Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/05/2023, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe
Resource
win10-20230220-en
General
-
Target
92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe
-
Size
478KB
-
MD5
ffad23dfe26ea3419cf9db6902196f31
-
SHA1
c8d51cd7796dd3890e2e92b71efd0702f5221966
-
SHA256
92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92
-
SHA512
c1422d903e5f1745f21073f1a9c0320d825461e84cbcb24aea650d1cc3bad13a2703ac2ba7a1b27ad7b48e3afef43def141d624251890e773abbd32fd9485dd9
-
SSDEEP
12288:TMr8y90nljYL+EiqW+qgiyu7sHw7nmGRR/:3y6lI/LiYHw7mGRF
Malware Config
Extracted
redline
dippo
217.196.96.102:4132
-
auth_value
79490ff628fd6af3b29170c3c163874b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5559274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5559274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5559274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5559274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5559274.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2744 y5995911.exe 2844 k5559274.exe 5068 l0883616.exe 1324 m3173362.exe 3660 oneetx.exe 4772 oneetx.exe 4608 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3436 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5559274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5559274.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5995911.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5995911.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2844 k5559274.exe 2844 k5559274.exe 5068 l0883616.exe 5068 l0883616.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2844 k5559274.exe Token: SeDebugPrivilege 5068 l0883616.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1324 m3173362.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2744 2440 92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe 66 PID 2440 wrote to memory of 2744 2440 92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe 66 PID 2440 wrote to memory of 2744 2440 92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe 66 PID 2744 wrote to memory of 2844 2744 y5995911.exe 67 PID 2744 wrote to memory of 2844 2744 y5995911.exe 67 PID 2744 wrote to memory of 2844 2744 y5995911.exe 67 PID 2744 wrote to memory of 5068 2744 y5995911.exe 68 PID 2744 wrote to memory of 5068 2744 y5995911.exe 68 PID 2744 wrote to memory of 5068 2744 y5995911.exe 68 PID 2440 wrote to memory of 1324 2440 92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe 70 PID 2440 wrote to memory of 1324 2440 92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe 70 PID 2440 wrote to memory of 1324 2440 92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe 70 PID 1324 wrote to memory of 3660 1324 m3173362.exe 71 PID 1324 wrote to memory of 3660 1324 m3173362.exe 71 PID 1324 wrote to memory of 3660 1324 m3173362.exe 71 PID 3660 wrote to memory of 4760 3660 oneetx.exe 72 PID 3660 wrote to memory of 4760 3660 oneetx.exe 72 PID 3660 wrote to memory of 4760 3660 oneetx.exe 72 PID 3660 wrote to memory of 5000 3660 oneetx.exe 74 PID 3660 wrote to memory of 5000 3660 oneetx.exe 74 PID 3660 wrote to memory of 5000 3660 oneetx.exe 74 PID 5000 wrote to memory of 5056 5000 cmd.exe 76 PID 5000 wrote to memory of 5056 5000 cmd.exe 76 PID 5000 wrote to memory of 5056 5000 cmd.exe 76 PID 5000 wrote to memory of 1860 5000 cmd.exe 77 PID 5000 wrote to memory of 1860 5000 cmd.exe 77 PID 5000 wrote to memory of 1860 5000 cmd.exe 77 PID 5000 wrote to memory of 4852 5000 cmd.exe 78 PID 5000 wrote to memory of 4852 5000 cmd.exe 78 PID 5000 wrote to memory of 4852 5000 cmd.exe 78 PID 5000 wrote to memory of 5032 5000 cmd.exe 80 PID 5000 wrote to memory of 5032 5000 cmd.exe 80 PID 5000 wrote to memory of 5032 5000 cmd.exe 80 PID 5000 wrote to memory of 3136 5000 cmd.exe 79 PID 5000 wrote to memory of 3136 5000 cmd.exe 79 PID 5000 wrote to memory of 3136 5000 cmd.exe 79 PID 5000 wrote to memory of 3448 5000 cmd.exe 81 PID 5000 wrote to memory of 3448 5000 cmd.exe 81 PID 5000 wrote to memory of 3448 5000 cmd.exe 81 PID 3660 wrote to memory of 3436 3660 oneetx.exe 83 PID 3660 wrote to memory of 3436 3660 oneetx.exe 83 PID 3660 wrote to memory of 3436 3660 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe"C:\Users\Admin\AppData\Local\Temp\92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5995911.