Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 08:32
Static task
static1
Behavioral task
behavioral1
Sample
7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe
Resource
win7-20220812-en
General
-
Target
7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe
-
Size
340KB
-
MD5
18d4875ce0fa0ce44ffd779ae0a1b853
-
SHA1
d9ed97665113df352c48dc8b40b7b69d2bb94f01
-
SHA256
7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1
-
SHA512
c4f6695ba465724423f31782a2619668ca6478f202948c20c446d4dad2ce59518e80ea60d070dba6613ea5b450d9388e745d182ba3849d378550c6e1c745b7ac
-
SSDEEP
6144:bTfFDbRnOTrAZJrK+AQmSXmHUcWerLrUNl8Y4PYsL9xiClw0ER:d5Ot+WWmBWerLUlMAQ9xBIR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1480 osiwsk.exe -
Loads dropped DLL 3 IoCs
pid Process 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 600 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D0ED4452-D5F4-4820-9F52-9EF81BD16266} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D0ED4452-D5F4-4820-9F52-9EF81BD16266}\ regsvr32.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\opajtl.vxd 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe File opened for modification C:\Program Files (x86)\Common Files\opajtl.vxd 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe File created C:\Program Files (x86)\Common Files\opysub.vxd 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe File opened for modification C:\Program Files (x86)\Common Files\opysub.vxd 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe File opened for modification C:\Program Files (x86)\Common Files\osiwsk.dll 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe File created C:\Program Files (x86)\Common Files\__tmp_rar_sfx_access_check_7087406 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe File created C:\Program Files (x86)\Common Files\osiwsk.exe 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe File opened for modification C:\Program Files (x86)\Common Files\osiwsk.exe 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe File created C:\Program Files (x86)\Common Files\osiwsk.dll 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe File created C:\Program Files (x86)\Common Files\bpwoa.bat osiwsk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet explorer\Main osiwsk.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\SearchScopes\baidu osiwsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\SearchScopes\baidu\DisplayName = "°Ù¶ÈËÑË÷" osiwsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\SearchScopes\baidu\URL = "http://www.baidu.com/baidu?tn=flstudios_cb&word={searchTerms}&cl=3&ie=utf-8" osiwsk.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\SearchScopes osiwsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "baidu" osiwsk.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.135968.cn" osiwsk.exe -
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command osiwsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0ED4452-D5F4-4820-9F52-9EF81BD16266} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0ED4452-D5F4-4820-9F52-9EF81BD16266}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\osiwsk.metieot regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0ED4452-D5F4-4820-9F52-9EF81BD16266}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0ED4452-D5F4-4820-9F52-9EF81BD16266}\ProgID\ = "osiwsk.metieot" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Wow6432Node osiwsk.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Wow6432Node\CLSID osiwsk.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} osiwsk.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command\ = "\"C:\\Program Files\\Internet Explorer\\iexplore.exe\" http://www.135968.cn" osiwsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID osiwsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell osiwsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage osiwsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0ED4452-D5F4-4820-9F52-9EF81BD16266}\InprocServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command osiwsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\osiwsk.metieot\Clsid\ = "{D0ED4452-D5F4-4820-9F52-9EF81BD16266}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage osiwsk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} osiwsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0ED4452-D5F4-4820-9F52-9EF81BD16266}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0ED4452-D5F4-4820-9F52-9EF81BD16266}\InprocServer32\ = "C:\\PROGRA~2\\COMMON~1\\osiwsk.