Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 23:35

General

  • Target

    e7c47b32b17e4cd5ac8ab58bc0b921c8bf535cb57f4f59405eb91ed1c9831981.exe

  • Size

    479KB

  • MD5

    48de9ceadc58667c403a5ad152deda5e

  • SHA1

    c1db80b77fb0013a1a5095e346b56d7527077353

  • SHA256

    e7c47b32b17e4cd5ac8ab58bc0b921c8bf535cb57f4f59405eb91ed1c9831981

  • SHA512

    588f50a04a1de9595a304c3b48f573f5676d9aca197ee2e63a75e6b5f9b4ff35f97046384a69424a8347cf1de117870f14c1e79624379118467a38387801dbf6

  • SSDEEP

    12288:JMrby90MOQpDtQC1hnvdvLNAA4WwHtOudDSyQiQz:Wy+vAhnvdvppstzdRE

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7c47b32b17e4cd5ac8ab58bc0b921c8bf535cb57f4f59405eb91ed1c9831981.exe
    "C:\Users\Admin\AppData\Local\Temp\e7c47b32b17e4cd5ac8ab58bc0b921c8bf535cb57f4f59405eb91ed1c9831981.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4350515.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4350515.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4159806.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4159806.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0818414.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0818414.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8228965.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8228965.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3864
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4172
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:748
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2024
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:4748
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4344
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1888
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:2592
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3404
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4744
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:2268
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3916
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:4400

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8228965.exe

                Filesize

                207KB

                MD5

                2259e31e86e251626596747dc5cb96f7

                SHA1

                a633dea97cf5fd6111673f82acc523134acbdedf

                SHA256

                0e24ba9f9fd1c3fd3e23aa8a56cd1afba00d567347112de38dac9f6346f36baa

                SHA512

                7f0b2bc182a40d97347b5bbd23ef9008a3611d05260aa6227a2625e0e1eec3ff92545a816791e07930db338956e34a879f2e850c94b1bede85f961dfeb09624b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8228965.exe

                Filesize

                207KB

                MD5

                2259e31e86e251626596747dc5cb96f7

                SHA1

                a633dea97cf5fd6111673f82acc523134acbdedf

                SHA256

                0e24ba9f9fd1c3fd3e23aa8a56cd1afba00d567347112de38dac9f6346f36baa

                SHA512

                7f0b2bc182a40d97347b5bbd23ef9008a3611d05260aa6227a2625e0e1eec3ff92545a816791e07930db338956e34a879f2e850c94b1bede85f961dfeb09624b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4350515.exe

                Filesize

                307KB

                MD5

                efdfe21025a40e381d7189d4bb27e6dd

                SHA1

                c031e7699050c15f98e20208b58053523d58d7dd

                SHA256

                89817cf75e82f5f79e248fb079d49c61b27c416ada3acbc47d21c5e541b667dc

                SHA512

                3da154ebff5ef09eecd343db9034499286126ed9b63e3e73ca168c5aaf52fa269a556e2747485a1bd49488f261fcf40eb5e13e59d88812948dde80c227dfc4c0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4350515.exe

                Filesize

                307KB

                MD5

                efdfe21025a40e381d7189d4bb27e6dd

                SHA1

                c031e7699050c15f98e20208b58053523d58d7dd

                SHA256

                89817cf75e82f5f79e248fb079d49c61b27c416ada3acbc47d21c5e541b667dc

                SHA512

                3da154ebff5ef09eecd343db9034499286126ed9b63e3e73ca168c5aaf52fa269a556e2747485a1bd49488f261fcf40eb5e13e59d88812948dde80c227dfc4c0

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4159806.exe

                Filesize

                175KB

                MD5

                068be1e02540358f4cf4330549f198f5

                SHA1

                278c8ced4fdd9043d72f53ac6ed34e534560090b

                SHA256

                cff9bc036a37fdfdb47e275192b481a6d3c965819f532b8906d9a7c565d278f9

                SHA512

                91e8b041ad95ffcbab70d37b8c2ece77843a4ce6ef1497212f8fc03002e2170934916aeca0f4ec0b11428a5853b1eb904d2802874b4da265b1a199ff32bf31ab

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4159806.exe

                Filesize

                175KB

                MD5

                068be1e02540358f4cf4330549f198f5

                SHA1

                278c8ced4fdd9043d72f53ac6ed34e534560090b

                SHA256

                cff9bc036a37fdfdb47e275192b481a6d3c965819f532b8906d9a7c565d278f9

                SHA512

                91e8b041ad95ffcbab70d37b8c2ece77843a4ce6ef1497212f8fc03002e2170934916aeca0f4ec0b11428a5853b1eb904d2802874b4da265b1a199ff32bf31ab

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0818414.exe

                Filesize

                136KB

                MD5

                969b52331bf25b43536c2aebeab2828b

                SHA1

                6d89b605908b7702e572e4d98867d35636ce6064

                SHA256

                0bf8ddc2ec1a89962c54964da09cfa4ee1db735e0f17d5e7319bb74e052ed836

                SHA512

                8501f1369f74ce67a8d604cf95833b53f872619aa53c36fe49b726ae8886385e8ccd11764f21d75434e6cada0bf9d8575fd805d32da3f3d73415c84540246c9c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0818414.exe

