Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/03/2024, 16:48

240310-vbf5fagg3w 8

10/03/2024, 16:47

240310-vanswsge23 10

Analysis

  • max time kernel
    96s
  • max time network
    86s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/03/2024, 16:48

Errors

Reason
Machine shutdown

General

  • Target

    o_0/cheeto.exe

  • Size

    2.7MB

  • MD5

    f6605997c91549e4186fb4d0034c66e4

  • SHA1

    4d4fe16b3c8631031c705c80d533e7985746268e

  • SHA256

    1f380cbfc19c54d243e0e970ddbbb0f448f26ac7c2eef81d1d3ede19cf41a9a6

  • SHA512

    86aea69c8f65912922da5b9347d6031a666cb083bfc3935d92a16a007ba2598bd3516dd7658c73e230a1cf8ec2d995ba3cfdbbe1c4e25d62dd7a6cd83909663c

  • SSDEEP

    49152:qjgoMlcWYfUFkMpWMONs8cWr2HQ/kLvPlbhVypjalf:kGlcNfekMpWM4c+2Hok7VypWlf

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 9 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:584
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1000
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:636
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay
        1⤵
          PID:732
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k dcomlaunch -s LSM
          1⤵
            PID:900
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts
            1⤵
              PID:352
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
              1⤵
                PID:396
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService
                1⤵
                  PID:1032
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog
                  1⤵
                    PID:1040
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                    1⤵
                      PID:1092
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k localservice -s nsi
                      1⤵
                        PID:1160
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                        1⤵
                          PID:1232
                        • c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k localservice -s EventSystem
                          1⤵
                            PID:1300
                          • c:\windows\system32\svchost.exe
                            c:\windows\system32\svchost.exe -k netsvcs -s Themes
                            1⤵
                              PID:1308
                            • c:\windows\system32\svchost.exe
                              c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp
                              1⤵
                                PID:1324
                              • c:\windows\system32\svchost.exe
                                c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                                1⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1376
                                • \??\c:\windows\system32\sihost.exe
                                  sihost.exe
                                  2⤵
                                    PID:3040
                                  • \??\c:\windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:3112
                                  • C:\Windows\sysmon.exe
                                    C:\Windows\sysmon.exe
                                    1⤵
                                      PID:2700
                                    • C:\Users\Admin\AppData\Local\Temp\o_0\cheeto.exe
                                      "C:\Users\Admin\AppData\Local\Temp\o_0\cheeto.exe"
                                      1⤵
                                      • Drops file in System32 directory
                                      • Suspicious use of SetThreadContext
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:2288
                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1644
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                        2⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:3628
                                        • C:\Windows\system32\wusa.exe
                                          wusa /uninstall /kb:890830 /quiet /norestart
                                          3⤵
                                            PID:796
                                        • C:\Windows\system32\sc.exe
                                          C:\Windows\system32\sc.exe stop UsoSvc
                                          2⤵
                                          • Launches sc.exe
                                          PID:4212
                                        • C:\Windows\system32\sc.exe
                                          C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                          2⤵
                                          • Launches sc.exe
                                          PID:3040
                                        • C:\Windows\system32\sc.exe
                                          C:\Windows\system32\sc.exe stop wuauserv
                                          2⤵
                                          • Launches sc.exe
                                          PID:3116
                                        • C:\Windows\system32\sc.exe
                                          C:\Windows\system32\sc.exe stop bits
                                          2⤵
                                          • Launches sc.exe
                                          PID:3756
                                        • C:\Windows\system32\sc.exe
                                          C:\Windows\system32\sc.exe stop dosvc
                                          2⤵
                                          • Launches sc.exe
                                          PID:2888
                                        • C:\Windows\system32\dialer.exe
                                          C:\Windows\system32\dialer.exe
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:4488
                                        • C:\Windows\system32\sc.exe
                                          C:\Windows\system32\sc.exe delete "SGRRXHHC"
                                          2⤵
                                          • Launches sc.exe
                                          PID:4768
                                        • C:\Windows\system32\sc.exe
                                          C:\Windows\system32\sc.exe create "SGRRXHHC" binpath= "C:\ProgramData\yqrsoeqdzhrx\qcoffpfilryw.exe" start= "auto"
                                          2⤵
                                          • Launches sc.exe
                                          PID:4308
                                        • C:\Windows\system32\sc.exe
                                          C:\Windows\system32\sc.exe stop eventlog
                                          2⤵
                                          • Launches sc.exe
                                          PID:4304
                                        • C:\Windows\system32\sc.exe
                                          C:\Windows\system32\sc.exe start "SGRRXHHC"
                                          2⤵
                                          • Launches sc.exe
                                          PID:2476
                                      • C:\ProgramData\yqrsoeqdzhrx\qcoffpfilryw.exe
                                        C:\ProgramData\yqrsoeqdzhrx\qcoffpfilryw.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4576
                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                          2⤵
                                          • Drops file in System32 directory
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4484

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\ProgramData\yqrsoeqdzhrx\qcoffpfilryw.exe

                                        Filesize

                                        1024KB

                                        MD5

                                        c8a3eef88c0e87960e76bbf75e801aff

                                        SHA1

                                        cb2a1e993630af287f8237c0dd50eed19559b803

                                        SHA256

                                        67598581ddac13421a51da61c0fc8060cb7e0eabfa8416f5f6dc507d84df5a6b

                                        SHA512

                                        ae2225a2094f75d112a9c87ae729fe4658de538ae9fa00f5df362a70e39834ec07886bfdfcfb8f3ea71fc219b6d8846cefb80c9da77cb128fbe6013a0f3930ed

