Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2023, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe
Resource
win10v2004-20230220-en
General
-
Target
fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe
-
Size
479KB
-
MD5
cda52bcfed68bf4add886719ca8dc60b
-
SHA1
4758932ce38f39a6d76389913545a3ad76572c61
-
SHA256
fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda
-
SHA512
9d22b7d27bcd29961125330557ac5f5ff0307088c169fbcb87669c37031c57a6e2a5b815014d1ff40bb5e9998869bed4395b41740dfd756fbf16ad533ee9f609
-
SSDEEP
12288:jMrOy90fFHCYeU4je+3lq6B11atBfJVuhy:VyiUU4T3l7BLaNVuy
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h2213665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h2213665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h2213665.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h2213665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h2213665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h2213665.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation i0973732.exe -
Executes dropped EXE 7 IoCs
pid Process 1668 x7193087.exe 1232 g8024951.exe 4468 h2213665.exe 1488 i0973732.exe 2120 oneetx.exe 4692 oneetx.exe 4536 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4596 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h2213665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h2213665.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7193087.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7193087.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3136 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1232 g8024951.exe 1232 g8024951.exe 4468 h2213665.exe 4468 h2213665.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1232 g8024951.exe Token: SeDebugPrivilege 4468 h2213665.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 i0973732.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1668 1740 fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe 84 PID 1740 wrote to memory of 1668 1740 fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe 84 PID 1740 wrote to memory of 1668 1740 fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe 84 PID 1668 wrote to memory of 1232 1668 x7193087.exe 85 PID 1668 wrote to memory of 1232 1668 x7193087.exe 85 PID 1668 wrote to memory of 1232 1668 x7193087.exe 85 PID 1668 wrote to memory of 4468 1668 x7193087.exe 92 PID 1668 wrote to memory of 4468 1668 x7193087.exe 92 PID 1668 wrote to memory of 4468 1668 x7193087.exe 92 PID 1740 wrote to memory of 1488 1740 fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe 93 PID 1740 wrote to memory of 1488 1740 fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe 93 PID 1740 wrote to memory of 1488 1740 fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe 93 PID 1488 wrote to memory of 2120 1488 i0973732.exe 94 PID 1488 wrote to memory of 2120 1488 i0973732.exe 94 PID 1488 wrote to memory of 2120 1488 i0973732.exe 94 PID 2120 wrote to memory of 3136 2120 oneetx.exe 95 PID 2120 wrote to memory of 3136 2120 oneetx.exe 95 PID 2120 wrote to memory of 3136 2120 oneetx.exe 95 PID 2120 wrote to memory of 2248 2120 oneetx.exe 97 PID 2120 wrote to memory of 2248 2120 oneetx.exe 97 PID 2120 wrote to memory of 2248 2120 oneetx.exe 97 PID 2248 wrote to memory of 1288 2248 cmd.exe 99 PID 2248 wrote to memory of 1288 2248 cmd.exe 99 PID 2248 wrote to memory of 1288 2248 cmd.exe 99 PID 2248 wrote to memory of 1324 2248 cmd.exe 100 PID 2248 wrote to memory of 1324 2248 cmd.exe 100 PID 2248 wrote to memory of 1324 2248 cmd.exe 100 PID 2248 wrote to memory of 4340 2248 cmd.exe 101 PID 2248 wrote to memory of 4340 2248 cmd.exe 101 PID 2248 wrote to memory of 4340 2248 cmd.exe 101 PID 2248 wrote to memory of 3304 2248 cmd.exe 102 PID 2248 wrote to memory of 3304 2248 cmd.exe 102 PID 2248 wrote to memory of 3304 2248 cmd.exe 102 PID 2248 wrote to memory of 4372 2248 cmd.exe 103 PID 2248 wrote to memory of 4372 2248 cmd.exe 103 PID 2248 wrote to memory of 4372 2248 cmd.exe 103 PID 2248 wrote to memory of 2156 2248 cmd.exe 104 PID 2248 wrote to memory of 2156 2248 cmd.exe 104 PID 2248 wrote to memory of 2156 2248 cmd.exe 104 PID 2120 wrote to memory of 4596 2120 oneetx.exe 107 PID 2120 wrote to memory of 4596 2120 oneetx.exe 107 PID 2120 wrote to memory of 4596 2120 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe"C:\Users\Admin\AppData\Local\Temp\fae368b0ceb9abc225988af96778affd4931a2dcafec38d41045e3e1ca2cadda.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7193087.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7193087.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8024951.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8024951.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2213665.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2213665.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0973732.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0973732.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3136
