Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
58s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
si696008.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
si696008.exe
Resource
win10v2004-20230220-en
General
-
Target
si696008.exe
-
Size
384KB
-
MD5
2ef9dede758af71acc7a000f2ee2681c
-
SHA1
ff3d87419f0e108c5526b8f9e6c6e187e8964056
-
SHA256
52dc53bd41ed2cac43039c8112db6d6f73c856365509a315ff2f2bfa5234b17f
-
SHA512
8640df1e703b98e1480079f509b86c9a72b68db5d0e3fe6f1260a207b6d8e95db7754ff3481d5bdb436f4c6d121d0cae231e79032f45912efa1f078e66dfe386
-
SSDEEP
6144:ofvjoTlyU49+3U9ANGiIVOQ7s4fORwA+8igp+1YXSTJP:EvjMkUg+3U9uGL4gLbAxjIYiTB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation si696008.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 2 IoCs
pid Process 3684 oneetx.exe 2528 oneetx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 26 IoCs
pid pid_target Process procid_target 4016 2288 WerFault.exe 81 2024 2288 WerFault.exe 81 4672 2288 WerFault.exe 81 4412 2288 WerFault.exe 81 220 2288 WerFault.exe 81 456 2288 WerFault.exe 81 5012 2288 WerFault.exe 81 452 2288 WerFault.exe 81 3332 2288 WerFault.exe 81 1180 2288 WerFault.exe 81 2188 3684 WerFault.exe 104 4996 3684 WerFault.exe 104 3560 3684 WerFault.exe 104 3240 3684 WerFault.exe 104 4140 3684 WerFault.exe 104 5064 3684 WerFault.exe 104 4688 3684 WerFault.exe 104 4072 3684 WerFault.exe 104 4256 3684 WerFault.exe 104 4788 3684 WerFault.exe 104 228 3684 WerFault.exe 104 988 3684 WerFault.exe 104 3720 3684 WerFault.exe 104 728 3684 WerFault.exe 104 1128 3684 WerFault.exe 104 1824 2528 WerFault.exe 150 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1716 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 si696008.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2288 wrote to memory of 3684 2288 si696008.exe 104 PID 2288 wrote to memory of 3684 2288 si696008.exe 104 PID 2288 wrote to memory of 3684 2288 si696008.exe 104 PID 3684 wrote to memory of 1716 3684 oneetx.exe 123 PID 3684 wrote to memory of 1716 3684 oneetx.exe 123 PID 3684 wrote to memory of 1716 3684 oneetx.exe 123 PID 3684 wrote to memory of 4520 3684 oneetx.exe 129 PID 3684 wrote to memory of 4520 3684 oneetx.exe 129 PID 3684 wrote to memory of 4520 3684 oneetx.exe 129 PID 4520 wrote to memory of 2892 4520 cmd.exe 133 PID 4520 wrote to memory of 2892 4520 cmd.exe 133 PID 4520 wrote to memory of 2892 4520 cmd.exe 133 PID 4520 wrote to memory of 3924 4520 cmd.exe 134 PID 4520 wrote to memory of 3924 4520 cmd.exe 134 PID 4520 wrote to memory of 3924 4520 cmd.exe 134 PID 4520 wrote to memory of 4196 4520 cmd.exe 135 PID 4520 wrote to memory of 4196 4520 cmd.exe 135 PID 4520 wrote to memory of 4196 4520 cmd.exe 135 PID 4520 wrote to memory of 4356 4520 cmd.exe 136 PID 4520 wrote to memory of 4356 4520 cmd.exe 136 PID 4520 wrote to memory of 4356 4520 cmd.exe 136 PID 4520 wrote to memory of 4200 4520 cmd.exe 137 PID 4520 wrote to memory of 4200 4520 cmd.exe 137 PID 4520 wrote to memory of 4200 4520 cmd.exe 137 PID 4520 wrote to memory of 1688 4520 cmd.exe 138 PID 4520 wrote to memory of 1688 4520 cmd.exe 138 PID 4520 wrote to memory of 1688 4520 cmd.exe 138
Processes
-
C:\Users\Admin\AppData\Local\Temp\si696008.exe"C:\Users\Admin\AppData\Local\Temp\si696008.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 5602⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 6562⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 7202⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 7282⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 7242⤵
- Program crash
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 7242⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 10882⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 11682⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 12562⤵
- Program crash
PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 5843⤵
- Program crash
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 7483⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 7483⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 8603⤵
- Program crash
PID:3240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 9803⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 9803⤵
- Program crash
