Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:56
Static task
static1
General
-
Target
643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe
-
Size
480KB
-
MD5
0debfd30bdf82d783355e402a2759036
-
SHA1
7dac22f013f021b07337e73cdc12d42a93bbfde4
-
SHA256
643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5
-
SHA512
ed8a9cd533704e88e303369dabb2901feece68bfdd25136a3a253141d304214178f530004c867b06db3398b56c18c455eabeebf6d87eec1da2f61004c6fc2eaa
-
SSDEEP
12288:VMrNy90I1ohTera3KRp3zTSIPpi6opvGw+F:wyV1ohKG8pDrhgF8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9093697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9093697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9093697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9093697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9093697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9093697.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation d9422970.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4020 v7536912.exe 2196 a9093697.exe 3872 b9140038.exe 3876 d9422970.exe 1560 oneetx.exe 3896 oneetx.exe 1000 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 5112 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9093697.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9093697.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7536912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7536912.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1180 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2196 a9093697.exe 2196 a9093697.exe 3872 b9140038.exe 3872 b9140038.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2196 a9093697.exe Token: SeDebugPrivilege 3872 b9140038.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3876 d9422970.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4556 wrote to memory of 4020 4556 643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe 81 PID 4556 wrote to memory of 4020 4556 643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe 81 PID 4556 wrote to memory of 4020 4556 643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe 81 PID 4020 wrote to memory of 2196 4020 v7536912.exe 82 PID 4020 wrote to memory of 2196 4020 v7536912.exe 82 PID 4020 wrote to memory of 2196 4020 v7536912.exe 82 PID 4020 wrote to memory of 3872 4020 v7536912.exe 86 PID 4020 wrote to memory of 3872 4020 v7536912.exe 86 PID 4020 wrote to memory of 3872 4020 v7536912.exe 86 PID 4556 wrote to memory of 3876 4556 643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe 91 PID 4556 wrote to memory of 3876 4556 643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe 91 PID 4556 wrote to memory of 3876 4556 643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe 91 PID 3876 wrote to memory of 1560 3876 d9422970.exe 92 PID 3876 wrote to memory of 1560 3876 d9422970.exe 92 PID 3876 wrote to memory of 1560 3876 d9422970.exe 92 PID 1560 wrote to memory of 1180 1560 oneetx.exe 93 PID 1560 wrote to memory of 1180 1560 oneetx.exe 93 PID 1560 wrote to memory of 1180 1560 oneetx.exe 93 PID 1560 wrote to memory of 2812 1560 oneetx.exe 95 PID 1560 wrote to memory of 2812 1560 oneetx.exe 95 PID 1560 wrote to memory of 2812 1560 oneetx.exe 95 PID 2812 wrote to memory of 3600 2812 cmd.exe 97 PID 2812 wrote to memory of 3600 2812 cmd.exe 97 PID 2812 wrote to memory of 3600 2812 cmd.exe 97 PID 2812 wrote to memory of 2144 2812 cmd.exe 98 PID 2812 wrote to memory of 2144 2812 cmd.exe 98 PID 2812 wrote to memory of 2144 2812 cmd.exe 98 PID 2812 wrote to memory of 2380 2812 cmd.exe 99 PID 2812 wrote to memory of 2380 2812 cmd.exe 99 PID 2812 wrote to memory of 2380 2812 cmd.exe 99 PID 2812 wrote to memory of 1308 2812 cmd.exe 100 PID 2812 wrote to memory of 1308 2812 cmd.exe 100 PID 2812 wrote to memory of 1308 2812 cmd.exe 100 PID 2812 wrote to memory of 2280 2812 cmd.exe 101 PID 2812 wrote to memory of 2280 2812 cmd.exe 101 PID 2812 wrote to memory of 2280 2812 cmd.exe 101 PID 2812 wrote to memory of 4460 2812 cmd.exe 102 PID 2812 wrote to memory of 4460 2812 cmd.exe 102 PID 2812 wrote to memory of 4460 2812 cmd.exe 102 PID 1560 wrote to memory of 5112 1560 oneetx.exe 104 PID 1560 wrote to memory of 5112 1560 oneetx.exe 104 PID 1560 wrote to memory of 5112 1560 oneetx.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe"C:\Users\Admin\AppData\Local\Temp\643ab82e4a13dea1ab701abe624297a807ab7bff402f907ec88746f89b6b6fb5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7536912.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7536912.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9093697.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9093697.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9140038.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9140038.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9422970.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9422970.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1180
