Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/05/2023, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe
Resource
win10-20230220-en
General
-
Target
e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe
-
Size
479KB
-
MD5
d755549cc6a6d4c50d8b18a6e3418d28
-
SHA1
7a57cc4760ffaac7af821a49a405749b10ae8ad2
-
SHA256
e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41
-
SHA512
364ec95d6f87cacb3cd7f274fe8420e2ef06df231b9da0beb709760238083f551e199d25bb50ea61d2fb4dbf1abed6e534bf270af26b76c7eb1fd16ac9213a02
-
SSDEEP
12288:DMrCy90AdKNGs3hblk+mzoPLrFUv0M6Fs2Z5XCBfGB:Ry5q9mklXbFs2DXCkB
Malware Config
Extracted
redline
mufos
217.196.96.102:4132
-
auth_value
136f202e6569ad5815c34377858a255c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0347407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0347407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0347407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0347407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0347407.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4472 v2327928.exe 4824 a0347407.exe 2688 b6702119.exe 4392 d8728035.exe 4436 oneetx.exe 3204 oneetx.exe 4680 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4412 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0347407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0347407.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2327928.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2327928.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4824 a0347407.exe 4824 a0347407.exe 2688 b6702119.exe 2688 b6702119.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4824 a0347407.exe Token: SeDebugPrivilege 2688 b6702119.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4392 d8728035.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3272 wrote to memory of 4472 3272 e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe 66 PID 3272 wrote to memory of 4472 3272 e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe 66 PID 3272 wrote to memory of 4472 3272 e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe 66 PID 4472 wrote to memory of 4824 4472 v2327928.exe 67 PID 4472 wrote to memory of 4824 4472 v2327928.exe 67 PID 4472 wrote to memory of 4824 4472 v2327928.exe 67 PID 4472 wrote to memory of 2688 4472 v2327928.exe 68 PID 4472 wrote to memory of 2688 4472 v2327928.exe 68 PID 4472 wrote to memory of 2688 4472 v2327928.exe 68 PID 3272 wrote to memory of 4392 3272 e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe 70 PID 3272 wrote to memory of 4392 3272 e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe 70 PID 3272 wrote to memory of 4392 3272 e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe 70 PID 4392 wrote to memory of 4436 4392 d8728035.exe 71 PID 4392 wrote to memory of 4436 4392 d8728035.exe 71 PID 4392 wrote to memory of 4436 4392 d8728035.exe 71 PID 4436 wrote to memory of 4832 4436 oneetx.exe 72 PID 4436 wrote to memory of 4832 4436 oneetx.exe 72 PID 4436 wrote to memory of 4832 4436 oneetx.exe 72 PID 4436 wrote to memory of 5116 4436 oneetx.exe 74 PID 4436 wrote to memory of 5116 4436 oneetx.exe 74 PID 4436 wrote to memory of 5116 4436 oneetx.exe 74 PID 5116 wrote to memory of 4872 5116 cmd.exe 76 PID 5116 wrote to memory of 4872 5116 cmd.exe 76 PID 5116 wrote to memory of 4872 5116 cmd.exe 76 PID 5116 wrote to memory of 4508 5116 cmd.exe 77 PID 5116 wrote to memory of 4508 5116 cmd.exe 77 PID 5116 wrote to memory of 4508 5116 cmd.exe 77 PID 5116 wrote to memory of 4572 5116 cmd.exe 78 PID 5116 wrote to memory of 4572 5116 cmd.exe 78 PID 5116 wrote to memory of 4572 5116 cmd.exe 78 PID 5116 wrote to memory of 4544 5116 cmd.exe 79 PID 5116 wrote to memory of 4544 5116 cmd.exe 79 PID 5116 wrote to memory of 4544 5116 cmd.exe 79 PID 5116 wrote to memory of 4484 5116 cmd.exe 80 PID 5116 wrote to memory of 4484 5116 cmd.exe 80 PID 5116 wrote to memory of 4484 5116 cmd.exe 80 PID 5116 wrote to memory of 4420 5116 cmd.exe 81 PID 5116 wrote to memory of 4420 5116 cmd.exe 81 PID 5116 wrote to memory of 4420 5116 cmd.exe 81 PID 4436 wrote to memory of 4412 4436 oneetx.exe 83 PID 4436 wrote to memory of 4412 4436 oneetx.exe 83 PID 4436 wrote to memory of 4412 4436 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe"C:\Users\Admin\AppData\Local\Temp\e28da21b6ffb35994480208a5d2504a03d1296df4f297fb23db2b2754a13ca41.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2327928.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2327928.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0347407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0347407.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6702119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6702119.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8728035.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8728035.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4420