                Filesize

                136KB

                MD5

                969b52331bf25b43536c2aebeab2828b

                SHA1

                6d89b605908b7702e572e4d98867d35636ce6064

                SHA256

                0bf8ddc2ec1a89962c54964da09cfa4ee1db735e0f17d5e7319bb74e052ed836

                SHA512

                8501f1369f74ce67a8d604cf95833b53f872619aa53c36fe49b726ae8886385e8ccd11764f21d75434e6cada0bf9d8575fd805d32da3f3d73415c84540246c9c

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                207KB

                MD5

                2259e31e86e251626596747dc5cb96f7

                SHA1

                a633dea97cf5fd6111673f82acc523134acbdedf

                SHA256

                0e24ba9f9fd1c3fd3e23aa8a56cd1afba00d567347112de38dac9f6346f36baa

                SHA512

                7f0b2bc182a40d97347b5bbd23ef9008a3611d05260aa6227a2625e0e1eec3ff92545a816791e07930db338956e34a879f2e850c94b1bede85f961dfeb09624b

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                207KB

                MD5

                2259e31e86e251626596747dc5cb96f7

                SHA1

                a633dea97cf5fd6111673f82acc523134acbdedf

                SHA256

                0e24ba9f9fd1c3fd3e23aa8a56cd1afba00d567347112de38dac9f6346f36baa

                SHA512

                7f0b2bc182a40d97347b5bbd23ef9008a3611d05260aa6227a2625e0e1eec3ff92545a816791e07930db338956e34a879f2e850c94b1bede85f961dfeb09624b

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                207KB

                MD5

                2259e31e86e251626596747dc5cb96f7

                SHA1

                a633dea97cf5fd6111673f82acc523134acbdedf

                SHA256

                0e24ba9f9fd1c3fd3e23aa8a56cd1afba00d567347112de38dac9f6346f36baa

                SHA512

                7f0b2bc182a40d97347b5bbd23ef9008a3611d05260aa6227a2625e0e1eec3ff92545a816791e07930db338956e34a879f2e850c94b1bede85f961dfeb09624b

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                207KB

                MD5

                2259e31e86e251626596747dc5cb96f7

                SHA1

                a633dea97cf5fd6111673f82acc523134acbdedf

                SHA256

                0e24ba9f9fd1c3fd3e23aa8a56cd1afba00d567347112de38dac9f6346f36baa

                SHA512

                7f0b2bc182a40d97347b5bbd23ef9008a3611d05260aa6227a2625e0e1eec3ff92545a816791e07930db338956e34a879f2e850c94b1bede85f961dfeb09624b

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                207KB

                MD5

                2259e31e86e251626596747dc5cb96f7

                SHA1

                a633dea97cf5fd6111673f82acc523134acbdedf

                SHA256

                0e24ba9f9fd1c3fd3e23aa8a56cd1afba00d567347112de38dac9f6346f36baa

                SHA512

                7f0b2bc182a40d97347b5bbd23ef9008a3611d05260aa6227a2625e0e1eec3ff92545a816791e07930db338956e34a879f2e850c94b1bede85f961dfeb09624b

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/3728-197-0x0000000009640000-0x0000000009B6C000-memory.dmp

                Filesize

                5.2MB

              • memory/3728-188-0x00000000073E0000-0x00000000073F2000-memory.dmp

                Filesize

                72KB

              • memory/3728-198-0x0000000008740000-0x000000000875E000-memory.dmp

                Filesize

                120KB

              • memory/3728-196-0x0000000008F40000-0x0000000009102000-memory.dmp

                Filesize

                1.8MB

              • memory/3728-195-0x0000000008640000-0x00000000086B6000-memory.dmp

                Filesize

                472KB

              • memory/3728-194-0x0000000008430000-0x0000000008480000-memory.dmp

                Filesize

                320KB

              • memory/3728-193-0x0000000008340000-0x00000000083D2000-memory.dmp

                Filesize

                584KB

              • memory/3728-192-0x00000000077B0000-0x0000000007816000-memory.dmp

                Filesize

                408KB

              • memory/3728-191-0x00000000077A0000-0x00000000077B0000-memory.dmp

                Filesize

                64KB

              • memory/3728-190-0x0000000007440000-0x000000000747C000-memory.dmp

                Filesize

                240KB

              • memory/3728-189-0x0000000007510000-0x000000000761A000-memory.dmp

                Filesize

                1.0MB

              • memory/3728-186-0x00000000006D0000-0x00000000006F8000-memory.dmp

                Filesize

                160KB

              • memory/3728-187-0x0000000007970000-0x0000000007F88000-memory.dmp

                Filesize

                6.1MB

              • memory/3844-168-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-162-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-170-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-181-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/3844-180-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/3844-179-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/3844-178-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-176-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-174-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-164-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-172-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-166-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-160-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-158-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-156-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-154-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-152-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-151-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/3844-150-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/3844-149-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/3844-148-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/3844-147-0x0000000004B60000-0x0000000005104000-memory.dmp

                Filesize

                5.6MB