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2280
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4460
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3896
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD52665f1e056f876d8dd52d8b7e8063a4c
SHA14982bbb010064a47271b3c3dcdfe67ce7fe99adb
SHA2569176f818f02e1410b24cbf5117fde0f240f5c06d205d4296d3dbfe40170a2cb0
SHA512057b3685ff929de33b9e5e2a358cdf90cfce07b454c0dfba6344d3abab6903f99ea3a63bde6b69eda8f5b39072f5d3654a0fda6b78bae0aea7b02c16506d3523
-
Filesize
206KB
MD52665f1e056f876d8dd52d8b7e8063a4c
SHA14982bbb010064a47271b3c3dcdfe67ce7fe99adb
SHA2569176f818f02e1410b24cbf5117fde0f240f5c06d205d4296d3dbfe40170a2cb0
SHA512057b3685ff929de33b9e5e2a358cdf90cfce07b454c0dfba6344d3abab6903f99ea3a63bde6b69eda8f5b39072f5d3654a0fda6b78bae0aea7b02c16506d3523
-
Filesize
308KB
MD5aa926da818118fd9790be24addbe9c1d
SHA16be05ede6e3e99787f60bc5ed3d2d350a1f1c0ae
SHA2566cdb98c4456ec77257f6456b87d3cb20cd63a89f340960577365af200b4e26f9
SHA512b5ac120a637467b3b0f08052e39b55545be8185d76907955964ce7f49d86a7726efaeca43f7cd6d04311a0462e8851dfa0a1cc650563619ead8733f1c77b691c
-
Filesize
308KB
MD5aa926da818118fd9790be24addbe9c1d
SHA16be05ede6e3e99787f60bc5ed3d2d350a1f1c0ae
SHA2566cdb98c4456ec77257f6456b87d3cb20cd63a89f340960577365af200b4e26f9
SHA512b5ac120a637467b3b0f08052e39b55545be8185d76907955964ce7f49d86a7726efaeca43f7cd6d04311a0462e8851dfa0a1cc650563619ead8733f1c77b691c
-
Filesize
175KB
MD524ef88f698bf8ae6e0586a10709abff6
SHA128fc5478faefec0c445a2a086cf0e99beb4c8c12
SHA25640b183fdff12c069aee9431679ceff5cdce336439c17eb6942205c51d1027b34
SHA51233b3cb287b8626339b620f329e642d68d1b788c1abf5e032dd60c253f8653f0650a053c21556808d87e463f19505eaa6c9f0530f1bf1c713d2942e9a1435787a
-
Filesize
175KB
MD524ef88f698bf8ae6e0586a10709abff6
SHA128fc5478faefec0c445a2a086cf0e99beb4c8c12
SHA25640b183fdff12c069aee9431679ceff5cdce336439c17eb6942205c51d1027b34
SHA51233b3cb287b8626339b620f329e642d68d1b788c1abf5e032dd60c253f8653f0650a053c21556808d87e463f19505eaa6c9f0530f1bf1c713d2942e9a1435787a
-
Filesize
136KB
MD58aa7af2e2975a892a81027decf1d848d
SHA14198f19a1da477555fec0e74cd335082a4fea5fd
SHA2561fc31180d9a9c18f4f37247b018595f15c879a52699ca9cde02d266ea56e02b3
SHA51252cf6cc6d5e0e3f2191b82d9fac9ae8ea1a9ccd5b6531c739cbf6a7eca3dbb8ae7a86a73cb4aac6f154fd673779e2489833f3064c07baacd0b4b72c65600272b
-
Filesize
136KB
MD58aa7af2e2975a892a81027decf1d848d
SHA14198f19a1da477555fec0e74cd335082a4fea5fd
SHA2561fc31180d9a9c18f4f37247b018595f15c879a52699ca9cde02d266ea56e02b3
SHA51252cf6cc6d5e0e3f2191b82d9fac9ae8ea1a9ccd5b6531c739cbf6a7eca3dbb8ae7a86a73cb4aac6f154fd673779e2489833f3064c07baacd0b4b72c65600272b
-
Filesize
206KB
MD52665f1e056f876d8dd52d8b7e8063a4c
SHA14982bbb010064a47271b3c3dcdfe67ce7fe99adb
SHA2569176f818f02e1410b24cbf5117fde0f240f5c06d205d4296d3dbfe40170a2cb0
SHA512057b3685ff929de33b9e5e2a358cdf90cfce07b454c0dfba6344d3abab6903f99ea3a63bde6b69eda8f5b39072f5d3654a0fda6b78bae0aea7b02c16506d3523
-
Filesize
206KB
MD52665f1e056f876d8dd52d8b7e8063a4c
SHA14982bbb010064a47271b3c3dcdfe67ce7fe99adb
SHA2569176f818f02e1410b24cbf5117fde0f240f5c06d205d4296d3dbfe40170a2cb0
SHA512057b3685ff929de33b9e5e2a358cdf90cfce07b454c0dfba6344d3abab6903f99ea3a63bde6b69eda8f5b39072f5d3654a0fda6b78bae0aea7b02c16506d3523
-
Filesize
206KB
MD52665f1e056f876d8dd52d8b7e8063a4c
SHA14982bbb010064a47271b3c3dcdfe67ce7fe99adb
SHA2569176f818f02e1410b24cbf5117fde0f240f5c06d205d4296d3dbfe40170a2cb0
SHA512057b3685ff929de33b9e5e2a358cdf90cfce07b454c0dfba6344d3abab6903f99ea3a63bde6b69eda8f5b39072f5d3654a0fda6b78bae0aea7b02c16506d3523
-
Filesize
206KB
MD52665f1e056f876d8dd52d8b7e8063a4c
SHA14982bbb010064a47271b3c3dcdfe67ce7fe99adb
SHA2569176f818f02e1410b24cbf5117fde0f240f5c06d205d4296d3dbfe40170a2cb0
SHA512057b3685ff929de33b9e5e2a358cdf90cfce07b454c0dfba6344d3abab6903f99ea3a63bde6b69eda8f5b39072f5d3654a0fda6b78bae0aea7b02c16506d3523
-
Filesize
206KB
MD52665f1e056f876d8dd52d8b7e8063a4c
SHA14982bbb010064a47271b3c3dcdfe67ce7fe99adb
SHA2569176f818f02e1410b24cbf5117fde0f240f5c06d205d4296d3dbfe40170a2cb0
SHA512057b3685ff929de33b9e5e2a358cdf90cfce07b454c0dfba6344d3abab6903f99ea3a63bde6b69eda8f5b39072f5d3654a0fda6b78bae0aea7b02c16506d3523
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5