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3204
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD53ff00fb402caeea0aea3d1ebac6d90f5
SHA1d389c202d4058efd1952a467c5bf59fd0fc5664b
SHA256576b86bd4b8f8c0b2ae103e67e4de197490e03b1ff4da6cbae2c7ccce5a90056
SHA512ac98315d45ceda019e9cee12934c314baa0982e456e4eb4c8fba66e95907150f2c7727e5ab70747f7dce1097b3d52ae6e5da32196fc071e10f1ad181ab11a76a
-
Filesize
212KB
MD53ff00fb402caeea0aea3d1ebac6d90f5
SHA1d389c202d4058efd1952a467c5bf59fd0fc5664b
SHA256576b86bd4b8f8c0b2ae103e67e4de197490e03b1ff4da6cbae2c7ccce5a90056
SHA512ac98315d45ceda019e9cee12934c314baa0982e456e4eb4c8fba66e95907150f2c7727e5ab70747f7dce1097b3d52ae6e5da32196fc071e10f1ad181ab11a76a
-
Filesize
307KB
MD5ca9295a51b3800697ad3e2d8029d2e7d
SHA1511f8db1cb47e73b8f6bdaf093fcf41748a7b375
SHA256c8437d758f3cbedbf9fd9f6b3dc73f4e5ec47813572ecf9a41a0bf332c2f2e09
SHA51230372c698a4641064f4edc257fd1616ab4eab84d185d40ecf10f0931727907cdb6bc5194cd057383b6560d6eb01c094e13c5c9a74295a94254076edac5e148ed
-
Filesize
307KB
MD5ca9295a51b3800697ad3e2d8029d2e7d
SHA1511f8db1cb47e73b8f6bdaf093fcf41748a7b375
SHA256c8437d758f3cbedbf9fd9f6b3dc73f4e5ec47813572ecf9a41a0bf332c2f2e09
SHA51230372c698a4641064f4edc257fd1616ab4eab84d185d40ecf10f0931727907cdb6bc5194cd057383b6560d6eb01c094e13c5c9a74295a94254076edac5e148ed
-
Filesize
181KB
MD53aa58fe13b22415fe5634afefb5841e7
SHA11c440b6d53c562c5ed0d02ee0b897bd706c9c097
SHA256db1fe25b331acb7dcdecfd9370c2ee004d1d346b219a15e3128858f304a6de74
SHA512d467cd0bf810fc65165bb9a85304223e1c92247d0b81dd3fb95ee295eab1a47a1f97e6fa4ffda5d76ecf45492a705a448d6c2333055db6a7854e86f1694bfe1d
-
Filesize
181KB
MD53aa58fe13b22415fe5634afefb5841e7
SHA11c440b6d53c562c5ed0d02ee0b897bd706c9c097
SHA256db1fe25b331acb7dcdecfd9370c2ee004d1d346b219a15e3128858f304a6de74
SHA512d467cd0bf810fc65165bb9a85304223e1c92247d0b81dd3fb95ee295eab1a47a1f97e6fa4ffda5d76ecf45492a705a448d6c2333055db6a7854e86f1694bfe1d
-
Filesize
168KB
MD5d6d1b39457bcfd13e6df816557ec8ec2
SHA16fe94aca331023596fdde9aa55f5682fd1cb0d7b
SHA2566f64bf9d8a680eaf712e374392208ab6ce76f630133b94f974de01a62e9e7e10
SHA512fd4495a9673dfeaddffabfa4bbe87f9441fcd985e2e97992b449bc9dc83d8880304943c14bab0d3e20395eed7a413afe1508fb68db69071e5f3e78d5abc49132
-
Filesize
168KB
MD5d6d1b39457bcfd13e6df816557ec8ec2
SHA16fe94aca331023596fdde9aa55f5682fd1cb0d7b
SHA2566f64bf9d8a680eaf712e374392208ab6ce76f630133b94f974de01a62e9e7e10
SHA512fd4495a9673dfeaddffabfa4bbe87f9441fcd985e2e97992b449bc9dc83d8880304943c14bab0d3e20395eed7a413afe1508fb68db69071e5f3e78d5abc49132
-
Filesize
212KB
MD53ff00fb402caeea0aea3d1ebac6d90f5
SHA1d389c202d4058efd1952a467c5bf59fd0fc5664b
SHA256576b86bd4b8f8c0b2ae103e67e4de197490e03b1ff4da6cbae2c7ccce5a90056
SHA512ac98315d45ceda019e9cee12934c314baa0982e456e4eb4c8fba66e95907150f2c7727e5ab70747f7dce1097b3d52ae6e5da32196fc071e10f1ad181ab11a76a
-
Filesize
212KB
MD53ff00fb402caeea0aea3d1ebac6d90f5
SHA1d389c202d4058efd1952a467c5bf59fd0fc5664b
SHA256576b86bd4b8f8c0b2ae103e67e4de197490e03b1ff4da6cbae2c7ccce5a90056
SHA512ac98315d45ceda019e9cee12934c314baa0982e456e4eb4c8fba66e95907150f2c7727e5ab70747f7dce1097b3d52ae6e5da32196fc071e10f1ad181ab11a76a
-
Filesize
212KB
MD53ff00fb402caeea0aea3d1ebac6d90f5
SHA1d389c202d4058efd1952a467c5bf59fd0fc5664b
SHA256576b86bd4b8f8c0b2ae103e67e4de197490e03b1ff4da6cbae2c7ccce5a90056
SHA512ac98315d45ceda019e9cee12934c314baa0982e456e4eb4c8fba66e95907150f2c7727e5ab70747f7dce1097b3d52ae6e5da32196fc071e10f1ad181ab11a76a
-
Filesize
212KB
MD53ff00fb402caeea0aea3d1ebac6d90f5
SHA1d389c202d4058efd1952a467c5bf59fd0fc5664b
SHA256576b86bd4b8f8c0b2ae103e67e4de197490e03b1ff4da6cbae2c7ccce5a90056
SHA512ac98315d45ceda019e9cee12934c314baa0982e456e4eb4c8fba66e95907150f2c7727e5ab70747f7dce1097b3d52ae6e5da32196fc071e10f1ad181ab11a76a
-
Filesize
212KB
MD53ff00fb402caeea0aea3d1ebac6d90f5
SHA1d389c202d4058efd1952a467c5bf59fd0fc5664b
SHA256576b86bd4b8f8c0b2ae103e67e4de197490e03b1ff4da6cbae2c7ccce5a90056
SHA512ac98315d45ceda019e9cee12934c314baa0982e456e4eb4c8fba66e95907150f2c7727e5ab70747f7dce1097b3d52ae6e5da32196fc071e10f1ad181ab11a76a
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53