Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe
Resource
win10v2004-20230220-en
General
-
Target
d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe
-
Size
480KB
-
MD5
6deb6618ef6f21e6dad086121fe236dd
-
SHA1
b77bfe9ecc1f26277f5989566a789f3c692aa489
-
SHA256
d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7
-
SHA512
1c0d2cd85848d8925a5d71495acaa51dba68408e014ebbd9fc116569e5fad0057f0727444dca5607096f147d695eeb9358da7480e7137adfd48308e9bf18315f
-
SSDEEP
12288:iMrky90mcVSLfV0AD9e8aC4hP6dmfWgOe1xyXp:Kyl9tfD9oW0fBOmyZ
Malware Config
Extracted
redline
dease
217.196.96.101:4132
-
auth_value
82e4d5f9abc21848e0345118814a4e6c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5723948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5723948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5723948.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5723948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5723948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5723948.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation m7836378.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1432 y2343335.exe 1364 k5723948.exe 3568 l9294649.exe 4936 m7836378.exe 4436 oneetx.exe 5108 oneetx.exe 2004 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 836 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5723948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5723948.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2343335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2343335.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1364 k5723948.exe 1364 k5723948.exe 3568 l9294649.exe 3568 l9294649.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1364 k5723948.exe Token: SeDebugPrivilege 3568 l9294649.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4936 m7836378.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3960 wrote to memory of 1432 3960 d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe 82 PID 3960 wrote to memory of 1432 3960 d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe 82 PID 3960 wrote to memory of 1432 3960 d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe 82 PID 1432 wrote to memory of 1364 1432 y2343335.exe 83 PID 1432 wrote to memory of 1364 1432 y2343335.exe 83 PID 1432 wrote to memory of 1364 1432 y2343335.exe 83 PID 1432 wrote to memory of 3568 1432 y2343335.exe 90 PID 1432 wrote to memory of 3568 1432 y2343335.exe 90 PID 1432 wrote to memory of 3568 1432 y2343335.exe 90 PID 3960 wrote to memory of 4936 3960 d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe 92 PID 3960 wrote to memory of 4936 3960 d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe 92 PID 3960 wrote to memory of 4936 3960 d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe 92 PID 4936 wrote to memory of 4436 4936 m7836378.exe 93 PID 4936 wrote to memory of 4436 4936 m7836378.exe 93 PID 4936 wrote to memory of 4436 4936 m7836378.exe 93 PID 4436 wrote to memory of 4856 4436 oneetx.exe 94 PID 4436 wrote to memory of 4856 4436 oneetx.exe 94 PID 4436 wrote to memory of 4856 4436 oneetx.exe 94 PID 4436 wrote to memory of 2600 4436 oneetx.exe 96 PID 4436 wrote to memory of 2600 4436 oneetx.exe 96 PID 4436 wrote to memory of 2600 4436 oneetx.exe 96 PID 2600 wrote to memory of 5112 2600 cmd.exe 98 PID 2600 wrote to memory of 5112 2600 cmd.exe 98 PID 2600 wrote to memory of 5112 2600 cmd.exe 98 PID 2600 wrote to memory of 3896 2600 cmd.exe 99 PID 2600 wrote to memory of 3896 2600 cmd.exe 99 PID 2600 wrote to memory of 3896 2600 cmd.exe 99 PID 2600 wrote to memory of 1288 2600 cmd.exe 100 PID 2600 wrote to memory of 1288 2600 cmd.exe 100 PID 2600 wrote to memory of 1288 2600 cmd.exe 100 PID 2600 wrote to memory of 1308 2600 cmd.exe 101 PID 2600 wrote to memory of 1308 2600 cmd.exe 101 PID 2600 wrote to memory of 1308 2600 cmd.exe 101 PID 2600 wrote to memory of 4808 2600 cmd.exe 102 PID 2600 wrote to memory of 4808 2600 cmd.exe 102 PID 2600 wrote to memory of 4808 2600 cmd.exe 102 PID 2600 wrote to memory of 1676 2600 cmd.exe 103 PID 2600 wrote to memory of 1676 2600 cmd.exe 103 PID 2600 wrote to memory of 1676 2600 cmd.exe 103 PID 4436 wrote to memory of 836 4436 oneetx.exe 106 PID 4436 wrote to memory of 836 4436 oneetx.exe 106 PID 4436 wrote to memory of 836 4436 oneetx.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe"C:\Users\Admin\AppData\Local\Temp\d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2343335.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2343335.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5723948.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5723948.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9294649.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9294649.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m7836378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m7836378.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4856
