Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/01/2023, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
cc231df7de4fc3f165eb4fa0b164750306a436ed.exe
Resource
win7-20220812-en
General
-
Target
cc231df7de4fc3f165eb4fa0b164750306a436ed.exe
-
Size
551KB
-
MD5
196b4c60853e8edb24430341e58e01ad
-
SHA1
cc231df7de4fc3f165eb4fa0b164750306a436ed
-
SHA256
783dbf002227109a372c999fb01e0a6a542ff273dcb8a10e9080ba8d7466a6e8
-
SHA512
cef00627249e098c73a56639631462c8e079069553e26cb3b910f93c0509e4ed5514acb5fa3f8741625dc4bac053f5ad282b8924e6428b0e2b4cfd328fa19c42
-
SSDEEP
12288:kYjCG72h8Hq19i4OK3Kfjrzzux2H4UzRE0qCWFpIa9mtbjqzIRCdcl:kYjdW8Hqri4kfjrexDCREGWqdRCCl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 684 wcfbei.exe 828 wcfbei.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation wcfbei.exe -
Loads dropped DLL 4 IoCs
pid Process 112 cc231df7de4fc3f165eb4fa0b164750306a436ed.exe 112 cc231df7de4fc3f165eb4fa0b164750306a436ed.exe 684 wcfbei.exe 2044 wuapp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 684 set thread context of 828 684 wcfbei.exe 29 PID 828 set thread context of 1212 828 wcfbei.exe 17 PID 2044 set thread context of 1212 2044 wuapp.exe 17 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wuapp.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 828 wcfbei.exe 828 wcfbei.exe 828 wcfbei.exe 828 wcfbei.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 684 wcfbei.exe 828 wcfbei.exe 828 wcfbei.exe 828 wcfbei.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe 2044 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 828 wcfbei.exe Token: SeDebugPrivilege 2044 wuapp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 112 wrote to memory of 684 112 cc231df7de4fc3f165eb4fa0b164750306a436ed.exe 28 PID 112 wrote to memory of 684 112 cc231df7de4fc3f165eb4fa0b164750306a436ed.exe 28 PID 112 wrote to memory of 684 112 cc231df7de4fc3f165eb4fa0b164750306a436ed.exe 28 PID 112 wrote to memory of 684 112 cc231df7de4fc3f165eb4fa0b164750306a436ed.exe 28 PID 684 wrote to memory of 828 684 wcfbei.exe 29 PID 684 wrote to memory of 828 684 wcfbei.exe 29 PID 684 wrote to memory of 828 684 wcfbei.exe 29 PID 684 wrote to memory of 828 684 wcfbei.exe 29 PID 684 wrote to memory of 828 684 wcfbei.exe 29 PID 1212 wrote to memory of 2044 1212 Explorer.EXE 30 PID 1212 wrote to memory of 2044 1212 Explorer.EXE 30 PID 1212 wrote to memory of 2044 1212 Explorer.EXE 30 PID 1212 wrote to memory of 2044 1212 Explorer.EXE 30 PID 1212 wrote to memory of 2044 1212 Explorer.EXE 30 PID 1212 wrote to memory of 2044 1212 Explorer.EXE 30 PID 1212 wrote to memory of 2044 1212 Explorer.EXE 30 PID 2044 wrote to memory of 360 2044 wuapp.exe 33 PID 2044 wrote to memory of 360 2044 wuapp.exe 33 PID 2044 wrote to memory of 360 2044 wuapp.exe 33 PID 2044 wrote to memory of 360 2044 wuapp.exe 33 PID 2044 wrote to memory of 360 2044 wuapp.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\cc231df7de4fc3f165eb4fa0b164750306a436ed.exe"C:\Users\Admin\AppData\Local\Temp\cc231df7de4fc3f165eb4fa0b164750306a436ed.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\wcfbei.exe"C:\Users\Admin\AppData\Local\Temp\wcfbei.exe" C:\Users\Admin\AppData\Local\Temp\rsrmv.qe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\wcfbei.exe"C:\Users\Admin\AppData\Local\Temp\wcfbei.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:360
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5cb4c04eabe5ffeacfd9251c55e2c5a09
SHA155a382f17bce7bba10ca6c7139304bdf4550f377
SHA256cdee3caff352d6d0bcac49cff41d11e5cb3fd018db3f1547d8fc4f3a988a9fbe
SHA512bb2fe2cd6b0217e4b4a836bd510549e51f56799d72cd04c419d15ea3bec378eb37200ec3209fc418175f98ed8e8fb54d73b1774cc66ec0b55f2a48805e411d33
-
Filesize
5KB
MD5f1aee9a911a8fd2460e455b372ad54b2
SHA158412e9c3c5d9ea77f1547c984ad7c189dc74ac3
SHA2564f7cc698dc5065cda58cee8aa64151a0809c024073b459251e3de89bd9a3ad7f
SHA512e72b671f89316cc1acde22d0248694f6a3f866a9e3cbca07db415cc9435023a5a1cd15daedddf2c2f26f39b258858f7c5e2a75111507066c95435b1c3e2762c6
-
Filesize
61KB
MD5813214f30950ee905f9c31d0a2dcb087
SHA1ed4080c9b5871961dbf56f904fa7df77bf7c980b
SHA256735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8
SHA512caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7
-
Filesize
61KB
MD5813214f30950ee905f9c31d0a2dcb087
SHA1ed4080c9b5871961dbf56f904fa7df77bf7c980b
SHA256735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8
SHA512caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7
-
Filesize
61KB
MD5813214f30950ee905f9c31d0a2dcb087
SHA1ed4080c9b5871961dbf56f904fa7df77bf7c980b
SHA256735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8
SHA512caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7
-
Filesize
888KB
MD59c73b282279e74e40435132e61fda001
SHA163c7248e91b68fbde4641e3c5e2dc3e9d38671fa
SHA2566710d91d77e1937dd5b46d96c0852042985dc78c4c51ce12d3e07a4cdb12c202
SHA51202f9a01a3a5f74ef994ebb9e5f24c6870e2d48c8b99c429a63e74dad73fb581f0b52b2a86d651cafa414675b70a0e85b2e08c843d07e080fe69ee835e3c91108
-
Filesize
61KB
MD5813214f30950ee905f9c31d0a2dcb087
SHA1ed4080c9b5871961dbf56f904fa7df77bf7c980b
SHA256735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8
SHA512caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7
-
Filesize
61KB
MD5813214f30950ee905f9c31d0a2dcb087
SHA1ed4080c9b5871961dbf56f904fa7df77bf7c980b
SHA256735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8
SHA512caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7
-
Filesize
61KB
MD5813214f30950ee905f9c31d0a2dcb087
SHA1ed4080c9b5871961dbf56f904fa7df77bf7c980b
SHA256735b398be4765d455c5a54da6f6ed6dbabecbe078c01c7db9e28d8eed85286c8
SHA512caf7fcc72468ad01e554b81e3fab4d54cc8224f922a91597c1b78edb715986e87d44b3dd6b65447cb02d87ba576121fac923c019ba500544a5143b1ebe17eca7