Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe
Resource
win10v2004-20230220-en
General
-
Target
7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe
-
Size
781KB
-
MD5
e4221dd0b5eeac7a09904d4259656b03
-
SHA1
d049025ab6bd9289b1d085c3a3fa4526df8fe3e8
-
SHA256
7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b
-
SHA512
741b1638f1bcf8ad65f586a75a557a127dfef52091056c20b9bbc283dc81313b097ddd0577bbc59d39447e44c8aa233f6a3b8a7018f7c11f055b7cac610d2668
-
SSDEEP
24576:VyyT5yGTOjzHg0/wYwKhu9nW90bxtX9MWY:wyF/T6AK+P9W90fyW
Malware Config
Extracted
redline
lessa
185.161.248.75:4132
-
auth_value
29d77029685f0783eb0ec17c1b173cb2
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o2282061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o2282061.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o2282061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o2282061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o2282061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o2282061.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral2/memory/4872-210-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-211-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-215-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-217-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-221-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-219-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-223-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-225-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-227-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-229-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-231-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-233-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-235-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-237-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-239-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-241-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-243-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-245-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline behavioral2/memory/4872-247-0x00000000049D0000-0x0000000004A12000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation s4797330.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 4168 z5432190.exe 1360 z0695148.exe 2748 o2282061.exe 3236 p0744720.exe 4872 r4323614.exe 2256 s4797330.exe 4576 oneetx.exe 2596 oneetx.exe 1372 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o2282061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o2282061.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5432190.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5432190.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0695148.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0695148.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3436 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2748 o2282061.exe 2748 o2282061.exe 3236 p0744720.exe 3236 p0744720.exe 4872 r4323614.exe 4872 r4323614.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2748 o2282061.exe Token: SeDebugPrivilege 3236 p0744720.exe Token: SeDebugPrivilege 4872 r4323614.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 s4797330.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4452 wrote to memory of 4168 4452 7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe 87 PID 4452 wrote to memory of 4168 4452 7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe 87 PID 4452 wrote to memory of 4168 4452 7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe 87 PID 4168 wrote to memory of 1360 4168 z5432190.exe 88 PID 4168 wrote to memory of 1360 4168 z5432190.exe 88 PID 4168 wrote to memory of 1360 4168 z5432190.exe 88 PID 1360 wrote to memory of 2748 1360 z0695148.exe 89 PID 1360 wrote to memory of 2748 1360 z0695148.exe 89 PID 1360 wrote to memory of 2748 1360 z0695148.exe 89 PID 1360 wrote to memory of 3236 1360 z0695148.exe 90 PID 1360 wrote to memory of 3236 1360 z0695148.exe 90 PID 1360 wrote to memory of 3236 1360 z0695148.exe 90 PID 4168 wrote to memory of 4872 4168 z5432190.exe 91 PID 4168 wrote to memory of 4872 4168 z5432190.exe 91 PID 4168 wrote to memory of 4872 4168 z5432190.exe 91 PID 4452 wrote to memory of 2256 4452 7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe 93 PID 4452 wrote to memory of 2256 4452 7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe 93 PID 4452 wrote to memory of 2256 4452 7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe 93 PID 2256 wrote to memory of 4576 2256 s4797330.exe 94 PID 2256 wrote to memory of 4576 2256 s4797330.exe 94 PID 2256 wrote to memory of 4576 2256 s4797330.exe 94 PID 4576 wrote to memory of 3436 4576 oneetx.exe 95 PID 4576 wrote to memory of 3436 4576 oneetx.exe 95 PID 4576 wrote to memory of 3436 4576 oneetx.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe"C:\Users\Admin\AppData\Local\Temp\7f913abeb581f930415ff9239b515178392744c21f91570e428182931eb7840b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5432190.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5432190.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0695148.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0695148.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o2282061.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o2282061.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0744720.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0744720.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4323614.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4323614.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4797330.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4797330.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2596
