Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/05/2023, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe
Resource
win10-20230220-en
General
-
Target
d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe
-
Size
479KB
-
MD5
88dd337dc084e981a874fa1124518006
-
SHA1
787e687b3f3128b76a04156073485d13a85ef82c
-
SHA256
d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581
-
SHA512
16b4d76f9bb52cb30e84c600859a61e0d9f1d5daa0f8a293e4b0e3591b3868317d8d26ec8a3e70ac30cee63dca48f543601df165559456fa5f763b1f3e8b0732
-
SSDEEP
12288:sMray90MRlzJRJaM713eGi8+rUjdQN2QkfXbsK:2yDrr3713iXr8Q0fLsK
Malware Config
Extracted
redline
douma
217.196.96.101:4132
-
auth_value
e7c0659b5f9d26f2f97df8d25fefbb44
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7860492.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7860492.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7860492.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7860492.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7860492.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1156 x8452868.exe 1304 g5373731.exe 1728 h7860492.exe 1480 i0507972.exe 3796 oneetx.exe 756 oneetx.exe 3708 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4792 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h7860492.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h7860492.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8452868.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8452868.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1304 g5373731.exe 1304 g5373731.exe 1728 h7860492.exe 1728 h7860492.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1304 g5373731.exe Token: SeDebugPrivilege 1728 h7860492.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1480 i0507972.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 404 wrote to memory of 1156 404 d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe 66 PID 404 wrote to memory of 1156 404 d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe 66 PID 404 wrote to memory of 1156 404 d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe 66 PID 1156 wrote to memory of 1304 1156 x8452868.exe 67 PID 1156 wrote to memory of 1304 1156 x8452868.exe 67 PID 1156 wrote to memory of 1304 1156 x8452868.exe 67 PID 1156 wrote to memory of 1728 1156 x8452868.exe 69 PID 1156 wrote to memory of 1728 1156 x8452868.exe 69 PID 1156 wrote to memory of 1728 1156 x8452868.exe 69 PID 404 wrote to memory of 1480 404 d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe 70 PID 404 wrote to memory of 1480 404 d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe 70 PID 404 wrote to memory of 1480 404 d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe 70 PID 1480 wrote to memory of 3796 1480 i0507972.exe 71 PID 1480 wrote to memory of 3796 1480 i0507972.exe 71 PID 1480 wrote to memory of 3796 1480 i0507972.exe 71 PID 3796 wrote to memory of 4900 3796 oneetx.exe 72 PID 3796 wrote to memory of 4900 3796 oneetx.exe 72 PID 3796 wrote to memory of 4900 3796 oneetx.exe 72 PID 3796 wrote to memory of 4912 3796 oneetx.exe 74 PID 3796 wrote to memory of 4912 3796 oneetx.exe 74 PID 3796 wrote to memory of 4912 3796 oneetx.exe 74 PID 4912 wrote to memory of 2676 4912 cmd.exe 76 PID 4912 wrote to memory of 2676 4912 cmd.exe 76 PID 4912 wrote to memory of 2676 4912 cmd.exe 76 PID 4912 wrote to memory of 2764 4912 cmd.exe 77 PID 4912 wrote to memory of 2764 4912 cmd.exe 77 PID 4912 wrote to memory of 2764 4912 cmd.exe 77 PID 4912 wrote to memory of 3744 4912 cmd.exe 78 PID 4912 wrote to memory of 3744 4912 cmd.exe 78 PID 4912 wrote to memory of 3744 4912 cmd.exe 78 PID 4912 wrote to memory of 440 4912 cmd.exe 79 PID 4912 wrote to memory of 440 4912 cmd.exe 79 PID 4912 wrote to memory of 440 4912 cmd.exe 79 PID 4912 wrote to memory of 600 4912 cmd.exe 80 PID 4912 wrote to memory of 600 4912 cmd.exe 80 PID 4912 wrote to memory of 600 4912 cmd.exe 80 PID 4912 wrote to memory of 3920 4912 cmd.exe 81 PID 4912 wrote to memory of 3920 4912 cmd.exe 81 PID 4912 wrote to memory of 3920 4912 cmd.exe 81 PID 3796 wrote to memory of 4792 3796 oneetx.exe 83 PID 3796 wrote to memory of 4792 3796 oneetx.exe 83 PID 3796 wrote to memory of 4792 3796 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe"C:\Users\Admin\AppData\Local\Temp\d37283c260e1feb6161d27c8340baf3cdfccdb22fa97ce6a2c4906ea7dc38581.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8452868.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8452868.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5373731.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5373731.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7860492.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7860492.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0507972.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0507972.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:440
