Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe
Resource
win10v2004-20220812-en
General
-
Target
c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe
-
Size
910KB
-
MD5
fe8dae06d4b9165c6be675e184bfaca9
-
SHA1
5244f99411acdf30ca6832b2e6352afdd68c88f3
-
SHA256
c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7
-
SHA512
33bdc3839ac944be9c6a5f6f16dc5ba3bfd8c0da66aa6772e5d4306234028e9fc6da871c9a4d65a3ce64a768404f5ea37c5d1fc3f1093f1826448711028a2552
-
SSDEEP
12288:0/YpRRbRftUf8S7DMbrhL+52971/XtnP1APDoEqb9CSnrzKTJnIii1be9hnU3Mue:RJbXK7Du8gDPWPUECf8ade0aldNYlA
Malware Config
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Black Basta payload 7 IoCs
resource yara_rule behavioral1/memory/1152-60-0x0000000000130000-0x00000000001BE000-memory.dmp family_blackbasta behavioral1/memory/1152-62-0x0000000000130000-0x00000000001BE000-memory.dmp family_blackbasta behavioral1/memory/1152-63-0x0000000000130000-0x00000000001BE000-memory.dmp family_blackbasta behavioral1/memory/1152-65-0x0000000000130000-0x00000000001BE000-memory.dmp family_blackbasta behavioral1/memory/1152-66-0x000000000016684B-mapping.dmp family_blackbasta behavioral1/memory/1152-71-0x0000000000130000-0x00000000001BE000-memory.dmp family_blackbasta behavioral1/memory/1152-76-0x0000000000130000-0x00000000001BE000-memory.dmp family_blackbasta -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1496 set thread context of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 -
Program crash 1 IoCs
pid pid_target Process procid_target 320 1152 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1496 wrote to memory of 1152 1496 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 27 PID 1152 wrote to memory of 320 1152 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 29 PID 1152 wrote to memory of 320 1152 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 29 PID 1152 wrote to memory of 320 1152 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 29 PID 1152 wrote to memory of 320 1152 c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe"C:\Users\Admin\AppData\Local\Temp\c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\c532d28f9700abba1a4803c3a9d886c8c4fb26f84cf2399c533d68cfdcec4fa7.exeOMC_BC2⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 1643⤵
- Program crash
PID:320
-
-