Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
148KB
-
MD5
73a9ab2ea9ec4eaf45bce88afc7ee87e
-
SHA1
bb8d963421491d6c20ae6082b383ddeebf3981e4
-
SHA256
9f09d25b2756d813c2e9a1f609504b729cbda76248c0a12061cc15456f56730b
-
SHA512
34006fdfd74295850185b1c3daf36220ede5bd171241df9f89474fd74df571fe0d432b7e98abdbf284595d69e661eb148e055ac7ca9b8a1bb37960974311ee0e
-
SSDEEP
3072:tYcIDc20Qr0AGFDRlt98XSPmLmUQuywCXbx:tYlDcVQQAmlltCXEG8f
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bcf8801.exe explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\bcf880 = "C:\\bcf8801\\bcf8801.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*cf880 = "C:\\bcf8801\\bcf8801.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\bcf8801 = "C:\\Users\\Admin\\AppData\\Roaming\\bcf8801.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*cf8801 = "C:\\Users\\Admin\\AppData\\Roaming\\bcf8801.exe" explorer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Trojan-Ransom.Win32.Blocker.INI Trojan-Ransom.Win32.Blocker.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1704 vssadmin.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1128 Trojan-Ransom.Win32.Blocker.exe 844 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 632 vssvc.exe Token: SeRestorePrivilege 632 vssvc.exe Token: SeAuditPrivilege 632 vssvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1128 Trojan-Ransom.Win32.Blocker.exe 1128 Trojan-Ransom.Win32.Blocker.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1128 Trojan-Ransom.Win32.Blocker.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1128 wrote to memory of 844 1128 Trojan-Ransom.Win32.Blocker.exe 27 PID 1128 wrote to memory of 844 1128 Trojan-Ransom.Win32.Blocker.exe 27 PID 1128 wrote to memory of 844 1128 Trojan-Ransom.Win32.Blocker.exe 27 PID 1128 wrote to memory of 844 1128 Trojan-Ransom.Win32.Blocker.exe 27 PID 844 wrote to memory of 1936 844 explorer.exe 28 PID 844 wrote to memory of 1936 844 explorer.exe 28 PID 844 wrote to memory of 1936 844 explorer.exe 28 PID 844 wrote to memory of 1936 844 explorer.exe 28 PID 844 wrote to memory of 1704 844 explorer.exe 29 PID 844 wrote to memory of 1704 844 explorer.exe 29 PID 844 wrote to memory of 1704 844 explorer.exe 29 PID 844 wrote to memory of 1704 844 explorer.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\syswow64\svchost.exe-k netsvcs3⤵PID:1936
-
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1704
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:632