Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe
Resource
win10v2004-20240226-en
General
-
Target
1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe
-
Size
225KB
-
MD5
bbeb014ff76f456cc62ab5128e5846f4
-
SHA1
83d8f2424e70b3ddb034a335d23ecbd54bd733c7
-
SHA256
1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3
-
SHA512
f41937d3b22e9292da384ace6dd574132938d77c864d53dd959368eb3ccc92cf31ab1af4987eab36854623a0abcf371dec61fa7741bbd0cf553dd04adf78ea52
-
SSDEEP
3072:5YUb5QoJ4g+tknipuH/Zj6Iz1ZdW4SBoC2n+:5YfQ1h6SZI4q
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation wqvqfkya.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation wdfdxau.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation wfgljbm.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation wclbxbv.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation wrjqbad.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation wuumrnbf.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation wic.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation wcjxoh.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation 1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation wvjyydmyh.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation wkbawufss.exe -
Executes dropped EXE 11 IoCs
pid Process 2908 wclbxbv.exe 3472 wvjyydmyh.exe 3516 wrjqbad.exe 4816 wuumrnbf.exe 4720 wkbawufss.exe 2536 wqvqfkya.exe 3884 wic.exe 1644 wdfdxau.exe 4852 wfgljbm.exe 2556 wcjxoh.exe 4392 wwlpattv.exe -
Drops file in System32 directory 23 IoCs
description ioc Process File created C:\Windows\SysWOW64\wclbxbv.exe 1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe File created C:\Windows\SysWOW64\wic.exe wqvqfkya.exe File opened for modification C:\Windows\SysWOW64\wdfdxau.exe wic.exe File opened for modification C:\Windows\SysWOW64\wfgljbm.exe wdfdxau.exe File created C:\Windows\SysWOW64\wfgljbm.exe wdfdxau.exe File opened for modification C:\Windows\SysWOW64\wcjxoh.exe wfgljbm.exe File opened for modification C:\Windows\SysWOW64\wwlpattv.exe wcjxoh.exe File opened for modification C:\Windows\SysWOW64\wclbxbv.exe 1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe File created C:\Windows\SysWOW64\wvjyydmyh.exe wclbxbv.exe File created C:\Windows\SysWOW64\wrjqbad.exe wvjyydmyh.exe File opened for modification C:\Windows\SysWOW64\wkbawufss.exe wuumrnbf.exe File opened for modification C:\Windows\SysWOW64\wqvqfkya.exe wkbawufss.exe File opened for modification C:\Windows\SysWOW64\wrjqbad.exe wvjyydmyh.exe File created C:\Windows\SysWOW64\wuumrnbf.exe wrjqbad.exe File created C:\Windows\SysWOW64\wdfdxau.exe wic.exe File created C:\Windows\SysWOW64\wwlpattv.exe wcjxoh.exe File created C:\Windows\SysWOW64\wylac.exe wwlpattv.exe File created C:\Windows\SysWOW64\wcjxoh.exe wfgljbm.exe File opened for modification C:\Windows\SysWOW64\wvjyydmyh.exe wclbxbv.exe File opened for modification C:\Windows\SysWOW64\wuumrnbf.exe wrjqbad.exe File created C:\Windows\SysWOW64\wkbawufss.exe wuumrnbf.exe File created C:\Windows\SysWOW64\wqvqfkya.exe wkbawufss.exe File opened for modification C:\Windows\SysWOW64\wic.exe wqvqfkya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4268 2908 WerFault.exe 90 4516 4816 WerFault.exe 119 1660 4720 WerFault.exe 122 428 