Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2023, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
189fe82cc89ca2b3586e9e9b87333388.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
189fe82cc89ca2b3586e9e9b87333388.exe
Resource
win10v2004-20230220-en
General
-
Target
189fe82cc89ca2b3586e9e9b87333388.exe
-
Size
488KB
-
MD5
189fe82cc89ca2b3586e9e9b87333388
-
SHA1
9b677d710ea409a14a75098c4e040a3df9b8bd36
-
SHA256
96c756e98e7450f83927f62ab06fb7b552dbe454bae1a97a7b22cd866398b5de
-
SHA512
0a8ddf0e18dccb86a1b976a659315f0969fe4d14bb63eea7e6419ea0c99dbb2fecec8acedad45e3c0ae6d5327a5c339cf260b105d206499fcf750a44429b2825
-
SSDEEP
12288:9Mrby90xez70tQ2Q9AJuBFUGRvndP1PeUEn6:myRJ2Q9AJUuGR/PeUv
Malware Config
Extracted
redline
misik
217.196.96.102:4132
-
auth_value
9133827666bc8f4b05339316460b08aa
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1611948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1611948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1611948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1611948.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1611948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1611948.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation d1457998.exe -
Executes dropped EXE 7 IoCs
pid Process 4156 v4544658.exe 1464 a1611948.exe 2844 b6700151.exe 4168 d1457998.exe 3920 oneetx.exe 3796 oneetx.exe 2176 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4260 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1611948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1611948.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4544658.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 189fe82cc89ca2b3586e9e9b87333388.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 189fe82cc89ca2b3586e9e9b87333388.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4544658.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1464 a1611948.exe 1464 a1611948.exe 2844 b6700151.exe 2844 b6700151.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1464 a1611948.exe Token: SeDebugPrivilege 2844 b6700151.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4168 d1457998.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3344 wrote to memory of 4156 3344 189fe82cc89ca2b3586e9e9b87333388.exe 84 PID 3344 wrote to memory of 4156 3344 189fe82cc89ca2b3586e9e9b87333388.exe 84 PID 3344 wrote to memory of 4156 3344 189fe82cc89ca2b3586e9e9b87333388.exe 84 PID 4156 wrote to memory of 1464 4156 v4544658.exe 85 PID 4156 wrote to memory of 1464 4156 v4544658.exe 85 PID 4156 wrote to memory of 1464 4156 v4544658.exe 85 PID 4156 wrote to memory of 2844 4156 v4544658.exe 94 PID 4156 wrote to memory of 2844 4156 v4544658.exe 94 PID 4156 wrote to memory of 2844 4156 v4544658.exe 94 PID 3344 wrote to memory of 4168 3344 189fe82cc89ca2b3586e9e9b87333388.exe 96 PID 3344 wrote to memory of 4168 3344 189fe82cc89ca2b3586e9e9b87333388.exe 96 PID 3344 wrote to memory of 4168 3344 189fe82cc89ca2b3586e9e9b87333388.exe 96 PID 4168 wrote to memory of 3920 4168 d1457998.exe 97 PID 4168 wrote to memory of 3920 4168 d1457998.exe 