Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 21:03
Static task
static1
General
-
Target
14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe
-
Size
479KB
-
MD5
76e49216d90ba4d73372e49290622655
-
SHA1
736ac86f3e7624d881f4c508775ffa2e2f411622
-
SHA256
14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650
-
SHA512
c109790e23c9652cdc77b2188970f88eab1f36136810ac601a5af742ad750b232f34ab4ff02b09967a416cad83f321cc988297c4b7a6f93ccd7290d67e0b8771
-
SSDEEP
12288:qMrKy90uC1kKtvvA1H4Eb0a3wgl6/eOWxng:MyQt3pEoaRlkec
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h0429342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h0429342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h0429342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h0429342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h0429342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h0429342.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation i8695130.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 5 IoCs
pid Process 1100 x9276471.exe 4824 g7450300.exe 2852 h0429342.exe 4112 i8695130.exe 4628 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h0429342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h0429342.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9276471.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9276471.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4824 g7450300.exe 4824 g7450300.exe 2852 h0429342.exe 2852 h0429342.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4824 g7450300.exe Token: SeDebugPrivilege 2852 h0429342.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4112 i8695130.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4044 wrote to memory of 1100 4044 14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe 86 PID 4044 wrote to memory of 1100 4044 14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe 86 PID 4044 wrote to memory of 1100 4044 14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe 86 PID 1100 wrote to memory of 4824 1100 x9276471.exe 87 PID 1100 wrote to memory of 4824 1100 x9276471.exe 87 PID 1100 wrote to memory of 4824 1100 x9276471.exe 87 PID 1100 wrote to memory of 2852 1100 x9276471.exe 96 PID 1100 wrote to memory of 2852 1100 x9276471.exe 96 PID 1100 wrote to memory of 2852 1100 x9276471.exe 96 PID 4044 wrote to memory of 4112 4044 14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe 97 PID 4044 wrote to memory of 4112 4044 14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe 97 PID 4044 wrote to memory of 4112 4044 14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe 97 PID 4112 wrote to memory of 4628 4112 i8695130.exe 100 PID 4112 wrote to memory of 4628 4112 i8695130.exe 100 PID 4112 wrote to memory of 4628 4112 i8695130.exe 100 PID 4628 wrote to memory of 3676 4628 oneetx.exe 101 PID 4628 wrote to memory of 3676 4628 oneetx.exe 101 PID 4628 wrote to memory of 3676 4628 oneetx.exe 101 PID 4628 wrote to memory of 1604 4628 oneetx.exe 103 PID 4628 wrote to memory of 1604 4628 oneetx.exe 103 PID 4628 wrote to memory of 1604 4628 oneetx.exe 103 PID 1604 wrote to memory of 2512 1604 cmd.exe 105 PID 1604 wrote to memory of 2512 1604 cmd.exe 105 PID 1604 wrote to memory of 2512 1604 cmd.exe 105 PID 1604 wrote to memory of 1484 1604 cmd.exe 106 PID 1604 wrote to memory of 1484 1604 cmd.exe 106 PID 1604 wrote to memory of 1484 1604 cmd.exe 106 PID 1604 wrote to memory of 2108 1604 cmd.exe 107 PID 1604 wrote to memory of 2108 1604 cmd.exe 107 PID 1604 wrote to memory of 2108 1604 cmd.exe 107 PID 1604 wrote to memory of 2468 1604 cmd.exe 108 PID 1604 wrote to memory of 2468 1604 cmd.exe 108 PID 1604 wrote to memory of 2468 1604 cmd.exe 108 PID 1604 wrote to memory of 3756 1604 cmd.exe 109 PID 1604 wrote to memory of 3756 1604 cmd.exe 109 PID 1604 wrote to memory of 3756 1604 cmd.exe 109 PID 1604 wrote to memory of 456 1604 cmd.exe 110 PID 1604 wrote to memory of 456 1604 cmd.exe 110 PID 1604 wrote to memory of 456 1604 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe"C:\Users\Admin\AppData\Local\Temp\14fee377c9a92fd05ebc6acc171df29ccd9d8be2d687e6e19c84981d0806b650.