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5995911.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5559274.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5559274.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0883616.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0883616.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3173362.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3173362.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4852
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3448
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4772
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5b0cc35010529d695cb8f323afe406771
SHA1b2bb17e618a39b1d304b7240121759e37df3ad6c
SHA2566fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63
SHA51208dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32
-
Filesize
213KB
MD5b0cc35010529d695cb8f323afe406771
SHA1b2bb17e618a39b1d304b7240121759e37df3ad6c
SHA2566fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63
SHA51208dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32
-
Filesize
307KB
MD540375f5b9b8d3d8a608be036bec80751
SHA1fbd6e9af08d0c8d5da1a60d05cdf68933d5b1384
SHA2560365c929cfa461f26e10360ee67a8cdc655c3bad97ec63b97b1c17d88296aab0
SHA5129337de257a43c2c934335c3c3cd583385be845696103c8aec45cf9e7694480e026e974032ec720a82fe1e4f20490cc3900a2ddec5e54592b0247bb99e883dcc7
-
Filesize
307KB
MD540375f5b9b8d3d8a608be036bec80751
SHA1fbd6e9af08d0c8d5da1a60d05cdf68933d5b1384
SHA2560365c929cfa461f26e10360ee67a8cdc655c3bad97ec63b97b1c17d88296aab0
SHA5129337de257a43c2c934335c3c3cd583385be845696103c8aec45cf9e7694480e026e974032ec720a82fe1e4f20490cc3900a2ddec5e54592b0247bb99e883dcc7
-
Filesize
182KB
MD555da564fb623e5931e068312a4f99a49
SHA13543c252e428fe17a4865d7679a320817cdcc3a7
SHA256e2c6b4ba9797ef7ecbd2c67c5a0f8a750c3f5572634b5e90f05fe5f7860f5a8a
SHA51293a46959c81bb43fedc81f14f27c4aa21b6b33959afe90cf61866c05e3094bfd7dbc6f5bf436b419ef85a3e61cf720fd406fed95c658da15b1c73d932b46e579
-
Filesize
182KB
MD555da564fb623e5931e068312a4f99a49
SHA13543c252e428fe17a4865d7679a320817cdcc3a7
SHA256e2c6b4ba9797ef7ecbd2c67c5a0f8a750c3f5572634b5e90f05fe5f7860f5a8a
SHA51293a46959c81bb43fedc81f14f27c4aa21b6b33959afe90cf61866c05e3094bfd7dbc6f5bf436b419ef85a3e61cf720fd406fed95c658da15b1c73d932b46e579
-
Filesize
168KB
MD56e939a04d9b292c9b7d248cc5ffab9bc
SHA166706675eeea8428b484cd6048243658e8de2ebf
SHA2568a76f666830add94e731d5a8ae8f899a69a531813fb23b2d466bdae0a0b24eee
SHA512a54be8469496ce4abc95f91385ef1868f78811eba154a41e7b99d87e02f734f32d5a1c894ee38df9df50492d94633834ea35591137f5d88a5eea21fd05a4deaf
-
Filesize
168KB
MD56e939a04d9b292c9b7d248cc5ffab9bc
SHA166706675eeea8428b484cd6048243658e8de2ebf
SHA2568a76f666830add94e731d5a8ae8f899a69a531813fb23b2d466bdae0a0b24eee
SHA512a54be8469496ce4abc95f91385ef1868f78811eba154a41e7b99d87e02f734f32d5a1c894ee38df9df50492d94633834ea35591137f5d88a5eea21fd05a4deaf
-
Filesize
213KB
MD5b0cc35010529d695cb8f323afe406771
SHA1b2bb17e618a39b1d304b7240121759e37df3ad6c
SHA2566fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63
SHA51208dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32
-
Filesize
213KB
MD5b0cc35010529d695cb8f323afe406771
SHA1b2bb17e618a39b1d304b7240121759e37df3ad6c
SHA2566fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63
SHA51208dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32
-
Filesize
213KB
MD5b0cc35010529d695cb8f323afe406771
SHA1b2bb17e618a39b1d304b7240121759e37df3ad6c
SHA2566fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63
SHA51208dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32
-
Filesize
213KB
MD5b0cc35010529d695cb8f323afe406771
SHA1b2bb17e618a39b1d304b7240121759e37df3ad6c
SHA2566fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63
SHA51208dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32
-
Filesize
213KB
MD5b0cc35010529d695cb8f323afe406771
SHA1b2bb17e618a39b1d304b7240121759e37df3ad6c
SHA2566fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63
SHA51208dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53