4852 WerFault.exe 138 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2908 1836 1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe 90 PID 1836 wrote to memory of 2908 1836 1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe 90 PID 1836 wrote to memory of 2908 1836 1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe 90 PID 1836 wrote to memory of 3620 1836 1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe 92 PID 1836 wrote to memory of 3620 1836 1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe 92 PID 1836 wrote to memory of 3620 1836 1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe 92 PID 2908 wrote to memory of 3472 2908 wclbxbv.exe 111 PID 2908 wrote to memory of 3472 2908 wclbxbv.exe 111 PID 2908 wrote to memory of 3472 2908 wclbxbv.exe 111 PID 2908 wrote to memory of 540 2908 wclbxbv.exe 112 PID 2908 wrote to memory of 540 2908 wclbxbv.exe 112 PID 2908 wrote to memory of 540 2908 wclbxbv.exe 112 PID 3472 wrote to memory of 3516 3472 wvjyydmyh.exe 116 PID 3472 wrote to memory of 3516 3472 wvjyydmyh.exe 116 PID 3472 wrote to memory of 3516 3472 wvjyydmyh.exe 116 PID 3472 wrote to memory of 3364 3472 wvjyydmyh.exe 117 PID 3472 wrote to memory of 3364 3472 wvjyydmyh.exe 117 PID 3472 wrote to memory of 3364 3472 wvjyydmyh.exe 117 PID 3516 wrote to memory of 4816 3516 wrjqbad.exe 119 PID 3516 wrote to memory of 4816 3516 wrjqbad.exe 119 PID 3516 wrote to memory of 4816 3516 wrjqbad.exe 119 PID 3516 wrote to memory of 3384 3516 wrjqbad.exe 120 PID 3516 wrote to memory of 3384 3516 wrjqbad.exe 120 PID 3516 wrote to memory of 3384 3516 wrjqbad.exe 120 PID 4816 wrote to memory of 4720 4816 wuumrnbf.exe 122 PID 4816 wrote to memory of 4720 4816 wuumrnbf.exe 122 PID 4816 wrote to memory of 4720 4816 wuumrnbf.exe 122 PID 4816 wrote to memory of 3656 4816 wuumrnbf.exe 123 PID 4816 wrote to memory of 3656 4816 wuumrnbf.exe 123 PID 4816 wrote to memory of 3656 4816 wuumrnbf.exe 123 PID 4720 wrote to memory of 2536 4720 wkbawufss.exe 127 PID 4720 wrote to memory of 2536 4720 wkbawufss.exe 127 PID 4720 wrote to memory of 2536 4720 wkbawufss.exe 127 PID 4720 wrote to memory of 116 4720 wkbawufss.exe 128 PID 4720 wrote to memory of 116 4720 wkbawufss.exe 128 PID 4720 wrote to memory of 116 4720 wkbawufss.exe 128 PID 2536 wrote to memory of 3884 2536 wqvqfkya.exe 132 PID 2536 wrote to memory of 3884 2536 wqvqfkya.exe 132 PID 2536 wrote to memory of 3884 2536 wqvqfkya.exe 132 PID 2536 wrote to memory of 4568 2536 wqvqfkya.exe 133 PID 2536 wrote to memory of 4568 2536 wqvqfkya.exe 133 PID 2536 wrote to memory of 4568 2536 wqvqfkya.exe 133 PID 3884 wrote to memory of 1644 3884 wic.exe 135 PID 3884 wrote to memory of 1644 3884 wic.exe 135 PID 3884 wrote to memory of 1644 3884 wic.exe 135 PID 3884 wrote to memory of 2584 3884 wic.exe 136 PID 3884 wrote to memory of 2584 3884 wic.exe 136 PID 3884 wrote to memory of 2584 3884 wic.exe 136 PID 1644 wrote to memory of 4852 1644 wdfdxau.exe 138 PID 1644 wrote to memory of 4852 1644 wdfdxau.exe 138 PID 1644 wrote to memory of 4852 1644 wdfdxau.exe 138 PID 1644 wrote to memory of 1688 1644 wdfdxau.exe 139 PID 1644 wrote to memory of 1688 1644 wdfdxau.exe 139 PID 1644 wrote to memory of 1688 1644 wdfdxau.exe 139 PID 4852 wrote to memory of 2556 4852 wfgljbm.exe 141 PID 4852 wrote to memory of 2556 4852 wfgljbm.exe 141 PID 4852 wrote to memory of 2556 4852 wfgljbm.exe 141 PID 4852 wrote to memory of 2988 4852 wfgljbm.exe 142 PID 4852 wrote to memory of 2988 4852 wfgljbm.exe 142 PID 4852 wrote to memory of 2988 4852 wfgljbm.exe 142 PID 2556 wrote to memory of 4392 2556 wcjxoh.exe 146 PID 2556 wrote to memory of 4392 2556 wcjxoh.exe 146 PID 2556 wrote to memory of 4392 2556 wcjxoh.exe 146 PID 2556 wrote to memory of 3516 2556 wcjxoh.exe 147