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1676
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:5108
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD59f414ef1b6e1f42da3efa7dbc4fc003e
SHA172805eda761443e5b067f4d63a15b544c379febb
SHA2567a319510ca432b8db028f62d9fed4bb64967a417855470008bfa097b1ae88e17
SHA512582b18a3a418845bcbacc0c3735c47464799aec19e4486cc653f12bcd020e33600fb95fdd7a29eee34be6bbe75e633efac1f7471661a55bc2943f034b444bd2b
-
Filesize
212KB
MD59f414ef1b6e1f42da3efa7dbc4fc003e
SHA172805eda761443e5b067f4d63a15b544c379febb
SHA2567a319510ca432b8db028f62d9fed4bb64967a417855470008bfa097b1ae88e17
SHA512582b18a3a418845bcbacc0c3735c47464799aec19e4486cc653f12bcd020e33600fb95fdd7a29eee34be6bbe75e633efac1f7471661a55bc2943f034b444bd2b
-
Filesize
309KB
MD53533d62beb84a4052d4a634846427301
SHA1efe721caf03611b2905befe28dc6f9944159e60d
SHA2567e1083cfb43949b46c1fdf9acf479fdbea328db8885011918edda687e69eaecf
SHA5128ae0927efb2ef0e6c0a2cf21241ba5fff41f4f46ca8bfdf0a874349bf43e03240b7e925c5eadf9990a0ea2aeabfd5d7ea6f2cab2c7f5e79bb857deda0549dad6
-
Filesize
309KB
MD53533d62beb84a4052d4a634846427301
SHA1efe721caf03611b2905befe28dc6f9944159e60d
SHA2567e1083cfb43949b46c1fdf9acf479fdbea328db8885011918edda687e69eaecf
SHA5128ae0927efb2ef0e6c0a2cf21241ba5fff41f4f46ca8bfdf0a874349bf43e03240b7e925c5eadf9990a0ea2aeabfd5d7ea6f2cab2c7f5e79bb857deda0549dad6
-
Filesize
181KB
MD50218553c1f91625cd55484d54a471f18
SHA13f8dcf062a6f3c08fa8ef21b34891343891e9e1f
SHA2564c4cf3c3d4398bdf05f3ec741d75f8d90011309425678e0b134101f610dcd5f3
SHA5124e20f83ceedcb455a5f47c2f6b12ead47d4807190fa03562071b5c0f7ab7f1ed18d3de6b65743728006452b8efc0b5161325ccff028691c85da1f11fe1510a75
-
Filesize
181KB
MD50218553c1f91625cd55484d54a471f18
SHA13f8dcf062a6f3c08fa8ef21b34891343891e9e1f
SHA2564c4cf3c3d4398bdf05f3ec741d75f8d90011309425678e0b134101f610dcd5f3
SHA5124e20f83ceedcb455a5f47c2f6b12ead47d4807190fa03562071b5c0f7ab7f1ed18d3de6b65743728006452b8efc0b5161325ccff028691c85da1f11fe1510a75
-
Filesize
168KB
MD5092f24879a20dfa411fdde5f2dce1027
SHA1bf58b9912d7f096a5895e9298db61362994d61c3
SHA2563d96181a793a58b1a98836fd6d1e6125ed9b58167334ea4e9fe799085ef9a7b9
SHA512fc5f0180cd3fee79798cc73b1181a5f02b8464e01ea276fad73125dfbcb851659bc7977adaee369b88964ef80e5f4d0ea592b7c68a4b4aba990bd0adc991a3be
-
Filesize
168KB
MD5092f24879a20dfa411fdde5f2dce1027
SHA1bf58b9912d7f096a5895e9298db61362994d61c3
SHA2563d96181a793a58b1a98836fd6d1e6125ed9b58167334ea4e9fe799085ef9a7b9
SHA512fc5f0180cd3fee79798cc73b1181a5f02b8464e01ea276fad73125dfbcb851659bc7977adaee369b88964ef80e5f4d0ea592b7c68a4b4aba990bd0adc991a3be
-
Filesize
212KB
MD59f414ef1b6e1f42da3efa7dbc4fc003e
SHA172805eda761443e5b067f4d63a15b544c379febb
SHA2567a319510ca432b8db028f62d9fed4bb64967a417855470008bfa097b1ae88e17
SHA512582b18a3a418845bcbacc0c3735c47464799aec19e4486cc653f12bcd020e33600fb95fdd7a29eee34be6bbe75e633efac1f7471661a55bc2943f034b444bd2b
-
Filesize
212KB
MD59f414ef1b6e1f42da3efa7dbc4fc003e
SHA172805eda761443e5b067f4d63a15b544c379febb
SHA2567a319510ca432b8db028f62d9fed4bb64967a417855470008bfa097b1ae88e17
SHA512582b18a3a418845bcbacc0c3735c47464799aec19e4486cc653f12bcd020e33600fb95fdd7a29eee34be6bbe75e633efac1f7471661a55bc2943f034b444bd2b
-
Filesize
212KB
MD59f414ef1b6e1f42da3efa7dbc4fc003e
SHA172805eda761443e5b067f4d63a15b544c379febb
SHA2567a319510ca432b8db028f62d9fed4bb64967a417855470008bfa097b1ae88e17
SHA512582b18a3a418845bcbacc0c3735c47464799aec19e4486cc653f12bcd020e33600fb95fdd7a29eee34be6bbe75e633efac1f7471661a55bc2943f034b444bd2b
-
Filesize
212KB
MD59f414ef1b6e1f42da3efa7dbc4fc003e
SHA172805eda761443e5b067f4d63a15b544c379febb
SHA2567a319510ca432b8db028f62d9fed4bb64967a417855470008bfa097b1ae88e17
SHA512582b18a3a418845bcbacc0c3735c47464799aec19e4486cc653f12bcd020e33600fb95fdd7a29eee34be6bbe75e633efac1f7471661a55bc2943f034b444bd2b
-
Filesize
212KB
MD59f414ef1b6e1f42da3efa7dbc4fc003e
SHA172805eda761443e5b067f4d63a15b544c379febb
SHA2567a319510ca432b8db028f62d9fed4bb64967a417855470008bfa097b1ae88e17
SHA512582b18a3a418845bcbacc0c3735c47464799aec19e4486cc653f12bcd020e33600fb95fdd7a29eee34be6bbe75e633efac1f7471661a55bc2943f034b444bd2b
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5