Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe
Resource
win10v2004-20230220-en
General
-
Target
0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe
-
Size
480KB
-
MD5
ce4bced31a11b81dc45c64643d3d974d
-
SHA1
00a2880086aebf573a4968abce3c3017a521d065
-
SHA256
0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd
-
SHA512
98aba91196f90e88c1b6a5472e2d0b079f75104b77bf4c51d63f61261fb1369b2f62af246915a6b6203f110eb2f684129aa43984a68b5a3136e266c19539c793
-
SSDEEP
6144:Kzy+bnr+dp0yN90QEapd9tzXepEzZC1VQsqsntVTjjU+RoNsNGDxqCqOWuRa3ZIc:hMrty90md9tzl29qIjpoXECqlsnon/
Malware Config
Extracted
redline
mofun
217.196.96.101:4132
-
auth_value
da5d4987d25c2de43d34fcc99b29fff3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8270076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8270076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8270076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8270076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8270076.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8270076.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation d8110840.exe -
Executes dropped EXE 7 IoCs
pid Process 372 v3443499.exe 2124 a8270076.exe 4720 b7581923.exe 1824 d8110840.exe 2492 oneetx.exe 3600 oneetx.exe 1652 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4480 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8270076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8270076.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3443499.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3443499.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2192 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2124 a8270076.exe 2124 a8270076.exe 4720 b7581923.exe 4720 b7581923.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2124 a8270076.exe Token: SeDebugPrivilege 4720 b7581923.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1824 d8110840.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1400 wrote to memory of 372 1400 0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe 83 PID 1400 wrote to memory of 372 1400 0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe 83 PID 1400 wrote to memory of 372 1400 0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe 83 PID 372 wrote to memory of 2124 372 v3443499.exe 84 PID 372 wrote to memory of 2124 372 v3443499.exe 84 PID 372 wrote to memory of 2124 372 v3443499.exe 84 PID 372 wrote to memory of 4720 372 v3443499.exe 88 PID 372 wrote to memory of 4720 372 v3443499.exe 88 PID 372 wrote to memory of 4720 372 v3443499.exe 88 PID 1400 wrote to memory of 1824 1400 0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe 90 PID 1400 wrote to memory of 1824 1400 0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe 90 PID 1400 wrote to memory of 1824 1400 0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe 90 PID 1824 wrote to memory of 2492 1824 d8110840.exe 91 PID 1824 wrote to memory of 2492 1824 d8110840.exe 91 PID 1824 wrote to memory of 2492 1824 d8110840.exe 91 PID 2492 wrote to memory of 2192 2492 oneetx.exe 92 PID 2492 wrote to memory of 2192 2492 oneetx.exe 92 PID 2492 wrote to memory of 2192 2492 oneetx.exe 92 PID 2492 wrote to memory of 3076 2492 oneetx.exe 94 PID 2492 wrote to memory of 3076 2492 oneetx.exe 94 PID 2492 wrote to memory of 3076 2492 oneetx.exe 94 PID 3076 wrote to memory of 4408 3076 cmd.exe 96 PID 3076 wrote to memory of 4408 3076 cmd.exe 96 PID 3076 wrote to memory of 4408 3076 cmd.exe 96 PID 3076 wrote to memory of 3156 3076 cmd.exe 97 PID 3076 wrote to memory of 3156 3076 cmd.exe 97 PID 3076 wrote to memory of 3156 3076 cmd.exe 97 PID 3076 wrote to memory of 3836 3076 cmd.exe 98 PID 3076 wrote to memory of 3836 3076 cmd.exe 98 PID 3076 wrote to memory of 3836 3076 cmd.exe 98 PID 3076 wrote to memory of 4520 3076 cmd.exe 99 PID 3076 wrote to memory of 4520 3076 cmd.exe 99 PID 3076 wrote to memory of 4520 3076 cmd.exe 99 PID 3076 wrote to memory of 4548 3076 cmd.exe 100 PID 3076 wrote to memory of 4548 3076 cmd.exe 100 PID 3076 wrote to memory of 4548 3076 cmd.exe 100 PID 3076 wrote to memory of 760 3076 cmd.exe 101 PID 3076 wrote to memory of 760 3076 cmd.exe 101 PID 3076 wrote to memory of 760 3076 cmd.exe 101 PID 2492 wrote to memory of 4480 2492 oneetx.exe 107 PID 2492 wrote to memory of 4480 2492 oneetx.exe 107 PID 2492 wrote to memory of 4480 2492 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe"C:\Users\Admin\AppData\Local\Temp\0adc642d41181f8149ea386a46026288debaa636dd7f24f56236d64fb63d68bd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3443499.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3443499.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8270076.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8270076.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7581923.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7581923.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8110840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8110840.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2192