Processes
-
C:\Users\Admin\AppData\Local\Temp\1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe"C:\Users\Admin\AppData\Local\Temp\1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\wclbxbv.exe"C:\Windows\system32\wclbxbv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\wvjyydmyh.exe"C:\Windows\system32\wvjyydmyh.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\wrjqbad.exe"C:\Windows\system32\wrjqbad.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\wuumrnbf.exe"C:\Windows\system32\wuumrnbf.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\wkbawufss.exe"C:\Windows\system32\wkbawufss.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\wqvqfkya.exe"C:\Windows\system32\wqvqfkya.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\wic.exe"C:\Windows\system32\wic.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\wdfdxau.exe"C:\Windows\system32\wdfdxau.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\wfgljbm.exe"C:\Windows\system32\wfgljbm.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\wcjxoh.exe"C:\Windows\system32\wcjxoh.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\wwlpattv.exe"C:\Windows\system32\wwlpattv.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4392
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wcjxoh.exe"12⤵PID:3516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wfgljbm.exe"11⤵PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 168811⤵
- Program crash
PID:428
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wdfdxau.exe"10⤵PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wic.exe"9⤵PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wqvqfkya.exe"8⤵PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wkbawufss.exe"7⤵PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 13447⤵
- Program crash
PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wuumrnbf.exe"6⤵PID:3656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 14326⤵
- Program crash
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wrjqbad.exe"5⤵PID:3384
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wvjyydmyh.exe"4⤵PID:3364
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wclbxbv.exe"3⤵PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 15363⤵
- Program crash
PID:4268
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\1985c02243a4a75cf9fef2d3ace08a15709dc2b112ab68d113e054e0ebdfdaf3.exe"2⤵PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2908 -ip 29081⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4816 -ip 48161⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4720 -ip 47201⤵PID:1200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4852 -ip 48521⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD55c3e20fc897f7be86d4d1eeedbdb7376