97 PID 4168 wrote to memory of 3920 4168 d1457998.exe 97 PID 3920 wrote to memory of 2884 3920 oneetx.exe 98 PID 3920 wrote to memory of 2884 3920 oneetx.exe 98 PID 3920 wrote to memory of 2884 3920 oneetx.exe 98 PID 3920 wrote to memory of 3436 3920 oneetx.exe 100 PID 3920 wrote to memory of 3436 3920 oneetx.exe 100 PID 3920 wrote to memory of 3436 3920 oneetx.exe 100 PID 3436 wrote to memory of 2880 3436 cmd.exe 102 PID 3436 wrote to memory of 2880 3436 cmd.exe 102 PID 3436 wrote to memory of 2880 3436 cmd.exe 102 PID 3436 wrote to memory of 4812 3436 cmd.exe 103 PID 3436 wrote to memory of 4812 3436 cmd.exe 103 PID 3436 wrote to memory of 4812 3436 cmd.exe 103 PID 3436 wrote to memory of 4776 3436 cmd.exe 104 PID 3436 wrote to memory of 4776 3436 cmd.exe 104 PID 3436 wrote to memory of 4776 3436 cmd.exe 104 PID 3436 wrote to memory of 448 3436 cmd.exe 105 PID 3436 wrote to memory of 448 3436 cmd.exe 105 PID 3436 wrote to memory of 448 3436 cmd.exe 105 PID 3436 wrote to memory of 1228 3436 cmd.exe 106 PID 3436 wrote to memory of 1228 3436 cmd.exe 106 PID 3436 wrote to memory of 1228 3436 cmd.exe 106 PID 3436 wrote to memory of 3196 3436 cmd.exe 107 PID 3436 wrote to memory of 3196 3436 cmd.exe 107 PID 3436 wrote to memory of 3196 3436 cmd.exe 107 PID 3920 wrote to memory of 4260 3920 oneetx.exe 110 PID 3920 wrote to memory of 4260 3920 oneetx.exe 110 PID 3920 wrote to memory of 4260 3920 oneetx.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\189fe82cc89ca2b3586e9e9b87333388.exe"C:\Users\Admin\AppData\Local\Temp\189fe82cc89ca2b3586e9e9b87333388.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4544658.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4544658.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1611948.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1611948.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6700151.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6700151.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1457998.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1457998.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3196
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3796
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5520ba4aa1ddf275161aed44964a9f5f9
SHA1a175c596f3f7f51ee95af50b56d7dd9a5da55b9b
SHA2567be37fb3681adeb2ba90ba10fda6bb50f7bda58311577b202aaf4e70ffa5e7a6
SHA5127860b791d7505e9dece11f721f3e3bf674efa8baa3f792a9cc9d08056b9344a6b5e74a242d64f090cd87fbeb8305d3a4bf1bc35c5b9e3c296321598d6910c125
-
Filesize
213KB
MD5520ba4aa1ddf275161aed44964a9f5f9
SHA1a175c596f3f7f51ee95af50b56d7dd9a5da55b9b
SHA2567be37fb3681adeb2ba90ba10fda6bb50f7bda58311577b202aaf4e70ffa5e7a6
SHA5127860b791d7505e9dece11f721f3e3bf674efa8baa3f792a9cc9d08056b9344a6b5e74a242d64f090cd87fbeb8305d3a4bf1bc35c5b9e3c296321598d6910c125
-
Filesize
316KB
MD50be47ef70b94af82e3dcb61b53b4f95e
SHA1477fe6ffd3428246c0fe2000bb420349a1e5e752
SHA25656f9ac0a6b3ac9884b0da29530e504e4d619cde94ac5038ee169abc77bf6a6e8
SHA512cfad57977d8cac4cb6b7da2e1093150f2e6c2d05b1565278f422119bebc6c772f7306d453749279ed12f2d3b1df92277322fe8d4d2b2e6c96c03651aeab9f147