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4408
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4548
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:760
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3600
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5b4ad1179daad152b4c2cd7ff27295270
SHA1974ad66ca72e774f7400eb11cde27ea907e7b0a0
SHA2566761d589a01ce709111a2192655c67e39738c367fec726a58d8e7444da56db7d
SHA51290a41e4bc3eea5c314f9ce79d6a953c3420ec0b5f73d88a50bf7ba5e79ac7c93d14ae88107a2cd90e68395620decaaa77eabe8d49f1b2f90c3f58316a555fe79
-
Filesize
211KB
MD5b4ad1179daad152b4c2cd7ff27295270
SHA1974ad66ca72e774f7400eb11cde27ea907e7b0a0
SHA2566761d589a01ce709111a2192655c67e39738c367fec726a58d8e7444da56db7d
SHA51290a41e4bc3eea5c314f9ce79d6a953c3420ec0b5f73d88a50bf7ba5e79ac7c93d14ae88107a2cd90e68395620decaaa77eabe8d49f1b2f90c3f58316a555fe79
-
Filesize
309KB
MD526dd666d13177c0b401a8e35a5bc578f
SHA195d632585e6ec99a8815b195ec69643ea2ec9337
SHA256a9d5a1913e820379b56eada14540dbb078ea0f13010d333b057eb593df35bf9a
SHA5123ca9a25a5d55522ee2a577247e1bbe16679ea0c2c82fda83d040c883203a364479f762679844d1e6fb3c0922c2149cd61f248238e7819a71a1f776a3269de3e8
-
Filesize
309KB
MD526dd666d13177c0b401a8e35a5bc578f
SHA195d632585e6ec99a8815b195ec69643ea2ec9337
SHA256a9d5a1913e820379b56eada14540dbb078ea0f13010d333b057eb593df35bf9a
SHA5123ca9a25a5d55522ee2a577247e1bbe16679ea0c2c82fda83d040c883203a364479f762679844d1e6fb3c0922c2149cd61f248238e7819a71a1f776a3269de3e8
-
Filesize
181KB
MD50061208b45f64305ebdde0da262e1778
SHA11d56bfa9a307be026dabb12ece01c202b89f0f0d
SHA256a9721fa56ea61aae65879717e7ff61222f7e081f0bf66688c0fdd3fb36a94a52
SHA51205e27bf2e4d4d71c27bab811b91758ca46cbeffd1dd1749a55dac5e29f0b3a91a02b805351946533083bc3913de8f0d447dc40fa334f2caa70ec592ea3d08d4a
-
Filesize
181KB
MD50061208b45f64305ebdde0da262e1778
SHA11d56bfa9a307be026dabb12ece01c202b89f0f0d
SHA256a9721fa56ea61aae65879717e7ff61222f7e081f0bf66688c0fdd3fb36a94a52
SHA51205e27bf2e4d4d71c27bab811b91758ca46cbeffd1dd1749a55dac5e29f0b3a91a02b805351946533083bc3913de8f0d447dc40fa334f2caa70ec592ea3d08d4a
-
Filesize
168KB
MD53da70778f46c4a3dbb24575a77bca585
SHA169257404bbe84163ce0a279fe4102be355e783ba
SHA2566826068c876c15384bd3f6a4bb851fa3f2550a1f93dad3f5db1abde3e74454cf
SHA512e3ef4b4d16341f10436d48964269363687bdd1a7341103ed6848bbddbdeca72adf00cdf6e2d9bb392110800fe901fbc06f1249bc3ae4c520281f1f48c4ecc2f9
-
Filesize
168KB
MD53da70778f46c4a3dbb24575a77bca585
SHA169257404bbe84163ce0a279fe4102be355e783ba
SHA2566826068c876c15384bd3f6a4bb851fa3f2550a1f93dad3f5db1abde3e74454cf
SHA512e3ef4b4d16341f10436d48964269363687bdd1a7341103ed6848bbddbdeca72adf00cdf6e2d9bb392110800fe901fbc06f1249bc3ae4c520281f1f48c4ecc2f9
-
Filesize
211KB
MD5b4ad1179daad152b4c2cd7ff27295270
SHA1974ad66ca72e774f7400eb11cde27ea907e7b0a0
SHA2566761d589a01ce709111a2192655c67e39738c367fec726a58d8e7444da56db7d
SHA51290a41e4bc3eea5c314f9ce79d6a953c3420ec0b5f73d88a50bf7ba5e79ac7c93d14ae88107a2cd90e68395620decaaa77eabe8d49f1b2f90c3f58316a555fe79
-
Filesize
211KB
MD5b4ad1179daad152b4c2cd7ff27295270
SHA1974ad66ca72e774f7400eb11cde27ea907e7b0a0
SHA2566761d589a01ce709111a2192655c67e39738c367fec726a58d8e7444da56db7d
SHA51290a41e4bc3eea5c314f9ce79d6a953c3420ec0b5f73d88a50bf7ba5e79ac7c93d14ae88107a2cd90e68395620decaaa77eabe8d49f1b2f90c3f58316a555fe79
-
Filesize
211KB
MD5b4ad1179daad152b4c2cd7ff27295270
SHA1974ad66ca72e774f7400eb11cde27ea907e7b0a0
SHA2566761d589a01ce709111a2192655c67e39738c367fec726a58d8e7444da56db7d
SHA51290a41e4bc3eea5c314f9ce79d6a953c3420ec0b5f73d88a50bf7ba5e79ac7c93d14ae88107a2cd90e68395620decaaa77eabe8d49f1b2f90c3f58316a555fe79
-
Filesize
211KB
MD5b4ad1179daad152b4c2cd7ff27295270
SHA1974ad66ca72e774f7400eb11cde27ea907e7b0a0
SHA2566761d589a01ce709111a2192655c67e39738c367fec726a58d8e7444da56db7d
SHA51290a41e4bc3eea5c314f9ce79d6a953c3420ec0b5f73d88a50bf7ba5e79ac7c93d14ae88107a2cd90e68395620decaaa77eabe8d49f1b2f90c3f58316a555fe79
-
Filesize
211KB
MD5b4ad1179daad152b4c2cd7ff27295270
SHA1974ad66ca72e774f7400eb11cde27ea907e7b0a0
SHA2566761d589a01ce709111a2192655c67e39738c367fec726a58d8e7444da56db7d
SHA51290a41e4bc3eea5c314f9ce79d6a953c3420ec0b5f73d88a50bf7ba5e79ac7c93d14ae88107a2cd90e68395620decaaa77eabe8d49f1b2f90c3f58316a555fe79
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5