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\osiwsk.metieot\Clsid regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell osiwsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\osiwsk.metieot\ regsvr32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 112 wrote to memory of 600 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 27 PID 112 wrote to memory of 600 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 27 PID 112 wrote to memory of 600 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 27 PID 112 wrote to memory of 600 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 27 PID 112 wrote to memory of 600 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 27 PID 112 wrote to memory of 600 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 27 PID 112 wrote to memory of 600 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 27 PID 112 wrote to memory of 1480 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 28 PID 112 wrote to memory of 1480 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 28 PID 112 wrote to memory of 1480 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 28 PID 112 wrote to memory of 1480 112 7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe 28 PID 1480 wrote to memory of 1140 1480 osiwsk.exe 29 PID 1480 wrote to memory of 1140 1480 osiwsk.exe 29 PID 1480 wrote to memory of 1140 1480 osiwsk.exe 29 PID 1480 wrote to memory of 1140 1480 osiwsk.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe"C:\Users\Admin\AppData\Local\Temp\7c3e38b9bbd023d400af88b790bad9c41c6e215b2d6c8dd97234e1dc436892a1.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s osiwsk.dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:600
-
-
C:\Program Files (x86)\Common Files\osiwsk.exe"C:\Program Files (x86)\Common Files\osiwsk.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Common Files\bpwoa.bat""3⤵PID:1140
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD511d347c35955310fd44aa3d1e9c7153a
SHA18f49825836d60440be8b40eef88272ea321e5659
SHA256ae4dd2365fca360a36f2f120241165325343b1039bbd2319617a06506d643842
SHA5123f5b7724ea42b4720623f2710ca4d4a4054a91cdbb802cd083c36149bc76ee17d707e9a0a6b1c9ff0fdcb6fe50f58c9fab33ffffa2591da8ca48406e92524a55
-
Filesize
411KB
MD5b9fce005c177df568f306d2e366db025
SHA1b9363e124be6e841438425819a79a9f72cedf55c
SHA2560b27866600dd80c5c7fdb5eedb7436b9e3a3450d0226683eb93843f39363dcda
SHA51265a618cff26285962d9549e2666c834a1f8573f8b5a002add709135450311c1debac745bd9b9bfddf87ee9a3d20cc0cacd497759558cee471832b9c876852841
-
Filesize
143KB
MD57179637fd53a65abf2436184c09efca9
SHA1f70d2ffce6f5140c6fc3e043e6603cb742f138d0
SHA256cd001bec1f02768c2f3d5c524acc3e31bd5d02360f605d5b0bf8ff749829ebc7
SHA512449aadc7078c282e67cefe670f16b80399eb4b6657104fa9b1498d8cf92d5e7f290fcfbbbce1a773ac8083bb19ca1cbd6f4e5011b9ade4c16701f9883c704235
-
Filesize
143KB
MD57179637fd53a65abf2436184c09efca9
SHA1f70d2ffce6f5140c6fc3e043e6603cb742f138d0
SHA256cd001bec1f02768c2f3d5c524acc3e31bd5d02360f605d5b0bf8ff749829ebc7
SHA512449aadc7078c282e67cefe670f16b80399eb4b6657104fa9b1498d8cf92d5e7f290fcfbbbce1a773ac8083bb19ca1cbd6f4e5011b9ade4c16701f9883c704235
-
Filesize
411KB
MD5b9fce005c177df568f306d2e366db025
SHA1b9363e124be6e841438425819a79a9f72cedf55c
SHA2560b27866600dd80c5c7fdb5eedb7436b9e3a3450d0226683eb93843f39363dcda
SHA51265a618cff26285962d9549e2666c834a1f8573f8b5a002add709135450311c1debac745bd9b9bfddf87ee9a3d20cc0cacd497759558cee471832b9c876852841
-
Filesize
143KB
MD57179637fd53a65abf2436184c09efca9
SHA1f70d2ffce6f5140c6fc3e043e6603cb742f138d0
SHA256cd001bec1f02768c2f3d5c524acc3e31bd5d02360f605d5b0bf8ff749829ebc7
SHA512449aadc7078c282e67cefe670f16b80399eb4b6657104fa9b1498d8cf92d5e7f290fcfbbbce1a773ac8083bb19ca1cbd6f4e5011b9ade4c16701f9883c704235
-
Filesize
143KB
MD57179637fd53a65abf2436184c09efca9
SHA1f70d2ffce6f5140c6fc3e043e6603cb742f138d0
SHA256cd001bec1f02768c2f3d5c524acc3e31bd5d02360f605d5b0bf8ff749829ebc7
SHA512449aadc7078c282e67cefe670f16b80399eb4b6657104fa9b1498d8cf92d5e7f290fcfbbbce1a773ac8083bb19ca1cbd6f4e5011b9ade4c16701f9883c704235