Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe
Resource
win10v2004-20220812-en
General
-
Target
cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe
-
Size
259KB
-
MD5
dc5960e94932cddb25a0118729234ec4
-
SHA1
2615246d4d3832e0a1ad2bd8825300ae8153a14f
-
SHA256
cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888
-
SHA512
604cda59a9758e8a35814bb6100f6be4f51d645e83ec9e269c8c29233de0cf90ea22f5eb2245bc8918a4506c47e32556ae2185456532d47abcf476115abeee33
-
SSDEEP
3072:ybfupze+Lo2RuB/1fYlQHqzx806EhafJtRXpWOvB66EMxZkbw8eFLZBbsUYVayOl:4Oe+RR+NFKzDheL8gxqbbeFT
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmplv64.exe = "C:\\Windows\\SysWOW64\\wmplv64.exe:*:Enabled:Windows Media Launch" wmplv64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmplv64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile wmplv64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications wmplv64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmplv64.exe = "C:\\Windows\\SysWOW64\\wmplv64.exe:*:Enabled:Windows Media Launch" wmplv64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmplv64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile wmplv64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications wmplv64.exe -
Executes dropped EXE 2 IoCs
pid Process 3136 wmplv64.exe 2168 wmplv64.exe -
Sets file execution options in registry 2 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\epplauncher.exe wmplv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avast.setup\Debugger = "CMD /C>null" wmplv64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe wmplv64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe wmplv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastSvc.exe\Debugger = "CMD /C>null" wmplv64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe wmplv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = "CMD /C>null" wmplv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\epplauncher.exe\Debugger = "CMD /C>null" wmplv64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastUI.exe wmplv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = "CMD /C>null" wmplv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "CMD /C>null" wmplv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastUI.exe\Debugger = "CMD /C>null" wmplv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "CMD /C>null" wmplv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "CMD /C>null" wmplv64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avast.setup wmplv64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastSvc.exe wmplv64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe wmplv64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe wmplv64.exe -
resource yara_rule behavioral2/memory/3328-133-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3328-136-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3328-137-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3328-138-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3328-139-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3328-149-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2168-151-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2168-152-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run wmplv64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Media Launch = "C:\\Windows\\SysWOW64\\wmplv64.exe" wmplv64.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmplv64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmplv64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe File opened for modification C:\Windows\SysWOW64\wmplv64.exe cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe File created C:\Windows\SysWOW64\wmplv64.exe cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe File opened for modification C:\Windows\SysWOW64\ wmplv64.exe File opened for modification C:\Windows\SysWOW64\wmplv64.exe wmplv64.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4764 set thread context of 3328 4764 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 79 PID 3136 set thread context of 2168 3136 wmplv64.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3328 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 3328 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 3328 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 3328 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 2168 wmplv64.exe 2168 wmplv64.exe 2168 wmplv64.exe 2168 wmplv64.exe 2168 wmplv64.exe 2168 wmplv64.exe 2168 wmplv64.exe 2168 wmplv64.exe 2168 wmplv64.exe 2168 wmplv64.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3328 4764 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 79 PID 4764 wrote to memory of 3328 4764 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 79 PID 4764 wrote to memory of 3328 4764 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 79 PID 4764 wrote to memory of 3328 4764 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 79 PID 4764 wrote to memory of 3328 4764 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 79 PID 4764 wrote to memory of 3328 4764 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 79 PID 4764 wrote to memory of 3328 4764 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 79 PID 4764 wrote to memory of 3328 4764 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 79 PID 3328 wrote to memory of 3136 3328 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 82 PID 3328 wrote to memory of 3136 3328 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 82 PID 3328 wrote to memory of 3136 3328 cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe 82 PID 3136 wrote to memory of 2168 3136 wmplv64.exe 83 PID 3136 wrote to memory of 2168 3136 wmplv64.exe 83 PID 3136 wrote to memory of 2168 3136 wmplv64.exe 83 PID 3136 wrote to memory of 2168 3136 wmplv64.exe 83 PID 3136 wrote to memory of 2168 3136 wmplv64.exe 83 PID 3136 wrote to memory of 2168 3136 wmplv64.exe 83 PID 3136 wrote to memory of 2168 3136 wmplv64.exe 83 PID 3136 wrote to memory of 2168 3136 wmplv64.exe 83 PID 2168 wrote to memory of 2484 2168 wmplv64.exe 50 PID 2168 wrote to memory of 2484 2168 wmplv64.exe 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe"C:\Users\Admin\AppData\Local\Temp\cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe"C:\Users\Admin\AppData\Local\Temp\cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\wmplv64.exe"C:\Windows\SysWOW64\wmplv64.exe" C:\Users\Admin\AppData\Local\Temp\CAC7AA~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\wmplv64.exe"C:\Windows\SysWOW64\wmplv64.exe" C:\Users\Admin\AppData\Local\Temp\CAC7AA~1.EXE5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
259KB
MD5dc5960e94932cddb25a0118729234ec4
SHA12615246d4d3832e0a1ad2bd8825300ae8153a14f
SHA256cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888
SHA512604cda59a9758e8a35814bb6100f6be4f51d645e83ec9e269c8c29233de0cf90ea22f5eb2245bc8918a4506c47e32556ae2185456532d47abcf476115abeee33
-
Filesize
259KB
MD5dc5960e94932cddb25a0118729234ec4
SHA12615246d4d3832e0a1ad2bd8825300ae8153a14f
SHA256cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888
SHA512604cda59a9758e8a35814bb6100f6be4f51d645e83ec9e269c8c29233de0cf90ea22f5eb2245bc8918a4506c47e32556ae2185456532d47abcf476115abeee33
-
Filesize
259KB
MD5dc5960e94932cddb25a0118729234ec4
SHA12615246d4d3832e0a1ad2bd8825300ae8153a14f
SHA256cac7aabcf8785e719ec620c14653e427fe5f7ee500083b35a9675c6df71ec888
SHA512604cda59a9758e8a35814bb6100f6be4f51d645e83ec9e269c8c29233de0cf90ea22f5eb2245bc8918a4506c47e32556ae2185456532d47abcf476115abeee33