Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2022, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe
Resource
win7-20220715-en
7 signatures
150 seconds
General
-
Target
4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe
-
Size
496KB
-
MD5
1e47a80f9e077c1f08fc49d35883b5d9
-
SHA1
8b40a8b811ea2d18c6ac5caf6151b3f7ac8eeebd
-
SHA256
4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6
-
SHA512
442f9558e1bec6a817d5d4735aedde62d953877b40e49d1ed04df6a9792aaa57c10e1ca41be468f8dbf8f71b6393d82778a155053eb1a47253043e3f20db65fe
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 wfpbuild.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE wfpbuild.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies wfpbuild.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 wfpbuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wfpbuild.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wfpbuild.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wfpbuild.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4232 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 4232 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 4172 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 4172 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 4660 wfpbuild.exe 4660 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe 964 wfpbuild.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4172 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4172 4232 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 75 PID 4232 wrote to memory of 4172 4232 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 75 PID 4232 wrote to memory of 4172 4232 4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe 75 PID 4660 wrote to memory of 964 4660 wfpbuild.exe 77 PID 4660 wrote to memory of 964 4660 wfpbuild.exe 77 PID 4660 wrote to memory of 964 4660 wfpbuild.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe"C:\Users\Admin\AppData\Local\Temp\4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe"C:\Users\Admin\AppData\Local\Temp\4f4991b4f399f131961bd10d1a105cc8081c220777c52e13790707d9b6cefaa6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4172
-
-
C:\Windows\SysWOW64\wfpbuild.exe"C:\Windows\SysWOW64\wfpbuild.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\wfpbuild.exe"C:\Windows\SysWOW64\wfpbuild.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:964
-