Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1007s -
max time network
1010s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
WeChatBackup.exe
Resource
win10v2004-20230221-en
General
-
Target
WeChatBackup.exe
-
Size
4.6MB
-
MD5
f81556b4227fcbbec8dc7bf92c829c51
-
SHA1
8b3101ea19f929b5e9d90efc0c7693962fa33fa3
-
SHA256
35c91f63fa6179ffcd6def655a2fc07e38ac7145a355c2077fac1b3c19ff6a87
-
SHA512
ba18ddb9ada8e39e37411c28824dc2b4f253224cb63517f5092edc0208e43fdaa82a867d6b24a6b71a4b0c374aebdf17a9920f6cc20b92028b1cda0730a09701
-
SSDEEP
98304:gFZocjOYCIossQIyn2mz/AqrKHUzJbE6UE4LqCk1n+hAcTOGa672e97OLG:5cjOY9os7rz4qrKHUzJblg21nkAzGaaN
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2216 netsh.exe 2812 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation WeChatBackup.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 WeChatBackup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2904 WeChatBackup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 WeChatBackup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3320 wrote to memory of 2904 3320 WeChatBackup.exe 86 PID 3320 wrote to memory of 2904 3320 WeChatBackup.exe 86 PID 2904 wrote to memory of 2216 2904 WeChatBackup.exe 98 PID 2904 wrote to memory of 2216 2904 WeChatBackup.exe 98 PID 2904 wrote to memory of 2812 2904 WeChatBackup.exe 100 PID 2904 wrote to memory of 2812 2904 WeChatBackup.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\WeChatBackup.exe"C:\Users\Admin\AppData\Local\Temp\WeChatBackup.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\WeChatBackup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\WeChatBackup.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall set publicprofile state on3⤵
- Modifies Windows Firewall
PID:2216
-
-
C:\Windows\SYSTEM32\netsh.exe"netsh" advfirewall set privateprofile state on3⤵
- Modifies Windows Firewall
PID:2812
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
693KB
MD58a1f06f3f45464074671ba3aafba9f55
SHA100bfa8339b930ae75d8a06613c863ca2b0562e60
SHA256f3ffd3f5da520b4162fea7e0d7e2cbc45b15c403735396593dd1a0624288583c
SHA5123e2370b54b88b254dc9d2860dc3314b923e369ad259dc63d19b256c7606b0951c503497930ee96eb836b89273b04700409e45d53f3b567dfb9ae162fe9138ad0
-
Filesize
7.5MB
MD5f9ee05e4dc9e90824153af14dc91df2f
SHA1f68018eccc58f1f6d31a6a524c57ee1c1993b36f
SHA25691515fe467f247063e84ffc1d993e37482eb2779108c30fc87c382fedcea47b4
SHA512a96ad6a2ac9dca1219b7fef504242344e4f3e7297086a493d73a950dd29dc0530c6dbbfef32717524642b41733f22b4f3cc282cd3df919414fe77c09ef6304f3
-
Filesize
7.5MB
MD5f9ee05e4dc9e90824153af14dc91df2f
SHA1f68018eccc58f1f6d31a6a524c57ee1c1993b36f
SHA25691515fe467f247063e84ffc1d993e37482eb2779108c30fc87c382fedcea47b4
SHA512a96ad6a2ac9dca1219b7fef504242344e4f3e7297086a493d73a950dd29dc0530c6dbbfef32717524642b41733f22b4f3cc282cd3df919414fe77c09ef6304f3
-
Filesize
7.5MB
MD5f9ee05e4dc9e90824153af14dc91df2f
SHA1f68018eccc58f1f6d31a6a524c57ee1c1993b36f
SHA25691515fe467f247063e84ffc1d993e37482eb2779108c30fc87c382fedcea47b4
SHA512a96ad6a2ac9dca1219b7fef504242344e4f3e7297086a493d73a950dd29dc0530c6dbbfef32717524642b41733f22b4f3cc282cd3df919414fe77c09ef6304f3
-
Filesize
189B
MD59dbad5517b46f41dbb0d8780b20ab87e
SHA1ef6aef0b1ea5d01b6e088a8bf2f429773c04ba5e
SHA25647e5a0f101af4151d7f13d2d6bfa9b847d5b5e4a98d1f4674b7c015772746cdf
SHA51243825f5c26c54e1fc5bffcce30caad1449a28c0c9a9432e9ce17d255f8bf6057c1a1002d9471e5b654ab1de08fb6eabf96302cdb3e0fb4b63ba0ff186e903be8