Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10/08/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
0nly1_RAT_1.92.rar
Resource
win10-20240404-en
6 signatures
150 seconds
General
-
Target
0nly1_RAT_1.92.rar
-
Size
2.1MB
-
MD5
fdb624c29b401d71a3b72cfa60609a71
-
SHA1
12c5936e2941b3d43354eed3c55aab0720f9b45b
-
SHA256
eefe62cd097e55d6afc500e3f0799a7e2b482edef3eeede2223b7cb1f84d7103
-
SHA512
a3c0bbeb2d4ba5080ae4fd950dea558a89cec983fa205f8bee14a33eabdb1e5912d51a0790165a613468be8142231dd250bef43856a1f43a8419217671d0a82d
-
SSDEEP
49152:zFENTlhG8yYMrGNKsXXiP0Hh7cC2vhm/CrfBn1qu54/W:zihUr0KsXycBivwaz91FyW
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5072 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1400 OpenWith.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1400 wrote to memory of 5072 1400 OpenWith.exe 75 PID 1400 wrote to memory of 5072 1400 OpenWith.exe 75
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\0nly1_RAT_1.92.rar1⤵
- Modifies registry class
PID:5068
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\0nly1_RAT_1.92.rar2⤵
- Opens file in notepad (likely ransom note)
PID:5072
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2264