Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe
Resource
win10v2004-20221111-en
General
-
Target
e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe
-
Size
232KB
-
MD5
2552f83dae1f44361948fb1d67585eab
-
SHA1
c773cded8fd60ed04dd2d5ed5a4ea415d9d9e115
-
SHA256
e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8
-
SHA512
c6a24a15614eb50c6430bba64317aa50a3a9bd503fdb77c1f6f53d663cfd6a2769a563a61bc86489876980d922969be66bcd16b1c54c9d55a3fdbec023845376
-
SSDEEP
3072:XN1ZfWRrIMNRlZ62Pal2LBJXmzOHm5WZ3K+MCixqiD8RUy3eL2mDH7z/5L5Jsr6N:XNPepp3PJXCOGY3efxq5OyW9L5Jsr6U
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wfpib.exe -
Executes dropped EXE 1 IoCs
pid Process 1612 wfpib.exe -
Loads dropped DLL 2 IoCs
pid Process 956 e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe 956 e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /r" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /c" wfpib.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /a" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /n" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /z" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /g" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /x" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /f" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /i" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /m" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /t" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /k" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /w" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /e" wfpib.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /h" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /u" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /l" e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /s" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /q" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /b" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /l" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /o" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /y" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /j" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /d" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /v" wfpib.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfpib = "C:\\Users\\Admin\\wfpib.exe /p" wfpib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 956 e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe 1612 wfpib.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 956 e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe 1612 wfpib.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 956 wrote to memory of 1612 956 e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe 27 PID 956 wrote to memory of 1612 956 e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe 27 PID 956 wrote to memory of 1612 956 e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe 27 PID 956 wrote to memory of 1612 956 e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe"C:\Users\Admin\AppData\Local\Temp\e3de9b2362c8a7cbf34ec09ad682ea54c3f0e7982e0535ffcb09c20d63e1a3d8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\wfpib.exe"C:\Users\Admin\wfpib.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5678baad98fb7c89194f934dc48b5f989
SHA1a73c31154b00c3cb32e56d249b6fc288e7c7eb87
SHA256dfabc9af824614bf4e7d5b21271da285a8606d2ecb8c27c2cf1c3f424840685c
SHA5127ec5ee214b7a4983375c14de1462b6174e9c6812f40bcad6ac644f324e97bd3e53de1c5d9895d1ccc8a59fda4b332b48f4b2ac62a411b2c98b8a459f076303d6
-
Filesize
232KB
MD5678baad98fb7c89194f934dc48b5f989
SHA1a73c31154b00c3cb32e56d249b6fc288e7c7eb87
SHA256dfabc9af824614bf4e7d5b21271da285a8606d2ecb8c27c2cf1c3f424840685c
SHA5127ec5ee214b7a4983375c14de1462b6174e9c6812f40bcad6ac644f324e97bd3e53de1c5d9895d1ccc8a59fda4b332b48f4b2ac62a411b2c98b8a459f076303d6
-
Filesize
232KB
MD5678baad98fb7c89194f934dc48b5f989
SHA1a73c31154b00c3cb32e56d249b6fc288e7c7eb87
SHA256dfabc9af824614bf4e7d5b21271da285a8606d2ecb8c27c2cf1c3f424840685c
SHA5127ec5ee214b7a4983375c14de1462b6174e9c6812f40bcad6ac644f324e97bd3e53de1c5d9895d1ccc8a59fda4b332b48f4b2ac62a411b2c98b8a459f076303d6
-
Filesize
232KB
MD5678baad98fb7c89194f934dc48b5f989
SHA1a73c31154b00c3cb32e56d249b6fc288e7c7eb87
SHA256dfabc9af824614bf4e7d5b21271da285a8606d2ecb8c27c2cf1c3f424840685c
SHA5127ec5ee214b7a4983375c14de1462b6174e9c6812f40bcad6ac644f324e97bd3e53de1c5d9895d1ccc8a59fda4b332b48f4b2ac62a411b2c98b8a459f076303d6