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:1372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5394a1caceb69d7fd41480ab692816278
SHA15218a3cbee5c7e9c579314b0dc206431b4afc197
SHA256ebbeb4dc971ca252f978e6c6f532d9d1b31cd8327260f1c46babbca123c539d1
SHA5126e004b0c5add73145def890824629aa37702cc237fa3fef2bba22bc3949d6669928eb94dd3d6383f9c2e7f35770c6d3fc0f5ba126dc53c352b961555c96de2f8
-
Filesize
232KB
MD5394a1caceb69d7fd41480ab692816278
SHA15218a3cbee5c7e9c579314b0dc206431b4afc197
SHA256ebbeb4dc971ca252f978e6c6f532d9d1b31cd8327260f1c46babbca123c539d1
SHA5126e004b0c5add73145def890824629aa37702cc237fa3fef2bba22bc3949d6669928eb94dd3d6383f9c2e7f35770c6d3fc0f5ba126dc53c352b961555c96de2f8
-
Filesize
232KB
MD5394a1caceb69d7fd41480ab692816278
SHA15218a3cbee5c7e9c579314b0dc206431b4afc197
SHA256ebbeb4dc971ca252f978e6c6f532d9d1b31cd8327260f1c46babbca123c539d1
SHA5126e004b0c5add73145def890824629aa37702cc237fa3fef2bba22bc3949d6669928eb94dd3d6383f9c2e7f35770c6d3fc0f5ba126dc53c352b961555c96de2f8
-
Filesize
232KB
MD5394a1caceb69d7fd41480ab692816278
SHA15218a3cbee5c7e9c579314b0dc206431b4afc197
SHA256ebbeb4dc971ca252f978e6c6f532d9d1b31cd8327260f1c46babbca123c539d1
SHA5126e004b0c5add73145def890824629aa37702cc237fa3fef2bba22bc3949d6669928eb94dd3d6383f9c2e7f35770c6d3fc0f5ba126dc53c352b961555c96de2f8
-
Filesize
232KB
MD5394a1caceb69d7fd41480ab692816278
SHA15218a3cbee5c7e9c579314b0dc206431b4afc197
SHA256ebbeb4dc971ca252f978e6c6f532d9d1b31cd8327260f1c46babbca123c539d1
SHA5126e004b0c5add73145def890824629aa37702cc237fa3fef2bba22bc3949d6669928eb94dd3d6383f9c2e7f35770c6d3fc0f5ba126dc53c352b961555c96de2f8
-
Filesize
232KB
MD5394a1caceb69d7fd41480ab692816278
SHA15218a3cbee5c7e9c579314b0dc206431b4afc197
SHA256ebbeb4dc971ca252f978e6c6f532d9d1b31cd8327260f1c46babbca123c539d1
SHA5126e004b0c5add73145def890824629aa37702cc237fa3fef2bba22bc3949d6669928eb94dd3d6383f9c2e7f35770c6d3fc0f5ba126dc53c352b961555c96de2f8
-
Filesize
232KB
MD5394a1caceb69d7fd41480ab692816278
SHA15218a3cbee5c7e9c579314b0dc206431b4afc197
SHA256ebbeb4dc971ca252f978e6c6f532d9d1b31cd8327260f1c46babbca123c539d1
SHA5126e004b0c5add73145def890824629aa37702cc237fa3fef2bba22bc3949d6669928eb94dd3d6383f9c2e7f35770c6d3fc0f5ba126dc53c352b961555c96de2f8
-
Filesize
598KB
MD5ee08a1af05e3588af87c06a567ee5513
SHA165232efa3519dbe584edda627812ca49090aa132
SHA256cb3e53811d200603f8bd4ecd9870cfa3be1af3cab85b96b59499bebbaf6dd948
SHA512f5bd73957256ef1258b21d59394a165f24659fbde5761eb2176812a7d16c8718eb72dedab9a853f57458906dc34fc74bdc7656a5064496894266662ec5982d91
-
Filesize
598KB
MD5ee08a1af05e3588af87c06a567ee5513
SHA165232efa3519dbe584edda627812ca49090aa132
SHA256cb3e53811d200603f8bd4ecd9870cfa3be1af3cab85b96b59499bebbaf6dd948
SHA512f5bd73957256ef1258b21d59394a165f24659fbde5761eb2176812a7d16c8718eb72dedab9a853f57458906dc34fc74bdc7656a5064496894266662ec5982d91
-
Filesize
286KB
MD5f44cbe20478245d86a4a9e23c14e89e5
SHA1c58837b039ce6701e21fa24cc19ded303fbbcd5f
SHA256390de8e58489858130953f052105a9656e250e594def4c32672fcf97ad91f520
SHA51206312de20e5ceaae6ce6be0c8c289fafcf97ffe30360c45329d1b050027ea5d891d3e4031d76addfc229f1115a6739a434d1326ccc506eb553638f04f8939e70
-
Filesize
286KB
MD5f44cbe20478245d86a4a9e23c14e89e5
SHA1c58837b039ce6701e21fa24cc19ded303fbbcd5f
SHA256390de8e58489858130953f052105a9656e250e594def4c32672fcf97ad91f520
SHA51206312de20e5ceaae6ce6be0c8c289fafcf97ffe30360c45329d1b050027ea5d891d3e4031d76addfc229f1115a6739a434d1326ccc506eb553638f04f8939e70
-
Filesize
316KB
MD50d1a0d5122942df669b63a7d3d4f31d9
SHA12fd19fbb5b96b0ce421a36d7c5bc494c6f33b958
SHA2561cfa734edd04ea1320111e04336b5fbc4a78419ac0c9d819e0acdfbb9f60d667
SHA51227c72b9c456960756e73000c52168c1fd7e6f6b5c6fce855308fd12ca4664d7473ff1f6f0a1c5fd1d5b7f39ee7ba3937f17eb861f35a432954d9f53bcba04cf4
-
Filesize
316KB
MD50d1a0d5122942df669b63a7d3d4f31d9
SHA12fd19fbb5b96b0ce421a36d7c5bc494c6f33b958
SHA2561cfa734edd04ea1320111e04336b5fbc4a78419ac0c9d819e0acdfbb9f60d667
SHA51227c72b9c456960756e73000c52168c1fd7e6f6b5c6fce855308fd12ca4664d7473ff1f6f0a1c5fd1d5b7f39ee7ba3937f17eb861f35a432954d9f53bcba04cf4
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
168KB
MD547e32074bdb8ffccd6e54472b1c8852d
SHA16e236ee47a4a783ed5e152c718e68abe72ae320f
SHA2567018dd58bc979eed60aec9f3a17bac4086445c5e1dd67cc50ae538df1b1dc28b
SHA51216ddcc2b73df4280087d3a6b3bcdf2974cfe3a9dbd37fff2d954ac39bed2cfd6e4d62137f1d7c254b081d4026f05cc5730257ad7e7e69ccfb6e723face909134
-
Filesize
168KB
MD547e32074bdb8ffccd6e54472b1c8852d
SHA16e236ee47a4a783ed5e152c718e68abe72ae320f
SHA2567018dd58bc979eed60aec9f3a17bac4086445c5e1dd67cc50ae538df1b1dc28b
SHA51216ddcc2b73df4280087d3a6b3bcdf2974cfe3a9dbd37fff2d954ac39bed2cfd6e4d62137f1d7c254b081d4026f05cc5730257ad7e7e69ccfb6e723face909134