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9276471.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9276471.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7450300.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7450300.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0429342.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0429342.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8695130.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8695130.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:456
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5d8a60597147d116ef42a1bde13474e9f
SHA172fadf1185d7dda89236cf41ed5b52246c796f98
SHA2568ec75321652f076cbc7f4850c98c346afe2a64cda689423b0f9c9edc42148594
SHA5128e549d19740cb25ef4ae28545ecd5c46b7f85badaf4d8fc8b7718c2561896e62b64c6ec595dd9c46633e739342f0e56b0bc09cee4d65c21f3db7b9100d2a5933
-
Filesize
207KB
MD5d8a60597147d116ef42a1bde13474e9f
SHA172fadf1185d7dda89236cf41ed5b52246c796f98
SHA2568ec75321652f076cbc7f4850c98c346afe2a64cda689423b0f9c9edc42148594
SHA5128e549d19740cb25ef4ae28545ecd5c46b7f85badaf4d8fc8b7718c2561896e62b64c6ec595dd9c46633e739342f0e56b0bc09cee4d65c21f3db7b9100d2a5933
-
Filesize
308KB
MD5bf301f530d6521a39feb6d69410be5bd
SHA164cdc5371f1d4dc1314570092896765cdc2e5aa1
SHA256b68bcf5003cb4337b8a9beb5ea7ddef6c959215d8940ec06d6560dec6724eeb5
SHA51244644a0d768c99d8be35184cf1372cf8bc914824632d2cb610c1589aff765483b3d41355b27db469cdf676821bf042cacd186bf257c32ec7ba2387938c8e17ae
-
Filesize
308KB
MD5bf301f530d6521a39feb6d69410be5bd
SHA164cdc5371f1d4dc1314570092896765cdc2e5aa1
SHA256b68bcf5003cb4337b8a9beb5ea7ddef6c959215d8940ec06d6560dec6724eeb5
SHA51244644a0d768c99d8be35184cf1372cf8bc914824632d2cb610c1589aff765483b3d41355b27db469cdf676821bf042cacd186bf257c32ec7ba2387938c8e17ae
-
Filesize
136KB
MD555d976d275eaa33cff253ca9508a0ab6
SHA1a3e19c215079990a0df2087afe201099178e5a47
SHA2567e67bc108417e28ceee02c549a5e6f8a6ad23cd6ccd28d735e2305d8b138d6d4
SHA512fd8cd3e82ba08a4c76f86771b70a1f37b65bc53182055941fa8ea1455fd576021ce14ca47fce5c96d8db83d580133eed8c217fbab45637381a4b67dd178bb385
-
Filesize
136KB
MD555d976d275eaa33cff253ca9508a0ab6
SHA1a3e19c215079990a0df2087afe201099178e5a47
SHA2567e67bc108417e28ceee02c549a5e6f8a6ad23cd6ccd28d735e2305d8b138d6d4
SHA512fd8cd3e82ba08a4c76f86771b70a1f37b65bc53182055941fa8ea1455fd576021ce14ca47fce5c96d8db83d580133eed8c217fbab45637381a4b67dd178bb385
-
Filesize
175KB
MD5455df9ee4431ae2c07f47355a47b0570
SHA10a9a6a26daffc046a658a76a5962c99095d8884a
SHA2563cc8e7faf937c09cb2defaa001b5e56ad50ce708b5eef0c5aa4251c8c7f544e9
SHA5126a5584fcd2c5f29b72d903a45d4c005be1c3814462f3cc907bb4827ec0d1124fff62fe735ca98ed36a25b36c85ed253e0f4f10243199529e41c868f15a611f2a
-
Filesize
175KB
MD5455df9ee4431ae2c07f47355a47b0570
SHA10a9a6a26daffc046a658a76a5962c99095d8884a
SHA2563cc8e7faf937c09cb2defaa001b5e56ad50ce708b5eef0c5aa4251c8c7f544e9
SHA5126a5584fcd2c5f29b72d903a45d4c005be1c3814462f3cc907bb4827ec0d1124fff62fe735ca98ed36a25b36c85ed253e0f4f10243199529e41c868f15a611f2a
-
Filesize
207KB
MD5d8a60597147d116ef42a1bde13474e9f
SHA172fadf1185d7dda89236cf41ed5b52246c796f98
SHA2568ec75321652f076cbc7f4850c98c346afe2a64cda689423b0f9c9edc42148594
SHA5128e549d19740cb25ef4ae28545ecd5c46b7f85badaf4d8fc8b7718c2561896e62b64c6ec595dd9c46633e739342f0e56b0bc09cee4d65c21f3db7b9100d2a5933
-
Filesize
207KB
MD5d8a60597147d116ef42a1bde13474e9f
SHA172fadf1185d7dda89236cf41ed5b52246c796f98
SHA2568ec75321652f076cbc7f4850c98c346afe2a64cda689423b0f9c9edc42148594
SHA5128e549d19740cb25ef4ae28545ecd5c46b7f85badaf4d8fc8b7718c2561896e62b64c6ec595dd9c46633e739342f0e56b0bc09cee4d65c21f3db7b9100d2a5933
-
Filesize
207KB
MD5d8a60597147d116ef42a1bde13474e9f
SHA172fadf1185d7dda89236cf41ed5b52246c796f98
SHA2568ec75321652f076cbc7f4850c98c346afe2a64cda689423b0f9c9edc42148594
SHA5128e549d19740cb25ef4ae28545ecd5c46b7f85badaf4d8fc8b7718c2561896e62b64c6ec595dd9c46633e739342f0e56b0bc09cee4d65c21f3db7b9100d2a5933