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1288
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2156
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4692
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5c8d3acdbd4610240b38ae0012e09a1ef
SHA11b9601114d99557c9a9d78f7000a73079b2cadb9
SHA2566ca08e022bfc26c6681f2ca4fd3453ca61793f01ff594337b4b2ab4c09aa5308
SHA512e4265b36e81bf6bd2738f56a32acec250d0d3243041d64c5a8d8f014c77b3f1db8dfebdb6d2603b0951443db5e0255c4ab7335e1711080334450d495d919d3db
-
Filesize
212KB
MD5c8d3acdbd4610240b38ae0012e09a1ef
SHA11b9601114d99557c9a9d78f7000a73079b2cadb9
SHA2566ca08e022bfc26c6681f2ca4fd3453ca61793f01ff594337b4b2ab4c09aa5308
SHA512e4265b36e81bf6bd2738f56a32acec250d0d3243041d64c5a8d8f014c77b3f1db8dfebdb6d2603b0951443db5e0255c4ab7335e1711080334450d495d919d3db
-
Filesize
307KB
MD59c46cf004c00e3d4d69a077d185e6087
SHA164514294e44cf6aba6c0d2972ff25e646c3d23da
SHA2560cb7b6638b2412b633227f1b7f0382114c7cd2b434b8ec7fd2c1114a561d67a2
SHA5126e2567d642a76f860fe73bec5961dbf692325cfefe69d0d7833190f7dbdead4e564603c7cdbaafdd365cf24d9e26ea8c60f01d973eaccd166b2917f0733d0fca
-
Filesize
307KB
MD59c46cf004c00e3d4d69a077d185e6087
SHA164514294e44cf6aba6c0d2972ff25e646c3d23da
SHA2560cb7b6638b2412b633227f1b7f0382114c7cd2b434b8ec7fd2c1114a561d67a2
SHA5126e2567d642a76f860fe73bec5961dbf692325cfefe69d0d7833190f7dbdead4e564603c7cdbaafdd365cf24d9e26ea8c60f01d973eaccd166b2917f0733d0fca
-
Filesize
168KB
MD53bcac346e2fe8b5875c8fd9661c7f169
SHA1fad0dbb4bde23d7642176ab0becaaaa7b216d49d
SHA256d59de998dd78b1d634ded94e5e7bdc5ddb48d812baee7210677344869fa61796
SHA5127498d3035911b828ca6ce59ebda722b132fff05c3cda7aca52006f1e6283c1ff3d890cd7f4681a8315f6e0c090140921fd3670b1c9771d540c50f23382e90e59
-
Filesize
168KB
MD53bcac346e2fe8b5875c8fd9661c7f169
SHA1fad0dbb4bde23d7642176ab0becaaaa7b216d49d
SHA256d59de998dd78b1d634ded94e5e7bdc5ddb48d812baee7210677344869fa61796
SHA5127498d3035911b828ca6ce59ebda722b132fff05c3cda7aca52006f1e6283c1ff3d890cd7f4681a8315f6e0c090140921fd3670b1c9771d540c50f23382e90e59
-
Filesize
182KB
MD557f26229b7bffbd532b8de64f108f55b
SHA12f89d5447bec42dfdd7ef704af43e46a6f3c54e1
SHA256cac7305adc8b76cc30667a0c653d325a5584959970bd1a7d7f1fa464d87b0300
SHA5127b1543afe5e66ded6642f522dc72a5c5ad0b60755292d98f466ebc1ad7e3523ef666530f20820bffad91c9ec546335abc7a35fa8ab4dfa94dda6346ae556d20a
-
Filesize
182KB
MD557f26229b7bffbd532b8de64f108f55b
SHA12f89d5447bec42dfdd7ef704af43e46a6f3c54e1
SHA256cac7305adc8b76cc30667a0c653d325a5584959970bd1a7d7f1fa464d87b0300
SHA5127b1543afe5e66ded6642f522dc72a5c5ad0b60755292d98f466ebc1ad7e3523ef666530f20820bffad91c9ec546335abc7a35fa8ab4dfa94dda6346ae556d20a
-
Filesize
212KB
MD5c8d3acdbd4610240b38ae0012e09a1ef
SHA11b9601114d99557c9a9d78f7000a73079b2cadb9
SHA2566ca08e022bfc26c6681f2ca4fd3453ca61793f01ff594337b4b2ab4c09aa5308
SHA512e4265b36e81bf6bd2738f56a32acec250d0d3243041d64c5a8d8f014c77b3f1db8dfebdb6d2603b0951443db5e0255c4ab7335e1711080334450d495d919d3db
-
Filesize
212KB
MD5c8d3acdbd4610240b38ae0012e09a1ef
SHA11b9601114d99557c9a9d78f7000a73079b2cadb9
SHA2566ca08e022bfc26c6681f2ca4fd3453ca61793f01ff594337b4b2ab4c09aa5308
SHA512e4265b36e81bf6bd2738f56a32acec250d0d3243041d64c5a8d8f014c77b3f1db8dfebdb6d2603b0951443db5e0255c4ab7335e1711080334450d495d919d3db
-
Filesize
212KB
MD5c8d3acdbd4610240b38ae0012e09a1ef
SHA11b9601114d99557c9a9d78f7000a73079b2cadb9
SHA2566ca08e022bfc26c6681f2ca4fd3453ca61793f01ff594337b4b2ab4c09aa5308
SHA512e4265b36e81bf6bd2738f56a32acec250d0d3243041d64c5a8d8f014c77b3f1db8dfebdb6d2603b0951443db5e0255c4ab7335e1711080334450d495d919d3db
-
Filesize
212KB
MD5c8d3acdbd4610240b38ae0012e09a1ef
SHA11b9601114d99557c9a9d78f7000a73079b2cadb9
SHA2566ca08e022bfc26c6681f2ca4fd3453ca61793f01ff594337b4b2ab4c09aa5308
SHA512e4265b36e81bf6bd2738f56a32acec250d0d3243041d64c5a8d8f014c77b3f1db8dfebdb6d2603b0951443db5e0255c4ab7335e1711080334450d495d919d3db
-
Filesize
212KB
MD5c8d3acdbd4610240b38ae0012e09a1ef
SHA11b9601114d99557c9a9d78f7000a73079b2cadb9
SHA2566ca08e022bfc26c6681f2ca4fd3453ca61793f01ff594337b4b2ab4c09aa5308
SHA512e4265b36e81bf6bd2738f56a32acec250d0d3243041d64c5a8d8f014c77b3f1db8dfebdb6d2603b0951443db5e0255c4ab7335e1711080334450d495d919d3db
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5