Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 15:38

General

  • Target

    039a63863f47b6b986cc3b914acd72cac7426c5d89d0cbf89c9b0b0395523366.exe

  • Size

    104KB

  • MD5

    4bcc44240850f05632074900a95446c0

  • SHA1

    bb6fe39f1f2265fb011637758d72e1b97da6779c

  • SHA256

    039a63863f47b6b986cc3b914acd72cac7426c5d89d0cbf89c9b0b0395523366

  • SHA512

    896bed3b0f551f14eed5290d0062e03eb6803c3dd4101404146cf337503f7e87ebf162db2508ea4bb8e77ab4ac184176bcc31dc5f9236dd1c9b3b77154838f10

  • SSDEEP

    1536:bVhvr9fKtSieh6hC3KwTHlyHcw1rqVjSxakAyBGGcJ5J9r:RhTlG/ehWwTHlyHBQNSxWJ9r

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\039a63863f47b6b986cc3b914acd72cac7426c5d89d0cbf89c9b0b0395523366.exe
    "C:\Users\Admin\AppData\Local\Temp\039a63863f47b6b986cc3b914acd72cac7426c5d89d0cbf89c9b0b0395523366.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Users\Admin\wuein.exe
      "C:\Users\Admin\wuein.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wuein.exe

    Filesize

    104KB

    MD5

    d7587925a73ef5b36e26fc4f49d07270

    SHA1

    b878234729beb492fecfef4e4696877cafe32761

    SHA256

    e9ff1f842e7079b354a9b1448377f81791d8647ada89ef93348b77e8d8c7e8b6

    SHA512

    5698d430d1df5737f33fa3b07b257c9b6ce00d5c9379f986f3c663625a0f69e85d0249301a28a4eb5ea9fd009add30dfd5474b8a16bfda1ce33ac9efde59a324

  • C:\Users\Admin\wuein.exe

    Filesize

    104KB

    MD5

    d7587925a73ef5b36e26fc4f49d07270

    SHA1

    b878234729beb492fecfef4e4696877cafe32761

    SHA256

    e9ff1f842e7079b354a9b1448377f81791d8647ada89ef93348b77e8d8c7e8b6

    SHA512

    5698d430d1df5737f33fa3b07b257c9b6ce00d5c9379f986f3c663625a0f69e85d0249301a28a4eb5ea9fd009add30dfd5474b8a16bfda1ce33ac9efde59a324

  • \Users\Admin\wuein.exe

    Filesize

    104KB

    MD5

    d7587925a73ef5b36e26fc4f49d07270

    SHA1

    b878234729beb492fecfef4e4696877cafe32761

    SHA256

    e9ff1f842e7079b354a9b1448377f81791d8647ada89ef93348b77e8d8c7e8b6

    SHA512

    5698d430d1df5737f33fa3b07b257c9b6ce00d5c9379f986f3c663625a0f69e85d0249301a28a4eb5ea9fd009add30dfd5474b8a16bfda1ce33ac9efde59a324

  • \Users\Admin\wuein.exe

    Filesize

    104KB

    MD5

    d7587925a73ef5b36e26fc4f49d07270

    SHA1

    b878234729beb492fecfef4e4696877cafe32761

    SHA256

    e9ff1f842e7079b354a9b1448377f81791d8647ada89ef93348b77e8d8c7e8b6

    SHA512

    5698d430d1df5737f33fa3b07b257c9b6ce00d5c9379f986f3c663625a0f69e85d0249301a28a4eb5ea9fd009add30dfd5474b8a16bfda1ce33ac9efde59a324

  • memory/832-54-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB