Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
381s -
max time network
264s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
0xcheat.zip
Resource
win7-20230712-en
General
-
Target
0xcheat.zip
-
Size
8.8MB
-
MD5
f16d7af20042d713fabab2676fd28148
-
SHA1
60ad53e69d4310c926d8da2c8812dcff0609b5f8
-
SHA256
c50cbc77f3855f6d2cf5ce2ee5f3106866773a9717da99bd7a9da50418a08f10
-
SHA512
72f0446b3e1eed4a1f28b37937549a5f918134972a6ebf0f59ce090a7779507ae303924f88f127c27212901b8583c23e081fed0b60a87705e11ea48fe49f689f
-
SSDEEP
196608:V8E3v3ebPr3Iw6ocsaqYgRPOAeS+hs0P2SrtnMfI1V0XJaog:yE3vubbQnglO7S6/rVH2Xoog
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ egBmy6x.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion egBmy6x.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion egBmy6x.exe -
Executes dropped EXE 1 IoCs
pid Process 4812 egBmy6x.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA egBmy6x.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4812 egBmy6x.exe -
Launches sc.exe 24 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1980 sc.exe 3448 sc.exe 4716 sc.exe 2332 sc.exe 4408 sc.exe 4264 sc.exe 4152 sc.exe 4828 sc.exe 3728 sc.exe 848 sc.exe 5080 sc.exe 2728 sc.exe 1580 sc.exe 1612 sc.exe 4372 sc.exe 4384 sc.exe 504 sc.exe 2372 sc.exe 4968 sc.exe 1284 sc.exe 1576 sc.exe 2348 sc.exe 2752 sc.exe 1820 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1580 4812 WerFault.exe 107 -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\discord-345229890980937739\shell\open\command\ = "C:\\Users\\Admin\\Desktop\\egBmy6x.exe" egBmy6x.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\discord-345229890980937739\ = "URL:Run game 345229890980937739 protocol" egBmy6x.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\discord-345229890980937739\URL Protocol egBmy6x.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\discord-345229890980937739\DefaultIcon\ = "C:\\Users\\Admin\\Desktop\\egBmy6x.exe" egBmy6x.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\discord-345229890980937739\shell egBmy6x.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\discord-345229890980937739 egBmy6x.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\discord-345229890980937739\DefaultIcon egBmy6x.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\discord-345229890980937739\shell\open\command egBmy6x.exe Key created \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000_Classes\discord-345229890980937739\shell\open egBmy6x.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe 4812 egBmy6x.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4700 7zG.exe Token: 35 4700 7zG.exe Token: SeSecurityPrivilege 4700 7zG.exe Token: SeSecurityPrivilege 4700 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4700 7zG.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 4100 4812 egBmy6x.exe 110 PID 4812 wrote to memory of 4100 4812 egBmy6x.exe 110 PID 4812 wrote to memory of 4100 4812 egBmy6x.exe 110 PID 4100 wrote to memory of 2728 4100 cmd.exe 111 PID 4100 wrote to memory of 2728 4100 cmd.exe 111 PID 4100 wrote to memory of 2728 4100 cmd.exe 111 PID 4812 wrote to memory of 2564 4812 egBmy6x.exe 112 PID 4812 wrote to memory of 2564 4812 egBmy6x.exe 112 PID 4812 wrote to memory of 2564 4812 egBmy6x.exe 112 PID 2564 wrote to memory of 1284 2564 cmd.exe 113 PID 2564 wrote to memory of 1284 2564 cmd.exe 113 PID 2564 wrote to memory of 1284 2564 cmd.exe 113 PID 4812 wrote to memory of 4576 4812 egBmy6x.exe 114 PID 4812 wrote to memory of 4576 4812 egBmy6x.exe 114 PID 4812 wrote to memory of 4576 4812 egBmy6x.exe 114 PID 4576 wrote to memory of 1580 4576 cmd.exe 115 PID 4576 wrote to memory of 1580 4576 cmd.exe 115 PID 4576 wrote to memory of 1580 4576 cmd.exe 115 PID 4812 wrote to memory of 1772 4812 egBmy6x.exe 116 PID 4812 wrote to memory of 1772 4812 egBmy6x.exe 116 PID 4812 wrote to memory of 1772 4812 egBmy6x.exe 116 PID 1772 wrote to memory of 504 1772 cmd.exe 117 PID 1772 wrote to memory of 504 1772 cmd.exe 117 PID 1772 wrote to memory of 504 1772 cmd.exe 117 PID 504 wrote to memory of 2520 504 net.exe 118 PID 504 wrote to memory of 2520 504 net.exe 118 PID 504 wrote to memory of 2520 504 net.exe 118 PID 4812 wrote to memory of 3916 4812 egBmy6x.exe 119 PID 4812 wrote to memory of 3916 4812 egBmy6x.exe 119 PID 4812 wrote to memory of 3916 4812 egBmy6x.exe 119 PID 4812 wrote to memory of 2704 4812 egBmy6x.exe 120 PID 4812 wrote to memory of 2704 4812 egBmy6x.exe 120 PID 4812 wrote to memory of 2704 4812 egBmy6x.exe 120 PID 2704 wrote to memory of 1720 2704 cmd.exe 121 PID 2704 wrote to memory of 1720 2704 cmd.exe 121 PID 2704 wrote to memory of 1720 2704 cmd.exe 121 PID 1720 wrote to memory of 2004 1720 w32tm.exe 122 PID 1720 wrote to memory of 2004 1720 w32tm.exe 122 PID 4812 wrote to memory of 4028 4812 egBmy6x.exe 123 PID 4812 wrote to memory of 4028 4812 egBmy6x.exe 123 PID 4812 wrote to memory of 4028 4812 egBmy6x.exe 123 PID 4028 wrote to memory of 1612 4028 cmd.exe 124 PID 4028 wrote to memory of 1612 4028 cmd.exe 124 PID 4028 wrote to memory of 1612 4028 cmd.exe 124 PID 4812 wrote to memory of 3584 4812 egBmy6x.exe 125 PID 4812 wrote to memory of 3584 4812 egBmy6x.exe 125 PID 4812 wrote to memory of 3584 4812 egBmy6x.exe 125 PID 3584 wrote to memory of 1576 3584 cmd.exe 126 PID 3584 wrote to memory of 1576 3584 cmd.exe 126 PID 3584 wrote to memory of 1576 3584 cmd.exe 126 PID 4812 wrote to memory of 3380 4812 egBmy6x.exe 127 PID 4812 wrote to memory of 3380 4812 egBmy6x.exe 127 PID 4812 wrote to memory of 3380 4812 egBmy6x.exe 127 PID 3380 wrote to memory of 4264 3380 cmd.exe 128 PID 3380 wrote to memory of 4264 3380 cmd.exe 128 PID 3380 wrote to memory of 4264 3380 cmd.exe 128 PID 4812 wrote to memory of 4232 4812 egBmy6x.exe 129 PID 4812 wrote to memory of 4232 4812 egBmy6x.exe 129 PID 4812 wrote to memory of 4232 4812 egBmy6x.exe 129 PID 4232 wrote to memory of 4372 4232 cmd.exe 130 PID 4232 wrote to memory of 4372 4232 cmd.exe 130 PID 4232 wrote to memory of 4372 4232 cmd.exe 130 PID 4812 wrote to memory of 5016 4812 egBmy6x.exe 131 PID 4812 wrote to memory of 5016 4812 egBmy6x.exe 131
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\0xcheat.zip1⤵PID:2276
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2308
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap7153:72:7zEvent139941⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4700
-
C:\Users\Admin\Desktop\egBmy6x.exe"C:\Users\Admin\Desktop\egBmy6x.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:1284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:1580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:2520
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\w32tm.exew32tm /resync3⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\w32tm.exew32tm /resync4⤵PID:2004
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:4264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:4372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:5016
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:2256
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:4152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:3632
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:4388
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:3448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:2540
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:4808
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:3728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:8
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:4716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:4712
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:3644
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:2332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:4520
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:232
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:4420
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:4644
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:2728
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:4828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:420
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:224
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:4968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 6122⤵
- Program crash
PID:1580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop FairPlayKD >nul 2>nul2⤵PID:2808
-
C:\Windows\SysWOW64\sc.exesc stop FairPlayKD3⤵
- Launches sc.exe
PID:504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4812 -ip 48121⤵PID:2460
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD54fb2a75bcab6ce266f67448a25215328
SHA14c24bd82c05068cc642268f1de0d9fd254f61b20
SHA256efa1c3ade97e4d1780874b4892a09515c0b2f69e0d5f59c2336e38b26d3581e9
SHA5124269b9219581a35678df26c3ec6048d1c5d9fc0e11fb6770280e893fd05ce844f3763a46f90b813725ac9e06726578efc8f3079b9615a2e48154401279705cb1
-
Filesize
8.8MB
MD5f20abe6c5e6f555338c9fd8e1a7fd9df
SHA1af13d38aed6a3551edf48f719bd8ee8c7d04f800
SHA256a61a72cc1c925d6876c7481b0daaa80f77ab06176526e9fc37fc8a5fe5397120
SHA5129972fc3ae1356d6c00ca8f21a4d9a42d15042468732b6a6b5647821a5629d1fbaf0304c2f21b41066f0f23d15a5b0ff52e4b548c695dfb9f55456f643f2cc8dc
-
Filesize
8.8MB
MD5f20abe6c5e6f555338c9fd8e1a7fd9df
SHA1af13d38aed6a3551edf48f719bd8ee8c7d04f800
SHA256a61a72cc1c925d6876c7481b0daaa80f77ab06176526e9fc37fc8a5fe5397120
SHA5129972fc3ae1356d6c00ca8f21a4d9a42d15042468732b6a6b5647821a5629d1fbaf0304c2f21b41066f0f23d15a5b0ff52e4b548c695dfb9f55456f643f2cc8dc