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eohp4wg4.lsm.ps1

                                        Filesize

                                        1B

                                        MD5

                                        c4ca4238a0b923820dcc509a6f75849b

                                        SHA1

                                        356a192b7913b04c54574d18c28d46e6395428ab

                                        SHA256

                                        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                        SHA512

                                        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                      • C:\Windows\System32\catroot2\dberr.txt

                                        Filesize

                                        181KB

                                        MD5

                                        846a4b7757ac4170df46c1bdd4c41893

                                        SHA1

                                        a67001334e9d7d27a0ba68818a63a9ad0878abc4

                                        SHA256

                                        e39bac6d67e8f61d7b732a4f5ea58c778a48e5a9b31cfbf286d232633611b85f

                                        SHA512

                                        e937bd87662a3cdbab5980193c393d48687b390d9a9ef0ed8ace8dfad1ef35760f85e6a064fdf7a0b65ea550b22b1fdce504989e1f04eb1c15c676edd2f5be00

                                      • memory/352-159-0x000001E4C5650000-0x000001E4C567B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/352-87-0x000001E4C5650000-0x000001E4C567B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/352-91-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/396-90-0x000001B520CC0000-0x000001B520CEB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/396-440-0x000001B520CC0000-0x000001B520CEB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/396-93-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/584-118-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/584-63-0x000001E327DE0000-0x000001E327E04000-memory.dmp

                                        Filesize

                                        144KB

                                      • memory/584-70-0x00007FFE70325000-0x00007FFE70326000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/584-119-0x000001E327E10000-0x000001E327E3B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/584-64-0x000001E327E10000-0x000001E327E3B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/584-67-0x000001E327E10000-0x000001E327E3B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/636-73-0x00007FFE70325000-0x00007FFE70326000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/636-68-0x000002B487940000-0x000002B48796B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/636-72-0x000002B487940000-0x000002B48796B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/636-69-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/732-147-0x0000027065960000-0x000002706598B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/732-78-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/732-76-0x0000027065960000-0x000002706598B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/900-155-0x0000012A0A020000-0x0000012A0A04B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/900-84-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/900-86-0x0000012A0A020000-0x0000012A0A04B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/900-80-0x0000012A0A020000-0x0000012A0A04B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1000-79-0x000001D58E770000-0x000001D58E79B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1000-83-0x000001D58E770000-0x000001D58E79B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1032-98-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1032-512-0x0000019C19C90000-0x0000019C19CBB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1032-94-0x0000019C19C90000-0x0000019C19CBB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1040-105-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1040-99-0x000001A29EC90000-0x000001A29ECBB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1040-513-0x000001A29EC90000-0x000001A29ECBB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1040-108-0x000001A29EC90000-0x000001A29ECBB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1092-112-0x000001C9D48B0000-0x000001C9D48DB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1092-110-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1092-511-0x000001C9D48B0000-0x000001C9D48DB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1092-106-0x000001C9D48B0000-0x000001C9D48DB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1160-515-0x000002160B690000-0x000002160B6BB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1160-124-0x000002160B690000-0x000002160B6BB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1160-116-0x000002160B690000-0x000002160B6BB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1160-122-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1232-117-0x0000029F080F0000-0x0000029F0811B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1232-514-0x0000029F080F0000-0x0000029F0811B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1232-120-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1300-136-0x000001605C6D0000-0x000001605C6FB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1300-130-0x00007FFE30310000-0x00007FFE30320000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1300-517-0x000001605C6D0000-0x000001605C6FB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1300-125-0x000001605C6D0000-0x000001605C6FB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1308-129-0x000001F099B90000-0x000001F099BBB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1308-516-0x000001F099B90000-0x000001F099BBB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1324-518-0x000001A2C3CB0000-0x000001A2C3CDB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1324-142-0x000001A2C3CB0000-0x000001A2C3CDB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1376-151-0x0000023E07E80000-0x0000023E07EAB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1644-7-0x0000021739FB0000-0x0000021739FC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1644-46-0x0000021739FB0000-0x0000021739FC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1644-5-0x00007FFE53790000-0x00007FFE5417C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/1644-50-0x00007FFE53790000-0x00007FFE5417C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/1644-23-0x0000021739FB0000-0x0000021739FC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1644-4-0x000002173A190000-0x000002173A1B2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/1644-10-0x000002173A340000-0x000002173A3B6000-memory.dmp

                                        Filesize

                                        472KB

                                      • memory/1644-6-0x0000021739FB0000-0x0000021739FC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4484-326-0x0000020199CA0000-0x0000020199D59000-memory.dmp

                                        Filesize

                                        740KB

                                      • memory/4484-510-0x00007FFE58850000-0x00007FFE5923C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/4484-157-0x0000020181260000-0x0000020181270000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4484-317-0x0000020199AA0000-0x0000020199ABC000-memory.dmp

                                        Filesize

                                        112KB

                                      • memory/4484-320-0x00007FF66C100000-0x00007FF66C110000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4484-161-0x0000020181260000-0x0000020181270000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4484-374-0x0000020199AC0000-0x0000020199ACA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/4484-154-0x00007FFE58850000-0x00007FFE5923C000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/4484-442-0x0000020181260000-0x0000020181270000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4488-60-0x0000000140000000-0x000000014002B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/4488-52-0x0000000140000000-0x000000014002B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/4488-51-0x0000000140000000-0x000000014002B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/4488-53-0x0000000140000000-0x000000014002B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/4488-54-0x0000000140000000-0x000000014002B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/4488-56-0x0000000140000000-0x000000014002B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/4488-100-0x00007FFE70280000-0x00007FFE7045B000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/4488-58-0x00007FFE70280000-0x00007FFE7045B000-memory.dmp

                                        Filesize

                                        1.9MB

                                      • memory/4488-59-0x00007FFE6FD80000-0x00007FFE6FE2E000-memory.dmp

                                        Filesize

                                        696KB