Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
86s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
10/03/2024, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
o_0/cheeto.exe
Resource
win10-20240221-en
Errors
General
-
Target
o_0/cheeto.exe
-
Size
2.7MB
-
MD5
f6605997c91549e4186fb4d0034c66e4
-
SHA1
4d4fe16b3c8631031c705c80d533e7985746268e
-
SHA256
1f380cbfc19c54d243e0e970ddbbb0f448f26ac7c2eef81d1d3ede19cf41a9a6
-
SHA512
86aea69c8f65912922da5b9347d6031a666cb083bfc3935d92a16a007ba2598bd3516dd7658c73e230a1cf8ec2d995ba3cfdbbe1c4e25d62dd7a6cd83909663c
-
SSDEEP
49152:qjgoMlcWYfUFkMpWMONs8cWr2HQ/kLvPlbhVypjalf:kGlcNfekMpWM4c+2Hok7VypWlf
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4576 qcoffpfilryw.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe cheeto.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2288 set thread context of 4488 2288 cheeto.exe 94 -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4308 sc.exe 2476 sc.exe 4212 sc.exe 3756 sc.exe 2888 sc.exe 4768 sc.exe 3040 sc.exe 3116 sc.exe 4304 sc.exe -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2288 cheeto.exe 1644 powershell.exe 1644 powershell.exe 1644 powershell.exe 2288 cheeto.exe 2288 cheeto.exe 2288 cheeto.exe 2288 cheeto.exe 2288 cheeto.exe 2288 cheeto.exe 2288 cheeto.exe 2288 cheeto.exe 2288 cheeto.exe 4488 dialer.exe 4488 dialer.exe 4488 dialer.exe 4488 dialer.exe 2288 cheeto.exe 2288 cheeto.exe 4576 qcoffpfilryw.exe 4484 powershell.exe 4484 powershell.exe 4484 powershell.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 3628 Process not Found 5080 Process not Found 4364 Process not Found 312 Process not Found 1048 Process not Found 1612 Process not Found 2760 Process not Found 4844 Process not Found 908 Process not Found 4176 Process not Found 700 Process not Found 2272 Process not Found 2192 Process not Found 5044 Process not Found 4288 Process not Found 212 Process not Found 4124 Process not Found 3336 Process not Found 4300 Process not Found 3288 Process not Found 5032 Process not Found 4320 Process not Found 2160 Process not Found 3852 Process not Found 2200 Process not Found 5116 Process not Found 4232 Process not Found 4556 Process not Found 3156 Process not Found 2028 Process not Found 3324 Process not Found 1456 Process not Found 924 Process not Found 4548 Process not Found 1244 Process not Found 4064 Process not Found 3380 Process not Found 4316 Process not Found 3652 Process not Found 4052 Process not Found 4764 Process not Found 1260 Process not Found 2276 Process not Found 3812 Process not Found 656 Process not Found 1392 Process not Found 588 Process not Found 4720 Process not Found 3140 Process not Found 2924 Process not Found 672 Process not Found 984 Process not Found 400 Process not Found 8 Process not Found 5040 Process not Found 980 Process not Found 3780 Process not Found 4172 Process not Found 4244 Process not Found 5064 Process not Found 1004 Process not Found 1184 Process not Found 1180 Process not Found 1240 Process not Found -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 1644 powershell.exe Token: SeIncreaseQuotaPrivilege 1644 powershell.exe Token: SeSecurityPrivilege 1644 powershell.exe Token: SeTakeOwnershipPrivilege 1644 powershell.exe Token: SeLoadDriverPrivilege 1644 powershell.exe Token: SeSystemProfilePrivilege 1644 powershell.exe Token: SeSystemtimePrivilege 1644 powershell.exe Token: SeProfSingleProcessPrivilege 1644 powershell.exe Token: SeIncBasePriorityPrivilege 1644 powershell.exe Token: SeCreatePagefilePrivilege 1644 powershell.exe Token: SeBackupPrivilege 1644 powershell.exe Token: SeRestorePrivilege 1644 powershell.exe Token: SeShutdownPrivilege 1644 powershell.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeSystemEnvironmentPrivilege 1644 powershell.exe Token: SeRemoteShutdownPrivilege 1644 powershell.exe Token: SeUndockPrivilege 1644 powershell.exe Token: SeManageVolumePrivilege 1644 powershell.exe Token: 33 1644 powershell.exe Token: 34 1644 powershell.exe Token: 35 1644 powershell.exe Token: 36 1644 powershell.exe Token: SeDebugPrivilege 2288 cheeto.exe Token: SeDebugPrivilege 4488 dialer.exe Token: SeAssignPrimaryTokenPrivilege 4484 powershell.exe Token: SeIncreaseQuotaPrivilege 4484 powershell.exe Token: SeSecurityPrivilege 4484 powershell.exe Token: SeTakeOwnershipPrivilege 4484 powershell.exe Token: SeLoadDriverPrivilege 4484 powershell.exe Token: SeSystemtimePrivilege 4484 powershell.exe Token: SeBackupPrivilege 4484 powershell.exe Token: SeRestorePrivilege 4484 powershell.exe Token: SeShutdownPrivilege 4484 powershell.exe Token: SeSystemEnvironmentPrivilege 4484 powershell.exe Token: SeUndockPrivilege 4484 powershell.exe Token: SeManageVolumePrivilege 4484 powershell.