Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
c1bc798ea23f3724ec785dcb80ef5157.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1bc798ea23f3724ec785dcb80ef5157.dll
Resource
win10v2004-20240226-en
General
-
Target
c1bc798ea23f3724ec785dcb80ef5157.dll
-
Size
49KB
-
MD5
c1bc798ea23f3724ec785dcb80ef5157
-
SHA1
39a62d515ef9243ebbe258c6c216117fac708b18
-
SHA256
7698b685acfb273d1590fabe8f3495f2056691a5871296a50b1c5ed1339aa577
-
SHA512
a87ba8d95525e813b0170cd00687cf617fca23d46aaadc7752556e2501320a8191165fa5dbc77c060264e8606cfccc755a1af93f3772d4835c35ac018c555e42
-
SSDEEP
768:4vc89QoqCl28iydf60EUsn3Q1lwf2hekL9/w4Xk+lZW+4V:Y/Qpc/Zf6wsEVCX+lQnV
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuhqif\Parameters\ServiceDll = "%SystemRoot%\\System32\\wuhqif.dll" PCB~1.exe -
Executes dropped EXE 2 IoCs
pid Process 2572 PCB~1.exe 2884 PCB~1.exe -
Loads dropped DLL 6 IoCs
pid Process 2872 rundll32.exe 2872 rundll32.exe 2572 PCB~1.exe 2572 PCB~1.exe 2884 PCB~1.exe 2820 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\PCB~1.exe rundll32.exe File created C:\Windows\SysWOW64\wuhqif.dll PCB~1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2688 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2572 PCB~1.exe 2572 PCB~1.exe 2884 PCB~1.exe 2884 PCB~1.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2872 2996 rundll32.exe 27 PID 2996 wrote to memory of 2872 2996 rundll32.exe 27 PID 2996 wrote to memory of 2872 2996 rundll32.exe 27 PID 2996 wrote to memory of 2872 2996 rundll32.exe 27 PID 2996 wrote to memory of 2872 2996 rundll32.exe 27 PID 2996 wrote to memory of 2872 2996 rundll32.exe 27 PID 2996 wrote to memory of 2872 2996 rundll32.exe 27 PID 2872 wrote to memory of 2572 2872 rundll32.exe 28 PID 2872 wrote to memory of 2572 2872 rundll32.exe 28 PID 2872 wrote to memory of 2572 2872 rundll32.exe 28 PID 2872 wrote to memory of 2572 2872 rundll32.exe 28 PID 2872 wrote to memory of 2500 2872 rundll32.exe 29 PID 2872 wrote to memory of 2500 2872 rundll32.exe 29 PID 2872 wrote to memory of 2500 2872 rundll32.exe 29 PID 2872 wrote to memory of 2500 2872 rundll32.exe 29 PID 2872 wrote to memory of 2736 2872 rundll32.exe 30 PID 2872 wrote to memory of 2736 2872 rundll32.exe 30 PID 2872 wrote to memory of 2736 2872 rundll32.exe 30 PID 2872 wrote to memory of 2736 2872 rundll32.exe 30 PID 2572 wrote to memory of 2884 2572 PCB~1.exe 33 PID 2572 wrote to memory of 2884 2572 PCB~1.exe 33 PID 2572 wrote to memory of 2884 2572 PCB~1.exe 33 PID 2572 wrote to memory of 2884 2572 PCB~1.exe 33 PID 2736 wrote to memory of 2688 2736 cmd.exe 34 PID 2736 wrote to memory of 2688 2736 cmd.exe 34 PID 2736 wrote to memory of 2688 2736 cmd.exe 34 PID 2736 wrote to memory of 2688 2736 cmd.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1bc798ea23f3724ec785dcb80ef5157.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1bc798ea23f3724ec785dcb80ef5157.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\PCB~1.exeC:\Windows\system32\PCB~1.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\PCB~1.exe"C:\Windows\SysWOW64\PCB~1.exe" TWO4⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /f /q C:\Windows\system32\PCB~1.exe3⤵PID:2500
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im cmd.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im cmd.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k wuhqif1⤵
- Loads dropped DLL
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5b44e9d14dec09425c1c3b762d21f31a2
SHA18118759754b0be281ec8bab3734061db3bc1ab44
SHA256a9603e8836952ee6b5e1e1b49812c9e4c5911a2502bfc01d5c5d63d36ee7142f
SHA512e60349a06386f0f7607b39045416efeff8afa078e8cda058b0fb90cc750935c532557a1bb2d4b05b1efec0fe2163f29f6a524f3b0f444b0327d5d1a9b6455e8f
-
Filesize
20KB
MD5202d44e495800906823944e401fec7a8
SHA15d17d1531123fc37c1a2743ff1960130e858b899
SHA2568665bcd79fbb5ce63a29c330fe6286018283aae119cdd164f5fe940384c1c71b
SHA512a4072816afcadfb2f781946c43f013c6fa18d109e8fbe97cfaf9ee4e97962d2052bd38fdc45e28d955383d8d194987ef519fc1f3a99aef63f153b2487fbdc2da