2216 s3505510.exe 95 PID 4880 wrote to memory of 3328 4880 oneetx.exe 96 PID 4880 wrote to memory of 3328 4880 oneetx.exe 96 PID 4880 wrote to memory of 3328 4880 oneetx.exe 96 PID 4880 wrote to memory of 2772 4880 oneetx.exe 103 PID 4880 wrote to memory of 2772 4880 oneetx.exe 103 PID 4880 wrote to memory of 2772 4880 oneetx.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe"C:\Users\Admin\AppData\Local\Temp\cb84dc7a07fe3af8457a0fb46dc950aaa10cff6d0a427d1ca06a5ab618955cc0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9608386.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9608386.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o1442617.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o1442617.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4084501.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4084501.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3505510.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3505510.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3328
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:4584
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:1312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5cd956c670c6933875a459cf764196947
SHA10a666a84d7061db5d72dc00d1fa65f40ff111a30
SHA256f7a350b8f2ed8c75462f31b597b8646249dbdf9ab5cbbbc0accf82d12b381799
SHA51204f327cb556d9a09d3fa6fd2d06838751a735b8e3b608c7bbc966937d7253d5a5ba2b7bb1fc43b6e2d4e451a2fbb842633cdb5395fe65cf05e950584ae5b653d
-
Filesize
231KB
MD5cd956c670c6933875a459cf764196947
SHA10a666a84d7061db5d72dc00d1fa65f40ff111a30
SHA256f7a350b8f2ed8c75462f31b597b8646249dbdf9ab5cbbbc0accf82d12b381799
SHA51204f327cb556d9a09d3fa6fd2d06838751a735b8e3b608c7bbc966937d7253d5a5ba2b7bb1fc43b6e2d4e451a2fbb842633cdb5395fe65cf05e950584ae5b653d
-
Filesize
231KB
MD5cd956c670c6933875a459cf764196947
SHA10a666a84d7061db5d72dc00d1fa65f40ff111a30
SHA256f7a350b8f2ed8c75462f31b597b8646249dbdf9ab5cbbbc0accf82d12b381799
SHA51204f327cb556d9a09d3fa6fd2d06838751a735b8e3b608c7bbc966937d7253d5a5ba2b7bb1fc43b6e2d4e451a2fbb842633cdb5395fe65cf05e950584ae5b653d
-
Filesize
231KB
MD5cd956c670c6933875a459cf764196947
SHA10a666a84d7061db5d72dc00d1fa65f40ff111a30
SHA256f7a350b8f2ed8c75462f31b597b8646249dbdf9ab5cbbbc0accf82d12b381799
SHA51204f327cb556d9a09d3fa6fd2d06838751a735b8e3b608c7bbc966937d7253d5a5ba2b7bb1fc43b6e2d4e451a2fbb842633cdb5395fe65cf05e950584ae5b653d
-
Filesize
231KB
MD5cd956c670c6933875a459cf764196947
SHA10a666a84d7061db5d72dc00d1fa65f40ff111a30
SHA256f7a350b8f2ed8c75462f31b597b8646249dbdf9ab5cbbbc0accf82d12b381799
SHA51204f327cb556d9a09d3fa6fd2d06838751a735b8e3b608c7bbc966937d7253d5a5ba2b7bb1fc43b6e2d4e451a2fbb842633cdb5395fe65cf05e950584ae5b653d
-
Filesize
231KB
MD5cd956c670c6933875a459cf764196947
SHA10a666a84d7061db5d72dc00d1fa65f40ff111a30
SHA256f7a350b8f2ed8c75462f31b597b8646249dbdf9ab5cbbbc0accf82d12b381799
SHA51204f327cb556d9a09d3fa6fd2d06838751a735b8e3b608c7bbc966937d7253d5a5ba2b7bb1fc43b6e2d4e451a2fbb842633cdb5395fe65cf05e950584ae5b653d
-
Filesize
231KB
MD5cd956c670c6933875a459cf764196947
SHA10a666a84d7061db5d72dc00d1fa65f40ff111a30
SHA256f7a350b8f2ed8c75462f31b597b8646249dbdf9ab5cbbbc0accf82d12b381799
SHA51204f327cb556d9a09d3fa6fd2d06838751a735b8e3b608c7bbc966937d7253d5a5ba2b7bb1fc43b6e2d4e451a2fbb842633cdb5395fe65cf05e950584ae5b653d
-
Filesize
307KB
MD5cc4333f8493604be19184bce5fc01e50
SHA1c754e3476af3305bf3d6f0d6447875943509f21b
SHA256ff231e49603fd70bb195cc50db18192019dc8c2181d460086fe502cad8c5a46a
SHA5127e63a924b70680d90c2b1741db2db958ce63213743f6382242f1daecdf7b06c0b5a1a0e260601d8caaf4b25884d998a96b743a3a782e20710eae7295e01f6942
-
Filesize
307KB
MD5cc4333f8493604be19184bce5fc01e50
SHA1c754e3476af3305bf3d6f0d6447875943509f21b
SHA256ff231e49603fd70bb195cc50db18192019dc8c2181d460086fe502cad8c5a46a
SHA5127e63a924b70680d90c2b1741db2db958ce63213743f6382242f1daecdf7b06c0b5a1a0e260601d8caaf4b25884d998a96b743a3a782e20710eae7295e01f6942
-
Filesize
180KB
MD5aeee84380dc982f0ea610d33135583ba
SHA19126800b818f262c00c001487c063fc5ffe02896
SHA25685935516593e92553b36b44a990a492f9156d006480e3fc21f2dc776459cc3e1
SHA5125e7ca6cfd29ae037c34d1eafa280e117ffc40722d4656ffe32f9e809e335dcb97af0a465bce0dd51b6bc7cdc0b7964c861b38b259534e28a478a93e74e67deee
-
Filesize
180KB
MD5aeee84380dc982f0ea610d33135583ba
SHA19126800b818f262c00c001487c063fc5ffe02896
SHA25685935516593e92553b36b44a990a492f9156d006480e3fc21f2dc776459cc3e1
SHA5125e7ca6cfd29ae037c34d1eafa280e117ffc40722d4656ffe32f9e809e335dcb97af0a465bce0dd51b6bc7cdc0b7964c861b38b259534e28a478a93e74e67deee
-
Filesize
168KB
MD5f39f90eaed2b55d8878aabf9ae2b99a7
SHA1996c40c7a52a7c95a7d0b6b2f1e2988d6714b9a2
SHA256f33e606de527e1d186e753e6fa275ccbdb55d0034971f5b3c72289ed91b23456
SHA51224e14c737065fe6015effb2153d851c7bd87f291d8d7b099be4b9a08f136d24e10ef04278978f72a0ecc99987b44a31a9abb783b345054e82af25c7fee3033e0
-
Filesize
168KB
MD5f39f90eaed2b55d8878aabf9ae2b99a7
SHA1996c40c7a52a7c95a7d0b6b2f1e2988d6714b9a2
SHA256f33e606de527e1d186e753e6fa275ccbdb55d0034971f5b3c72289ed91b23456
SHA51224e14c737065fe6015effb2153d851c7bd87f291d8d7b099be4b9a08f136d24e10ef04278978f72a0ecc99987b44a31a9abb783b345054e82af25c7fee3033e0
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5