Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    144s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/05/2023, 13:21

General

  • Target

    92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe

  • Size

    478KB

  • MD5

    ffad23dfe26ea3419cf9db6902196f31

  • SHA1

    c8d51cd7796dd3890e2e92b71efd0702f5221966

  • SHA256

    92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92

  • SHA512

    c1422d903e5f1745f21073f1a9c0320d825461e84cbcb24aea650d1cc3bad13a2703ac2ba7a1b27ad7b48e3afef43def141d624251890e773abbd32fd9485dd9

  • SSDEEP

    12288:TMr8y90nljYL+EiqW+qgiyu7sHw7nmGRR/:3y6lI/LiYHw7mGRF

Malware Config

Extracted

Family

redline

Botnet

dippo

C2

217.196.96.102:4132

Attributes
  • auth_value

    79490ff628fd6af3b29170c3c163874b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe
    "C:\Users\Admin\AppData\Local\Temp\92f3b66e5de57b159792bcd247e86551a7fb059e61226d46e072656feadf6a92.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5995911.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5995911.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5559274.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5559274.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0883616.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0883616.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3173362.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3173362.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3660
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4760
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5000
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5056
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:1860
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4852
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\c3912af058" /P "Admin:N"
                  5⤵
                    PID:3136
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    5⤵
                      PID:5032
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3448
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3436
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4772
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4608

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3173362.exe

                Filesize

                213KB

                MD5

                b0cc35010529d695cb8f323afe406771

                SHA1

                b2bb17e618a39b1d304b7240121759e37df3ad6c

                SHA256

                6fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63

                SHA512

                08dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3173362.exe

                Filesize

                213KB

                MD5

                b0cc35010529d695cb8f323afe406771

                SHA1

                b2bb17e618a39b1d304b7240121759e37df3ad6c

                SHA256

                6fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63

                SHA512

                08dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5995911.exe

                Filesize

                307KB

                MD5

                40375f5b9b8d3d8a608be036bec80751

                SHA1

                fbd6e9af08d0c8d5da1a60d05cdf68933d5b1384

                SHA256

                0365c929cfa461f26e10360ee67a8cdc655c3bad97ec63b97b1c17d88296aab0

                SHA512

                9337de257a43c2c934335c3c3cd583385be845696103c8aec45cf9e7694480e026e974032ec720a82fe1e4f20490cc3900a2ddec5e54592b0247bb99e883dcc7

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5995911.exe

                Filesize

                307KB

                MD5

                40375f5b9b8d3d8a608be036bec80751

                SHA1

                fbd6e9af08d0c8d5da1a60d05cdf68933d5b1384

                SHA256

                0365c929cfa461f26e10360ee67a8cdc655c3bad97ec63b97b1c17d88296aab0

                SHA512

                9337de257a43c2c934335c3c3cd583385be845696103c8aec45cf9e7694480e026e974032ec720a82fe1e4f20490cc3900a2ddec5e54592b0247bb99e883dcc7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5559274.exe

                Filesize

                182KB

                MD5

                55da564fb623e5931e068312a4f99a49

                SHA1

                3543c252e428fe17a4865d7679a320817cdcc3a7

                SHA256

                e2c6b4ba9797ef7ecbd2c67c5a0f8a750c3f5572634b5e90f05fe5f7860f5a8a

                SHA512

                93a46959c81bb43fedc81f14f27c4aa21b6b33959afe90cf61866c05e3094bfd7dbc6f5bf436b419ef85a3e61cf720fd406fed95c658da15b1c73d932b46e579

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5559274.exe

                Filesize

                182KB

                MD5

                55da564fb623e5931e068312a4f99a49

                SHA1

                3543c252e428fe17a4865d7679a320817cdcc3a7

                SHA256

                e2c6b4ba9797ef7ecbd2c67c5a0f8a750c3f5572634b5e90f05fe5f7860f5a8a

                SHA512

                93a46959c81bb43fedc81f14f27c4aa21b6b33959afe90cf61866c05e3094bfd7dbc6f5bf436b419ef85a3e61cf720fd406fed95c658da15b1c73d932b46e579

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0883616.exe

                Filesize

                168KB

                MD5

                6e939a04d9b292c9b7d248cc5ffab9bc

                SHA1

                66706675eeea8428b484cd6048243658e8de2ebf

                SHA256

                8a76f666830add94e731d5a8ae8f899a69a531813fb23b2d466bdae0a0b24eee

                SHA512

                a54be8469496ce4abc95f91385ef1868f78811eba154a41e7b99d87e02f734f32d5a1c894ee38df9df50492d94633834ea35591137f5d88a5eea21fd05a4deaf

