Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe
Resource
win10v2004-20220812-en
General
-
Target
daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe
-
Size
34KB
-
MD5
82dfa200f1a3859d5f84786d22c4e841
-
SHA1
8f58afff72ce46dec19d399f8be193de906f093f
-
SHA256
daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8
-
SHA512
5daa66b4b43503a6b6c58341ae5e1781db1f3057ca5f4be9ee9157326b1db2aac53f52de30a0fb6284e5bc1c5f9ef0792ec946aa922922556ffc1114a108bd57
-
SSDEEP
768:WC/ZZIq55P8S1QZRPas6yjlbY8pxejmc1JsbR0y0DTw:WChWqrnQZBzphY5j91ybsDs
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1316 BCSSync.exe 1392 BCSSync.exe -
Loads dropped DLL 2 IoCs
pid Process 872 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 872 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 564 set thread context of 872 564 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 27 PID 1316 set thread context of 1392 1316 BCSSync.exe 29 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 872 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 564 wrote to memory of 872 564 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 27 PID 564 wrote to memory of 872 564 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 27 PID 564 wrote to memory of 872 564 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 27 PID 564 wrote to memory of 872 564 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 27 PID 564 wrote to memory of 872 564 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 27 PID 564 wrote to memory of 872 564 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 27 PID 564 wrote to memory of 872 564 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 27 PID 564 wrote to memory of 872 564 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 27 PID 564 wrote to memory of 872 564 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 27 PID 872 wrote to memory of 1316 872 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 28 PID 872 wrote to memory of 1316 872 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 28 PID 872 wrote to memory of 1316 872 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 28 PID 872 wrote to memory of 1316 872 daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe 28 PID 1316 wrote to memory of 1392 1316 BCSSync.exe 29 PID 1316 wrote to memory of 1392 1316 BCSSync.exe 29 PID 1316 wrote to memory of 1392 1316 BCSSync.exe 29 PID 1316 wrote to memory of 1392 1316 BCSSync.exe 29 PID 1316 wrote to memory of 1392 1316 BCSSync.exe 29 PID 1316 wrote to memory of 1392 1316 BCSSync.exe 29 PID 1316 wrote to memory of 1392 1316 BCSSync.exe 29 PID 1316 wrote to memory of 1392 1316 BCSSync.exe 29 PID 1316 wrote to memory of 1392 1316 BCSSync.exe 29 PID 1392 wrote to memory of 1732 1392 BCSSync.exe 30 PID 1392 wrote to memory of 1732 1392 BCSSync.exe 30 PID 1392 wrote to memory of 1732 1392 BCSSync.exe 30 PID 1392 wrote to memory of 1732 1392 BCSSync.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe"C:\Users\Admin\AppData\Local\Temp\daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe"C:\Users\Admin\AppData\Local\Temp\daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\daedcb1739b3b63ff1865b929d0eabc7861bad3151e063384656c193b5d620d8.exe5⤵PID:1732
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD50e1b1e31c8b9350682b1d212c34bfb14
SHA171f20aaaa955698964fa9af45dad4ab8a9875941
SHA256a4ff82fbdd696324f065fd90291adced059dc5e31ae494509ef75afe0036e57a
SHA51288794b1f533448a7ed24230bc67101187d5bd4da69a3dcedea0c59828113d73e28e4746bb5c03585805aaa53b115bb0931357c5aec0f28e5cb4b204aa0d8f395
-
Filesize
34KB
MD50e1b1e31c8b9350682b1d212c34bfb14
SHA171f20aaaa955698964fa9af45dad4ab8a9875941
SHA256a4ff82fbdd696324f065fd90291adced059dc5e31ae494509ef75afe0036e57a
SHA51288794b1f533448a7ed24230bc67101187d5bd4da69a3dcedea0c59828113d73e28e4746bb5c03585805aaa53b115bb0931357c5aec0f28e5cb4b204aa0d8f395
-
Filesize
34KB
MD50e1b1e31c8b9350682b1d212c34bfb14
SHA171f20aaaa955698964fa9af45dad4ab8a9875941
SHA256a4ff82fbdd696324f065fd90291adced059dc5e31ae494509ef75afe0036e57a
SHA51288794b1f533448a7ed24230bc67101187d5bd4da69a3dcedea0c59828113d73e28e4746bb5c03585805aaa53b115bb0931357c5aec0f28e5cb4b204aa0d8f395
-
Filesize
34KB
MD50e1b1e31c8b9350682b1d212c34bfb14
SHA171f20aaaa955698964fa9af45dad4ab8a9875941
SHA256a4ff82fbdd696324f065fd90291adced059dc5e31ae494509ef75afe0036e57a
SHA51288794b1f533448a7ed24230bc67101187d5bd4da69a3dcedea0c59828113d73e28e4746bb5c03585805aaa53b115bb0931357c5aec0f28e5cb4b204aa0d8f395
-
Filesize
34KB
MD50e1b1e31c8b9350682b1d212c34bfb14
SHA171f20aaaa955698964fa9af45dad4ab8a9875941
SHA256a4ff82fbdd696324f065fd90291adced059dc5e31ae494509ef75afe0036e57a
SHA51288794b1f533448a7ed24230bc67101187d5bd4da69a3dcedea0c59828113d73e28e4746bb5c03585805aaa53b115bb0931357c5aec0f28e5cb4b204aa0d8f395