SHA131f339c53b2e6e1bbc1fec478ee748f1682bce0a
SHA256a79fd8243032d4ae7abd98b44583fcd8f1df73df5c7180feea97a3e19cd2734d
SHA5128fb7053c373c342463016f72b749e3975e8f551ddeb63b24236108043af89feb7a0e61c21a2f1aee0bc190e401d3dd303deac38d86b49e525ef002cfcf9b9df1
-
Filesize
225KB
MD5482f87341beab2c9e39c9187f12a5a35
SHA1c40115aaf816a04434c179b757d0eabb5b3723a8
SHA25683ff9c714e2445e18a3ff987d77a190f298fd30ce74d4555d8c91e1af882ae57
SHA512553a47570de9680555661b3c7006123da9d37410772e957b420c029509e4769023961ba72ea3f58a531594ddcd7459371c1d50acd9f72ee77a4c5d1208564d20
-
Filesize
225KB
MD59e83d840378e42d4358f38ec3632a8ae
SHA1544d90f94ace4c1407c107f5a9b7a48c0112307f
SHA2566b52a738adc8f0fe2d98f8574924a6ef68465b9f9a7c19aa1b1c3aed77660d79
SHA5128f3118d6ead2b780023b76cb1be279ab2b2a44049f2daa444dcee2a3b107bf67df83a4e43758bf1e612501e207646669501fad4b91ec80d63b87b03ff6681efb
-
Filesize
225KB
MD5362d6bcd477b6392e056044cb486797f
SHA17ad7ce1b3ec2bcf00c69c39c6c2f8f8f0ba22a67
SHA256031c822b61459e850345275b69a664fb257439b468e21eae170c7800a6f3745b
SHA5127617e305d56577b80e1297d18da0b1a71559eb451c3934fc9632e0d9cbf5d060ce0f602ed5b1af1fa19e3416a952f96013603aed87643cb36a9b2413ef541415
-
Filesize
225KB
MD5b77ff3f5c7cc6cb8cca9509f64716aa9
SHA17395a836a49ad346b04d9799a9a84d912a9921e0
SHA256c3b859e5763976643395a42ea0893629593c48890f824428fbaf7dcc20ae1a91
SHA512230ad333d0ff79f6733416f21a1d401ecc5df5bb806685acc538753901a8e0008fc66067ef5da70dac184618849b9c541b7033b080f5fa0e7ea554b6394aab9e
-
Filesize
225KB
MD590f8d348d6374348af5b46af43fd2352
SHA14f89a259292f06d310f18adc13bcd50bb80b0cea
SHA256b631c89b5da0a7cf9a249a62e4c9f05a71e8b15b59097cc220ade8eff613ac0e
SHA51236154216d1f6ecbc7e039f738e27a76aabfc33e2c1f4357c127a3a3428b556badc46f9fe9a61cc35abd93ff861ed40e9beed06f4be0ee1277eb01c24d54b6a46
-
Filesize
225KB
MD570599a0a44e7f76292362d6045ad8dff
SHA182d364e5dfa7b868dfbe0cfbc680b6646d411613
SHA25617061bc185bc3786a4bdda82a69b3f76deae6499f835d0a852f2d24671899feb
SHA5127d693c5b256613bd923d9b8b0cf613c11f61fe68d5dcb18b2bb6260941001123d21178d9867e49c82949801178fb8cc097bc153681ebe18a6cfd513efe9847c7
-
Filesize
225KB
MD5fbc79b318a57704f5b829d79763aba78
SHA116060f72d1056b4fc805c44763cac51f84501b3e
SHA256774cf1b4f50e5df7648b05884024b402d2df0b3b16effa9009ef092ae5f08993
SHA512e992ec0fac108ea769be97805a13fed06a61b50f897ac101506d9821aca6af4c62c1e96cee7e37b38c84733dba8c5b1cbcb26f58ea354f4cb2841b533e6be388
-
Filesize
225KB
MD526a9ca6684c198677aedd022acf2a168
SHA1aaa74549924228ab34285867dccf2644b9b85e85
SHA256f9d6caf7209ce0cfc74ac9a0d30f9bbd89e1084877fd22135531efa19fa014f3
SHA512ce27cf46093f7c871fcb71c01bab2d17167e4333cbb0e2cd58c7c6deee29fef31a6666145662219fafa416b1d3a085763c089abd09cf0229acfffe6ad0449a61
-
Filesize
225KB
MD590593f7c886ad55875bce74972c39e12
SHA12e726d724820f58299269565d11cb6b88828b6b9
SHA256d0082c87328050da9bd498aa7bc54e4c4bb744fbbd3a1ad08090baa04269cc37
SHA51274cfccaede86df80613037a67729be69b1bb368ce995ca24775d16ca3b959408f7f82cb11d515c60a570a4eef351055833d04c71b995913eabb86c1507618a46
-
Filesize
225KB
MD59e1b396f4e34d89db6872315f22f741c
SHA10487f7aa01ed55dec27218826ac7c10602b42ad7
SHA25653142d1970b35c484405b894ca2ef9e5e819ef0ffba96eea03de4fc2ce76d100
SHA512942f90919bd88b4ecc5f716d939833a79165caeaaa4d0c3236b6947b03095f648e8a979cc2aa10876a5edbf84d76bfc3e0ac5e7a9936edb5977ac7e405d2fcd7