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 9883⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:1716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 8923⤵
- Program crash
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 11803⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:3924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:4196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:4356
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"4⤵PID:4200
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E4⤵PID:1688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 12083⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 8923⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 12003⤵
- Program crash
PID:988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 11763⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 12883⤵
- Program crash
PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 10003⤵
- Program crash
PID:1128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 13562⤵
- Program crash
PID:1180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2288 -ip 22881⤵PID:840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2288 -ip 22881⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2288 -ip 22881⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2288 -ip 22881⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2288 -ip 22881⤵PID:2144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2288 -ip 22881⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2288 -ip 22881⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2288 -ip 22881⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2288 -ip 22881⤵PID:4440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2288 -ip 22881⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3684 -ip 36841⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3684 -ip 36841⤵PID:3252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3684 -ip 36841⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3684 -ip 36841⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3684 -ip 36841⤵PID:3264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3684 -ip 36841⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3684 -ip 36841⤵PID:2556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3684 -ip 36841⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3684 -ip 36841⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3684 -ip 36841⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3684 -ip 36841⤵PID:112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3684 -ip 36841⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3684 -ip 36841⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3684 -ip 36841⤵PID:336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3684 -ip 36841⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 3162⤵
- Program crash
PID:1824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2528 -ip 25281⤵PID:1932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD52ef9dede758af71acc7a000f2ee2681c
SHA1ff3d87419f0e108c5526b8f9e6c6e187e8964056
SHA25652dc53bd41ed2cac43039c8112db6d6f73c856365509a315ff2f2bfa5234b17f
SHA5128640df1e703b98e1480079f509b86c9a72b68db5d0e3fe6f1260a207b6d8e95db7754ff3481d5bdb436f4c6d121d0cae231e79032f45912efa1f078e66dfe386
-
Filesize
384KB
MD52ef9dede758af71acc7a000f2ee2681c
SHA1ff3d87419f0e108c5526b8f9e6c6e187e8964056
SHA25652dc53bd41ed2cac43039c8112db6d6f73c856365509a315ff2f2bfa5234b17f
SHA5128640df1e703b98e1480079f509b86c9a72b68db5d0e3fe6f1260a207b6d8e95db7754ff3481d5bdb436f4c6d121d0cae231e79032f45912efa1f078e66dfe386
-
Filesize
384KB
MD52ef9dede758af71acc7a000f2ee2681c
SHA1ff3d87419f0e108c5526b8f9e6c6e187e8964056
SHA25652dc53bd41ed2cac43039c8112db6d6f73c856365509a315ff2f2bfa5234b17f
SHA5128640df1e703b98e1480079f509b86c9a72b68db5d0e3fe6f1260a207b6d8e95db7754ff3481d5bdb436f4c6d121d0cae231e79032f45912efa1f078e66dfe386
-
Filesize
384KB
MD52ef9dede758af71acc7a000f2ee2681c
SHA1ff3d87419f0e108c5526b8f9e6c6e187e8964056
SHA25652dc53bd41ed2cac43039c8112db6d6f73c856365509a315ff2f2bfa5234b17f
SHA5128640df1e703b98e1480079f509b86c9a72b68db5d0e3fe6f1260a207b6d8e95db7754ff3481d5bdb436f4c6d121d0cae231e79032f45912efa1f078e66dfe386