-
Filesize
316KB
MD50be47ef70b94af82e3dcb61b53b4f95e
SHA1477fe6ffd3428246c0fe2000bb420349a1e5e752
SHA25656f9ac0a6b3ac9884b0da29530e504e4d619cde94ac5038ee169abc77bf6a6e8
SHA512cfad57977d8cac4cb6b7da2e1093150f2e6c2d05b1565278f422119bebc6c772f7306d453749279ed12f2d3b1df92277322fe8d4d2b2e6c96c03651aeab9f147
-
Filesize
184KB
MD5b773db5279a824e9d118b06d29c24552
SHA18dc9fc83f695ea7f426e3cb5fae9fcbf7b080a79
SHA256cd07710ed0f48db1ebc350ad1f5949ea2f7aae1d8c841ad3bee03864c403ffe4
SHA512c1e8d21c237d8abb1d03f7547d9c7433748064fc7fecebb727b6d0429ab79d354d60f8e31d35a536fe42f51e4d21855ab33dc9bb7a33ae2befd46c5b105f61c7
-
Filesize
184KB
MD5b773db5279a824e9d118b06d29c24552
SHA18dc9fc83f695ea7f426e3cb5fae9fcbf7b080a79
SHA256cd07710ed0f48db1ebc350ad1f5949ea2f7aae1d8c841ad3bee03864c403ffe4
SHA512c1e8d21c237d8abb1d03f7547d9c7433748064fc7fecebb727b6d0429ab79d354d60f8e31d35a536fe42f51e4d21855ab33dc9bb7a33ae2befd46c5b105f61c7
-
Filesize
168KB
MD5150d4316d266c39e00c30a3c7a1c828b
SHA1f14818d586d7ee47c620346a7085e5caf521eb14
SHA256b7a5efdb89c5c913e4d470bdcd8639f531bb25e70bc9640a8d4ea8bb70bf67a0
SHA51216fcdb724440e749f31eb5e3334d7775fdf0f3b06a0fe3dfb87e8f045e72101a6ca2c6d08d0517ef9c2028f591131d66157233f806840eadf4293f071efe191b
-
Filesize
168KB
MD5150d4316d266c39e00c30a3c7a1c828b
SHA1f14818d586d7ee47c620346a7085e5caf521eb14
SHA256b7a5efdb89c5c913e4d470bdcd8639f531bb25e70bc9640a8d4ea8bb70bf67a0
SHA51216fcdb724440e749f31eb5e3334d7775fdf0f3b06a0fe3dfb87e8f045e72101a6ca2c6d08d0517ef9c2028f591131d66157233f806840eadf4293f071efe191b
-
Filesize
213KB
MD5520ba4aa1ddf275161aed44964a9f5f9
SHA1a175c596f3f7f51ee95af50b56d7dd9a5da55b9b
SHA2567be37fb3681adeb2ba90ba10fda6bb50f7bda58311577b202aaf4e70ffa5e7a6
SHA5127860b791d7505e9dece11f721f3e3bf674efa8baa3f792a9cc9d08056b9344a6b5e74a242d64f090cd87fbeb8305d3a4bf1bc35c5b9e3c296321598d6910c125
-
Filesize
213KB
MD5520ba4aa1ddf275161aed44964a9f5f9
SHA1a175c596f3f7f51ee95af50b56d7dd9a5da55b9b
SHA2567be37fb3681adeb2ba90ba10fda6bb50f7bda58311577b202aaf4e70ffa5e7a6
SHA5127860b791d7505e9dece11f721f3e3bf674efa8baa3f792a9cc9d08056b9344a6b5e74a242d64f090cd87fbeb8305d3a4bf1bc35c5b9e3c296321598d6910c125
-
Filesize
213KB
MD5520ba4aa1ddf275161aed44964a9f5f9
SHA1a175c596f3f7f51ee95af50b56d7dd9a5da55b9b
SHA2567be37fb3681adeb2ba90ba10fda6bb50f7bda58311577b202aaf4e70ffa5e7a6
SHA5127860b791d7505e9dece11f721f3e3bf674efa8baa3f792a9cc9d08056b9344a6b5e74a242d64f090cd87fbeb8305d3a4bf1bc35c5b9e3c296321598d6910c125
-
Filesize
213KB
MD5520ba4aa1ddf275161aed44964a9f5f9
SHA1a175c596f3f7f51ee95af50b56d7dd9a5da55b9b
SHA2567be37fb3681adeb2ba90ba10fda6bb50f7bda58311577b202aaf4e70ffa5e7a6
SHA5127860b791d7505e9dece11f721f3e3bf674efa8baa3f792a9cc9d08056b9344a6b5e74a242d64f090cd87fbeb8305d3a4bf1bc35c5b9e3c296321598d6910c125
-
Filesize
213KB
MD5520ba4aa1ddf275161aed44964a9f5f9
SHA1a175c596f3f7f51ee95af50b56d7dd9a5da55b9b
SHA2567be37fb3681adeb2ba90ba10fda6bb50f7bda58311577b202aaf4e70ffa5e7a6
SHA5127860b791d7505e9dece11f721f3e3bf674efa8baa3f792a9cc9d08056b9344a6b5e74a242d64f090cd87fbeb8305d3a4bf1bc35c5b9e3c296321598d6910c125
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5