Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15/04/2023, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
si757398.exe
Resource
win7-20230220-en
General
-
Target
si757398.exe
-
Size
395KB
-
MD5
9656d53d184ab79001e82bce0a639f1b
-
SHA1
8d7d5ac5111285f190cb11f58cb3194c0b828569
-
SHA256
fcf1a7ce106478810478f12243112b90762b08a546082d113ef1d2ef4c54aa1f
-
SHA512
e65c8a5faadc2b8df7d3ed5923fe4086239ca21b2a206fcc6c46b04028df02750b55f84b8ccf9abcd7b217921b0547b35e8cd0ff5012d0d9920701ec4bc4e502
-
SSDEEP
6144:WV0vRCjEtIraUyz76Ly+MwdL7//wQHf9NzO4TcegrGN+bb5Pt:WV0wjEeuUyzGLyAwKatDqSb
Malware Config
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 960 oneetx.exe 1892 oneetx.exe -
Loads dropped DLL 6 IoCs
pid Process 1972 si757398.exe 1972 si757398.exe 1220 rundll32.exe 1220 rundll32.exe 1220 rundll32.exe 1220 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1544 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 si757398.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1972 wrote to memory of 960 1972 si757398.exe 27 PID 1972 wrote to memory of 960 1972 si757398.exe 27 PID 1972 wrote to memory of 960 1972 si757398.exe 27 PID 1972 wrote to memory of 960 1972 si757398.exe 27 PID 960 wrote to memory of 1544 960 oneetx.exe 28 PID 960 wrote to memory of 1544 960 oneetx.exe 28 PID 960 wrote to memory of 1544 960 oneetx.exe 28 PID 960 wrote to memory of 1544 960 oneetx.exe 28 PID 1864 wrote to memory of 1892 1864 taskeng.exe 33 PID 1864 wrote to memory of 1892 1864 taskeng.exe 33 PID 1864 wrote to memory of 1892 1864 taskeng.exe 33 PID 1864 wrote to memory of 1892 1864 taskeng.exe 33 PID 960 wrote to memory of 1220 960 oneetx.exe 34 PID 960 wrote to memory of 1220 960 oneetx.exe 34 PID 960 wrote to memory of 1220 960 oneetx.exe 34 PID 960 wrote to memory of 1220 960 oneetx.exe 34 PID 960 wrote to memory of 1220 960 oneetx.exe 34 PID 960 wrote to memory of 1220 960 oneetx.exe 34 PID 960 wrote to memory of 1220 960 oneetx.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\si757398.exe"C:\Users\Admin\AppData\Local\Temp\si757398.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:1544
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:1220
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6E95ADD2-6F21-4B5B-9C8B-238701C06731} S-1-5-21-1563773381-2037468142-1146002597-1000:YBHADZIG\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe2⤵
- Executes dropped EXE
PID:1892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD59656d53d184ab79001e82bce0a639f1b
SHA18d7d5ac5111285f190cb11f58cb3194c0b828569
SHA256fcf1a7ce106478810478f12243112b90762b08a546082d113ef1d2ef4c54aa1f
SHA512e65c8a5faadc2b8df7d3ed5923fe4086239ca21b2a206fcc6c46b04028df02750b55f84b8ccf9abcd7b217921b0547b35e8cd0ff5012d0d9920701ec4bc4e502
-
Filesize
395KB
MD59656d53d184ab79001e82bce0a639f1b
SHA18d7d5ac5111285f190cb11f58cb3194c0b828569
SHA256fcf1a7ce106478810478f12243112b90762b08a546082d113ef1d2ef4c54aa1f
SHA512e65c8a5faadc2b8df7d3ed5923fe4086239ca21b2a206fcc6c46b04028df02750b55f84b8ccf9abcd7b217921b0547b35e8cd0ff5012d0d9920701ec4bc4e502
-
Filesize
395KB
MD59656d53d184ab79001e82bce0a639f1b
SHA18d7d5ac5111285f190cb11f58cb3194c0b828569
SHA256fcf1a7ce106478810478f12243112b90762b08a546082d113ef1d2ef4c54aa1f
SHA512e65c8a5faadc2b8df7d3ed5923fe4086239ca21b2a206fcc6c46b04028df02750b55f84b8ccf9abcd7b217921b0547b35e8cd0ff5012d0d9920701ec4bc4e502
-
Filesize
395KB
MD59656d53d184ab79001e82bce0a639f1b
SHA18d7d5ac5111285f190cb11f58cb3194c0b828569
SHA256fcf1a7ce106478810478f12243112b90762b08a546082d113ef1d2ef4c54aa1f
SHA512e65c8a5faadc2b8df7d3ed5923fe4086239ca21b2a206fcc6c46b04028df02750b55f84b8ccf9abcd7b217921b0547b35e8cd0ff5012d0d9920701ec4bc4e502
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
395KB
MD59656d53d184ab79001e82bce0a639f1b
SHA18d7d5ac5111285f190cb11f58cb3194c0b828569
SHA256fcf1a7ce106478810478f12243112b90762b08a546082d113ef1d2ef4c54aa1f
SHA512e65c8a5faadc2b8df7d3ed5923fe4086239ca21b2a206fcc6c46b04028df02750b55f84b8ccf9abcd7b217921b0547b35e8cd0ff5012d0d9920701ec4bc4e502
-
Filesize
395KB
MD59656d53d184ab79001e82bce0a639f1b
SHA18d7d5ac5111285f190cb11f58cb3194c0b828569
SHA256fcf1a7ce106478810478f12243112b90762b08a546082d113ef1d2ef4c54aa1f
SHA512e65c8a5faadc2b8df7d3ed5923fe4086239ca21b2a206fcc6c46b04028df02750b55f84b8ccf9abcd7b217921b0547b35e8cd0ff5012d0d9920701ec4bc4e502
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f