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 3628 wrote to memory of 796 3628 cmd.exe 87 PID 3628 wrote to memory of 796 3628 cmd.exe 87 PID 2288 wrote to memory of 4488 2288 cheeto.exe 94 PID 2288 wrote to memory of 4488 2288 cheeto.exe 94 PID 2288 wrote to memory of 4488 2288 cheeto.exe 94 PID 2288 wrote to memory of 4488 2288 cheeto.exe 94 PID 2288 wrote to memory of 4488 2288 cheeto.exe 94 PID 2288 wrote to memory of 4488 2288 cheeto.exe 94 PID 2288 wrote to memory of 4488 2288 cheeto.exe 94 PID 4488 wrote to memory of 584 4488 dialer.exe 5 PID 4488 wrote to memory of 636 4488 dialer.exe 7 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 4488 wrote to memory of 732 4488 dialer.exe 10 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 4488 wrote to memory of 900 4488 dialer.exe 13 PID 4488 wrote to memory of 1000 4488 dialer.exe 14 PID 4488 wrote to memory of 352 4488 dialer.exe 15 PID 4488 wrote to memory of 396 4488 dialer.exe 16 PID 4488 wrote to memory of 1032 4488 dialer.exe 17 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 4488 wrote to memory of 1040 4488 dialer.exe 18 PID 4488 wrote to memory of 1092 4488 dialer.exe 20 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 4488 wrote to memory of 1160 4488 dialer.exe 21 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 4488 wrote to memory of 1232 4488 dialer.exe 22 PID 4488 wrote to memory of 1300 4488 dialer.exe 23 PID 4488 wrote to memory of 1308 4488 dialer.exe 24 PID 636 wrote to memory of 2700 636 lsass.exe 46 PID 4488 wrote to memory of 1324 4488 dialer.exe 25 PID 4488 wrote to memory of 1376 4488 dialer.exe 26 PID 1376 wrote to memory of 3040 1376 svchost.exe 111 PID 1376 wrote to memory of 3040 1376 svchost.exe 111 PID 1376 wrote to memory of 3112 1376 svchost.exe 112 PID 1376 wrote to memory of 3112 1376 svchost.exe 112
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:584
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1000
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:636
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵PID:732
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵PID:900
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵PID:352
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:396
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵PID:1032
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵PID:1040
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵PID:1092
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵PID:1160
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1232
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵PID:1300
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1308
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵PID:1324
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:3040
-
-
\??\c:\windows\system32\sihost.exesihost.exe2⤵PID:3112
-
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\o_0\cheeto.exe"C:\Users\Admin\AppData\Local\Temp\o_0\cheeto.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:796
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4212
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:3040
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:3116
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:3756
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:2888
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "SGRRXHHC"2⤵
- Launches sc.exe
PID:4768
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "SGRRXHHC" binpath= "C:\ProgramData\yqrsoeqdzhrx\qcoffpfilryw.exe" start= "auto"2⤵
- Launches sc.exe
PID:4308
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:4304
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "SGRRXHHC"2⤵
- Launches sc.exe
PID:2476
-
-
C:\ProgramData\yqrsoeqdzhrx\qcoffpfilryw.exeC:\ProgramData\yqrsoeqdzhrx\qcoffpfilryw.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4576 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD5c8a3eef88c0e87960e76bbf75e801aff
SHA1cb2a1e993630af287f8237c0dd50eed19559b803
SHA25667598581ddac13421a51da61c0fc8060cb7e0eabfa8416f5f6dc507d84df5a6b
SHA512ae2225a2094f75d112a9c87ae729fe4658de538ae9fa00f5df362a70e39834ec07886bfdfcfb8f3ea71fc219b6d8846cefb80c9da77cb128fbe6013a0f3930ed
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
181KB
MD5846a4b7757ac4170df46c1bdd4c41893
SHA1a67001334e9d7d27a0ba68818a63a9ad0878abc4
SHA256e39bac6d67e8f61d7b732a4f5ea58c778a48e5a9b31cfbf286d232633611b85f
SHA512e937bd87662a3cdbab5980193c393d48687b390d9a9ef0ed8ace8dfad1ef35760f85e6a064fdf7a0b65ea550b22b1fdce504989e1f04eb1c15c676edd2f5be00