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0883616.exe

                Filesize

                168KB

                MD5

                6e939a04d9b292c9b7d248cc5ffab9bc

                SHA1

                66706675eeea8428b484cd6048243658e8de2ebf

                SHA256

                8a76f666830add94e731d5a8ae8f899a69a531813fb23b2d466bdae0a0b24eee

                SHA512

                a54be8469496ce4abc95f91385ef1868f78811eba154a41e7b99d87e02f734f32d5a1c894ee38df9df50492d94633834ea35591137f5d88a5eea21fd05a4deaf

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                b0cc35010529d695cb8f323afe406771

                SHA1

                b2bb17e618a39b1d304b7240121759e37df3ad6c

                SHA256

                6fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63

                SHA512

                08dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                b0cc35010529d695cb8f323afe406771

                SHA1

                b2bb17e618a39b1d304b7240121759e37df3ad6c

                SHA256

                6fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63

                SHA512

                08dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                b0cc35010529d695cb8f323afe406771

                SHA1

                b2bb17e618a39b1d304b7240121759e37df3ad6c

                SHA256

                6fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63

                SHA512

                08dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                b0cc35010529d695cb8f323afe406771

                SHA1

                b2bb17e618a39b1d304b7240121759e37df3ad6c

                SHA256

                6fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63

                SHA512

                08dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                b0cc35010529d695cb8f323afe406771

                SHA1

                b2bb17e618a39b1d304b7240121759e37df3ad6c

                SHA256

                6fb8d22f66db9172f7744edc4defe0d48d774e850f1b058f2be5b7982d0deb63

                SHA512

                08dc15bc9c87fd47586267a1dc9805347244595cb32f2aa787d4d07da39bf52f8921b3e4e82493e99b9321df9878ab975e2fc5ddca570b24cb0e3c9c534e5f32

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • memory/2844-162-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-143-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-148-0x00000000024F0000-0x0000000002500000-memory.dmp

                Filesize

                64KB

              • memory/2844-152-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-150-0x00000000024F0000-0x0000000002500000-memory.dmp

                Filesize

                64KB

              • memory/2844-154-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-156-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-158-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-160-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-145-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-164-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-166-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-168-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-169-0x00000000024F0000-0x0000000002500000-memory.dmp

                Filesize

                64KB

              • memory/2844-170-0x00000000024F0000-0x0000000002500000-memory.dmp

                Filesize

                64KB

              • memory/2844-171-0x00000000024F0000-0x0000000002500000-memory.dmp

                Filesize

                64KB

              • memory/2844-135-0x0000000002070000-0x000000000208A000-memory.dmp

                Filesize

                104KB

              • memory/2844-136-0x0000000004970000-0x0000000004E6E000-memory.dmp

                Filesize

                5.0MB

              • memory/2844-137-0x00000000024C0000-0x00000000024D8000-memory.dmp

                Filesize

                96KB

              • memory/2844-139-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-138-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-141-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-149-0x00000000024C0000-0x00000000024D2000-memory.dmp

                Filesize

                72KB

              • memory/2844-146-0x00000000024F0000-0x0000000002500000-memory.dmp

                Filesize

                64KB

              • memory/5068-180-0x0000000002A80000-0x0000000002A92000-memory.dmp

                Filesize

                72KB

              • memory/5068-188-0x0000000006D90000-0x0000000006F52000-memory.dmp

                Filesize

                1.8MB

              • memory/5068-186-0x0000000005E80000-0x0000000005EE6000-memory.dmp

                Filesize

                408KB

              • memory/5068-183-0x00000000052A0000-0x00000000052EB000-memory.dmp

                Filesize

                300KB

              • memory/5068-182-0x0000000005260000-0x000000000529E000-memory.dmp

                Filesize

                248KB

              • memory/5068-181-0x0000000002AB0000-0x0000000002AC0000-memory.dmp

                Filesize

                64KB

              • memory/5068-178-0x0000000005870000-0x0000000005E76000-memory.dmp

                Filesize

                6.0MB

              • memory/5068-184-0x0000000005550000-0x00000000055C6000-memory.dmp

                Filesize

                472KB

              • memory/5068-185-0x0000000005670000-0x0000000005702000-memory.dmp

                Filesize

                584KB

              • memory/5068-177-0x00000000010F0000-0x00000000010F6000-memory.dmp

                Filesize

                24KB

              • memory/5068-176-0x00000000008C0000-0x00000000008EE000-memory.dmp

                Filesize

                184KB

              • memory/5068-187-0x0000000006180000-0x00000000061D0000-memory.dmp

                Filesize

                320KB

              • memory/5068-179-0x0000000005370000-0x000000000547A000-memory.dmp

                Filesize

                1.0MB

              • memory/5068-189-0x0000000008B10000-0x000000000903C000-memory.dmp

                Filesize

                5.2MB