Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2023, 07:16

General

  • Target

    cc231df7de4fc3f165eb4fa0b164750306a436ed.exe

  • Size

    551KB

  • MD5

    196b4c60853e8edb24430341e58e01ad

  • SHA1

    cc231df7de4fc3f165eb4fa0b164750306a436ed

  • SHA256

    783dbf002227109a372c999fb01e0a6a542ff273dcb8a10e9080ba8d7466a6e8

  • SHA512

    cef00627249e098c73a56639631462c8e079069553e26cb3b910f93c0509e4ed5514acb5fa3f8741625dc4bac053f5ad282b8924e6428b0e2b4cfd328fa19c42

  • SSDEEP

    12288:kYjCG72h8Hq19i4OK3Kfjrzzux2H4UzRE0qCWFpIa9mtbjqzIRCdcl:kYjdW8Hqri4kfjrexDCREGWqdRCCl

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\cc231df7de4fc3f165eb4fa0b164750306a436ed.exe
      "C:\Users\Admin\AppData\Local\Temp\cc231df7de4fc3f165eb4fa0b164750306a436ed.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Users\Admin\AppData\Local\Temp\wcfbei.exe
        "C:\Users\Admin\AppData\Local\Temp\wcfbei.exe" C:\Users\Admin\AppData\Local\Temp\rsrmv.qe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:684
        • C:\Users\Admin\AppData\Local\Temp\wcfbei.exe
          "C:\Users\Admin\AppData\Local\Temp\wcfbei.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:828
    • C:\Windows\SysWOW64\wuapp.exe
      "C:\Windows\SysWOW64\wuapp.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:360

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gevtqmgfwk.uw

      Filesize

      205KB

      MD5

      cb4c04eabe5ffeacfd9251c55e2c5a09

      SHA1

      55a382f17bce7bba10ca6c7139304bdf4550f377

      SHA256

      cdee3caff352d6d0bcac49cff41d11e5cb3fd018db3f1547d8fc4f3a988a9fbe

      SHA512

      bb2fe2cd6b0217e4b4a836bd510549e51f56799d72cd04c419d15ea3bec378eb37200ec3209fc418175f98ed8e8fb54d73b1774cc66ec0b55f2a48805e411d33

    • C:\Users\Admin\AppData\Local\Temp\rsrmv.qe

      Filesize

      5KB

      MD5

      f1aee9a911a8fd2460e455b372ad54b2

      SHA1

      58412e9c3c5d9ea77f1547c984ad7c189dc74ac3

      SHA256

      4f7cc698dc5065cda58cee8aa64151a0809c024073b459251e3de89bd9a3ad7f

      SHA512

      e72b671f89316cc1acde22d0248694f6a3f866a9e3cbca07db415cc9435023a5a1cd15daedddf2c2f26f39b258858f7c5e2a75111507066c95435b1c3e2762c6

    • C:\Users\Admin\AppData\Local\Temp\wcfbei.exe

      Filesize

      61KB

      MD5

      813214f30950ee905f9c31d0a2dcb087

      SHA1

      ed4080c9b5871961dbf56f904fa7df77bf7c980b

      SHA256

      735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8

      SHA512

      caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7

    • C:\Users\Admin\AppData\Local\Temp\wcfbei.exe

      Filesize

      61KB

      MD5

      813214f30950ee905f9c31d0a2dcb087

      SHA1

      ed4080c9b5871961dbf56f904fa7df77bf7c980b

      SHA256

      735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8

      SHA512

      caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7

    • C:\Users\Admin\AppData\Local\Temp\wcfbei.exe

      Filesize

      61KB

      MD5

      813214f30950ee905f9c31d0a2dcb087

      SHA1

      ed4080c9b5871961dbf56f904fa7df77bf7c980b

      SHA256

      735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8

      SHA512

      caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      888KB

      MD5

      9c73b282279e74e40435132e61fda001

      SHA1

      63c7248e91b68fbde4641e3c5e2dc3e9d38671fa

      SHA256

      6710d91d77e1937dd5b46d96c0852042985dc78c4c51ce12d3e07a4cdb12c202

      SHA512

      02f9a01a3a5f74ef994ebb9e5f24c6870e2d48c8b99c429a63e74dad73fb581f0b52b2a86d651cafa414675b70a0e85b2e08c843d07e080fe69ee835e3c91108

    • \Users\Admin\AppData\Local\Temp\wcfbei.exe

      Filesize

      61KB

      MD5

      813214f30950ee905f9c31d0a2dcb087

      SHA1

      ed4080c9b5871961dbf56f904fa7df77bf7c980b

      SHA256

      735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8

      SHA512

      caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7

    • \Users\Admin\AppData\Local\Temp\wcfbei.exe

      Filesize

      61KB

      MD5

      813214f30950ee905f9c31d0a2dcb087

      SHA1

      ed4080c9b5871961dbf56f904fa7df77bf7c980b

      SHA256

      735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8

      SHA512

      caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7

    • \Users\Admin\AppData\Local\Temp\wcfbei.exe

      Filesize

      61KB

      MD5

      813214f30950ee905f9c31d0a2dcb087

      SHA1

      ed4080c9b5871961dbf56f904fa7df77bf7c980b

      SHA256

      735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8

      SHA512

      caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7

    • memory/112-54-0x0000000075E31000-0x0000000075E33000-memory.dmp

      Filesize

      8KB

    • memory/828-66-0x0000000000A00000-0x0000000000D03000-memory.dmp

      Filesize

      3.0MB

    • memory/828-67-0x0000000000110000-0x0000000000120000-memory.dmp

      Filesize

      64KB

    • memory/828-65-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1212-68-0x0000000002A80000-0x0000000002B8C000-memory.dmp

      Filesize

      1.0MB

    • memory/1212-74-0x0000000004BC0000-0x0000000004CAE000-memory.dmp

      Filesize

      952KB

    • memory/1212-75-0x0000000004BC0000-0x0000000004CAE000-memory.dmp

      Filesize

      952KB

    • memory/2044-70-0x0000000000310000-0x000000000031B000-memory.dmp

      Filesize

      44KB

    • memory/2044-71-0x0000000000090000-0x00000000000BD000-memory.dmp

      Filesize

      180KB

    • memory/2044-72-0x0000000001EA0000-0x00000000021A3000-memory.dmp

      Filesize

      3.0MB

    • memory/2044-73-0x0000000001DA0000-0x0000000001E2F000-memory.dmp

      Filesize

      572KB