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3920
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:756
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD588d0996165999d9441d3ad3a2536d5c7
SHA192b1f88f1a9c07f55f347ac258d63af7f2ae74a2
SHA256e8afa60741084fbc8c3b2110e538ab079ece761ef073ea8ed1715f0a4e02fbe6
SHA51298bcac8981762a8bcae97503554eb10700d32898a0b01c5bc78f8938c4bed60079183079b9b9352290ef9c32cdc4e33fc205fb0bc243c4e06c0214bbd9976276
-
Filesize
211KB
MD588d0996165999d9441d3ad3a2536d5c7
SHA192b1f88f1a9c07f55f347ac258d63af7f2ae74a2
SHA256e8afa60741084fbc8c3b2110e538ab079ece761ef073ea8ed1715f0a4e02fbe6
SHA51298bcac8981762a8bcae97503554eb10700d32898a0b01c5bc78f8938c4bed60079183079b9b9352290ef9c32cdc4e33fc205fb0bc243c4e06c0214bbd9976276
-
Filesize
307KB
MD5673aee62691ea721d710f4aa440c4af8
SHA1ac72a9d9df847283d15b9d82bd7d0d47d4715f1b
SHA2568ab397d2f55a63d95587af5ddd1b23da8a819e2d9912b6772c7b0648882aa465
SHA51246946a6f48c2ad36c2bbc99c7847011b0c8fee7cd5e41d9cec4a8f59249461a5d89045096d8b97ea7f901fbcb910094fb6b6595c627a23fc7e3c38f31d58b01b
-
Filesize
307KB
MD5673aee62691ea721d710f4aa440c4af8
SHA1ac72a9d9df847283d15b9d82bd7d0d47d4715f1b
SHA2568ab397d2f55a63d95587af5ddd1b23da8a819e2d9912b6772c7b0648882aa465
SHA51246946a6f48c2ad36c2bbc99c7847011b0c8fee7cd5e41d9cec4a8f59249461a5d89045096d8b97ea7f901fbcb910094fb6b6595c627a23fc7e3c38f31d58b01b
-
Filesize
168KB
MD5774b2f7808ae60895d424cce8bcfc0bc
SHA10e28d3189fb436a94bd702b260ab7b305cf53713
SHA256d4b2243dc37599cd9a1d289005612d7bfeb5f9c4aa6388077723f11d23edcaf2
SHA512a6fd72fdae96e39e7c6622f33e035e7ce7dd7a0ec000e76070ad3b961b803b37f0cbe33e10162eee68b7f8b6a8d10b9a14546f0267d518c0f07414500830e612
-
Filesize
168KB
MD5774b2f7808ae60895d424cce8bcfc0bc
SHA10e28d3189fb436a94bd702b260ab7b305cf53713
SHA256d4b2243dc37599cd9a1d289005612d7bfeb5f9c4aa6388077723f11d23edcaf2
SHA512a6fd72fdae96e39e7c6622f33e035e7ce7dd7a0ec000e76070ad3b961b803b37f0cbe33e10162eee68b7f8b6a8d10b9a14546f0267d518c0f07414500830e612
-
Filesize
181KB
MD5f6af5acd7bd84637b71cb9d5dbbb4aca
SHA15b8fd3a719c491a0c832a34b9d353647fa5f66da
SHA25664587f876e856b8d28c55564da7302be7c9a26e1566bf8dd4568d0b3cd19d128
SHA5128f6eff73a5069d8ee8485e77d4e79f3ee797dcbcb60a3135bcc96c02a5d0d430f0026699602cfe40fb4d3c57bb0f92e363bcec91957606a022d594b35ab710b7
-
Filesize
181KB
MD5f6af5acd7bd84637b71cb9d5dbbb4aca
SHA15b8fd3a719c491a0c832a34b9d353647fa5f66da
SHA25664587f876e856b8d28c55564da7302be7c9a26e1566bf8dd4568d0b3cd19d128
SHA5128f6eff73a5069d8ee8485e77d4e79f3ee797dcbcb60a3135bcc96c02a5d0d430f0026699602cfe40fb4d3c57bb0f92e363bcec91957606a022d594b35ab710b7
-
Filesize
211KB
MD588d0996165999d9441d3ad3a2536d5c7
SHA192b1f88f1a9c07f55f347ac258d63af7f2ae74a2
SHA256e8afa60741084fbc8c3b2110e538ab079ece761ef073ea8ed1715f0a4e02fbe6
SHA51298bcac8981762a8bcae97503554eb10700d32898a0b01c5bc78f8938c4bed60079183079b9b9352290ef9c32cdc4e33fc205fb0bc243c4e06c0214bbd9976276
-
Filesize
211KB
MD588d0996165999d9441d3ad3a2536d5c7
SHA192b1f88f1a9c07f55f347ac258d63af7f2ae74a2
SHA256e8afa60741084fbc8c3b2110e538ab079ece761ef073ea8ed1715f0a4e02fbe6
SHA51298bcac8981762a8bcae97503554eb10700d32898a0b01c5bc78f8938c4bed60079183079b9b9352290ef9c32cdc4e33fc205fb0bc243c4e06c0214bbd9976276
-
Filesize
211KB
MD588d0996165999d9441d3ad3a2536d5c7
SHA192b1f88f1a9c07f55f347ac258d63af7f2ae74a2
SHA256e8afa60741084fbc8c3b2110e538ab079ece761ef073ea8ed1715f0a4e02fbe6
SHA51298bcac8981762a8bcae97503554eb10700d32898a0b01c5bc78f8938c4bed60079183079b9b9352290ef9c32cdc4e33fc205fb0bc243c4e06c0214bbd9976276
-
Filesize
211KB
MD588d0996165999d9441d3ad3a2536d5c7
SHA192b1f88f1a9c07f55f347ac258d63af7f2ae74a2
SHA256e8afa60741084fbc8c3b2110e538ab079ece761ef073ea8ed1715f0a4e02fbe6
SHA51298bcac8981762a8bcae97503554eb10700d32898a0b01c5bc78f8938c4bed60079183079b9b9352290ef9c32cdc4e33fc205fb0bc243c4e06c0214bbd9976276
-
Filesize
211KB
MD588d0996165999d9441d3ad3a2536d5c7
SHA192b1f88f1a9c07f55f347ac258d63af7f2ae74a2
SHA256e8afa60741084fbc8c3b2110e538ab079ece761ef073ea8ed1715f0a4e02fbe6
SHA51298bcac8981762a8bcae97503554eb10700d32898a0b01c5bc78f8938c4bed60079183079b9b9352290ef9c32cdc4e33fc205fb0bc243c4e06c0214bbd9976276
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53