Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/05/2023, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
m4589881.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
m4589881.exe
Resource
win10v2004-20230220-en
General
-
Target
m4589881.exe
-
Size
211KB
-
MD5
2b17cbaf633234f8bbd588a0ad2e2763
-
SHA1
383b93a9f3dad345cae3817421c1c1c56d3ad87c
-
SHA256
b30bf19ac08a3b26742e2088523306224ef627ffef605ffc43a0566fdad066ea
-
SHA512
891c79719b2bd050b492616d3635ecdbfa460660fcb21447a36d07db1d620ddc7377d3f8356a62f400b711962a8b4356817450f8da00e6760abe8c8517ee2f30
-
SSDEEP
3072:mhMCsw9/w+A4cwP+5OzutpHKGruONM4QuZA+67bi83eILfbq5kmh:5Cswq+AXYu7HGOSuZAlAILjq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1948 oneetx.exe 1320 oneetx.exe -
Loads dropped DLL 5 IoCs
pid Process 1300 m4589881.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe 1248 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1488 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1300 m4589881.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1948 1300 m4589881.exe 28 PID 1300 wrote to memory of 1948 1300 m4589881.exe 28 PID 1300 wrote to memory of 1948 1300 m4589881.exe 28 PID 1300 wrote to memory of 1948 1300 m4589881.exe 28 PID 1948 wrote to memory of 1488 1948 oneetx.exe 29 PID 1948 wrote to memory of 1488 1948 oneetx.exe 29 PID 1948 wrote to memory of 1488 1948 oneetx.exe 29 PID 1948 wrote to memory of 1488 1948 oneetx.exe 29 PID 1948 wrote to memory of 860 1948 oneetx.exe 31 PID 1948 wrote to memory of 860 1948 oneetx.exe 31 PID 1948 wrote to memory of 860 1948 oneetx.exe 31 PID 1948 wrote to memory of 860 1948 oneetx.exe 31 PID 860 wrote to memory of 2028 860 cmd.exe 33 PID 860 wrote to memory of 2028 860 cmd.exe 33 PID 860 wrote to memory of 2028 860 cmd.exe 33 PID 860 wrote to memory of 2028 860 cmd.exe 33 PID 860 wrote to memory of 2032 860 cmd.exe 34 PID 860 wrote to memory of 2032 860 cmd.exe 34 PID 860 wrote to memory of 2032 860 cmd.exe 34 PID 860 wrote to memory of 2032 860 cmd.exe 34 PID 860 wrote to memory of 1744 860 cmd.exe 35 PID 860 wrote to memory of 1744 860 cmd.exe 35 PID 860 wrote to memory of 1744 860 cmd.exe 35 PID 860 wrote to memory of 1744 860 cmd.exe 35 PID 860 wrote to memory of 568 860 cmd.exe 36 PID 860 wrote to memory of 568 860 cmd.exe 36 PID 860 wrote to memory of 568 860 cmd.exe 36 PID 860 wrote to memory of 568 860 cmd.exe 36 PID 860 wrote to memory of 1152 860 cmd.exe 37 PID 860 wrote to memory of 1152 860 cmd.exe 37 PID 860 wrote to memory of 1152 860 cmd.exe 37 PID 860 wrote to memory of 1152 860 cmd.exe 37 PID 860 wrote to memory of 1852 860 cmd.exe 38 PID 860 wrote to memory of 1852 860 cmd.exe 38 PID 860 wrote to memory of 1852 860 cmd.exe 38 PID 860 wrote to memory of 1852 860 cmd.exe 38 PID 1680 wrote to memory of 1320 1680 taskeng.exe 42 PID 1680 wrote to memory of 1320 1680 taskeng.exe 42 PID 1680 wrote to memory of 1320 1680 taskeng.exe 42 PID 1680 wrote to memory of 1320 1680 taskeng.exe 42 PID 1948 wrote to memory of 1248 1948 oneetx.exe 43 PID 1948 wrote to memory of 1248 1948 oneetx.exe 43 PID 1948 wrote to memory of 1248 1948 oneetx.exe 43 PID 1948 wrote to memory of 1248 1948 oneetx.exe 43 PID 1948 wrote to memory of 1248 1948 oneetx.exe 43 PID 1948 wrote to memory of 1248 1948 oneetx.exe 43 PID 1948 wrote to memory of 1248 1948 oneetx.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\m4589881.exe"C:\Users\Admin\AppData\Local\Temp\m4589881.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F3⤵
- Creates scheduled task(s)
PID:1488
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"4⤵PID:2032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E4⤵PID:1744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:568
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"4⤵PID:1152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E4⤵PID:1852
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:1248
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {92DD4A63-CEB2-4DD8-9375-9951298BEA1E} S-1-5-21-2647223082-2067913677-935928954-1000:BPOQNXYB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:1320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD52b17cbaf633234f8bbd588a0ad2e2763
SHA1383b93a9f3dad345cae3817421c1c1c56d3ad87c
SHA256b30bf19ac08a3b26742e2088523306224ef627ffef605ffc43a0566fdad066ea
SHA512891c79719b2bd050b492616d3635ecdbfa460660fcb21447a36d07db1d620ddc7377d3f8356a62f400b711962a8b4356817450f8da00e6760abe8c8517ee2f30
-
Filesize
211KB
MD52b17cbaf633234f8bbd588a0ad2e2763
SHA1383b93a9f3dad345cae3817421c1c1c56d3ad87c
SHA256b30bf19ac08a3b26742e2088523306224ef627ffef605ffc43a0566fdad066ea
SHA512891c79719b2bd050b492616d3635ecdbfa460660fcb21447a36d07db1d620ddc7377d3f8356a62f400b711962a8b4356817450f8da00e6760abe8c8517ee2f30
-
Filesize
211KB
MD52b17cbaf633234f8bbd588a0ad2e2763
SHA1383b93a9f3dad345cae3817421c1c1c56d3ad87c
SHA256b30bf19ac08a3b26742e2088523306224ef627ffef605ffc43a0566fdad066ea
SHA512891c79719b2bd050b492616d3635ecdbfa460660fcb21447a36d07db1d620ddc7377d3f8356a62f400b711962a8b4356817450f8da00e6760abe8c8517ee2f30
-
Filesize
211KB
MD52b17cbaf633234f8bbd588a0ad2e2763
SHA1383b93a9f3dad345cae3817421c1c1c56d3ad87c
SHA256b30bf19ac08a3b26742e2088523306224ef627ffef605ffc43a0566fdad066ea
SHA512891c79719b2bd050b492616d3635ecdbfa460660fcb21447a36d07db1d620ddc7377d3f8356a62f400b711962a8b4356817450f8da00e6760abe8c8517ee2f30
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
211KB
MD52b17cbaf633234f8bbd588a0ad2e2763
SHA1383b93a9f3dad345cae3817421c1c1c56d3ad87c
SHA256b30bf19ac08a3b26742e2088523306224ef627ffef605ffc43a0566fdad066ea
SHA512891c79719b2bd050b492616d3635ecdbfa460660fcb21447a36d07db1d620ddc7377d3f8356a62f400b711962a8b4356817450f8da00e6760abe8c8517ee2f30
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53