Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe
Resource
win10v2004-20220812-en
General
-
Target
de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe
-
Size
841KB
-
MD5
af5fa50b86feb6b2b21fb291a7e04a4f
-
SHA1
a2c632df5c8946012bd9c35ba9f95f8c3fc6381f
-
SHA256
de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074
-
SHA512
fc974d14a54db05cd8466f5c30627242fd75ed77f2b343c0bfa7d0f3bdae4a319f23d8a0484c12ea53f30440afb24c16db536f3e0cee5850afcf70d3d3a8abab
-
SSDEEP
24576:681dAtsOGdZowWGrpTsRY3KrfuM1kI5YfI12Or:5AtsnbDWxq/ukI5euHr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 940 bsprotection.exe -
Loads dropped DLL 2 IoCs
pid Process 748 de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe 748 de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run bsprotection.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\bsprotection.exe" bsprotection.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: bsprotection.exe File opened (read-only) \??\M: bsprotection.exe File opened (read-only) \??\V: bsprotection.exe File opened (read-only) \??\E: bsprotection.exe File opened (read-only) \??\G: bsprotection.exe File opened (read-only) \??\I: bsprotection.exe File opened (read-only) \??\R: bsprotection.exe File opened (read-only) \??\S: bsprotection.exe File opened (read-only) \??\X: bsprotection.exe File opened (read-only) \??\J: bsprotection.exe File opened (read-only) \??\N: bsprotection.exe File opened (read-only) \??\P: bsprotection.exe File opened (read-only) \??\H: bsprotection.exe File opened (read-only) \??\O: bsprotection.exe File opened (read-only) \??\T: bsprotection.exe File opened (read-only) \??\U: bsprotection.exe File opened (read-only) \??\W: bsprotection.exe File opened (read-only) \??\Y: bsprotection.exe File opened (read-only) \??\Z: bsprotection.exe File opened (read-only) \??\F: bsprotection.exe File opened (read-only) \??\K: bsprotection.exe File opened (read-only) \??\Q: bsprotection.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 bsprotection.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 748 de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 748 de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe 940 bsprotection.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 940 bsprotection.exe 940 bsprotection.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 748 wrote to memory of 940 748 de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe 27 PID 748 wrote to memory of 940 748 de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe 27 PID 748 wrote to memory of 940 748 de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe 27 PID 748 wrote to memory of 940 748 de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe"C:\Users\Admin\AppData\Local\Temp\de44201d7dab72507b2f94a753ebe3f1148ef62b95742f4da32a5b273d89e074.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:748 -
C:\ProgramData\bsprotection.exeC:\ProgramData\bsprotection.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
825KB
MD5a6fb70441f47faaa26550b6bf87ff7d1
SHA1c3d6152b08b5bc9295d4769b2f148211cf0039c6
SHA25627eb7c6d0203a0ecf5d1ecac1637890abeb1fb01dc24bdf615f53b7a932b2caa
SHA512c1b0387bb30545d30d0eabfec48331c0958d88ab53f7765ab30c511f178ffcfda15e099a185edf142f6c47521425372ce952cb31f92aee5d04cbcaa08e40af63
-
Filesize
825KB
MD5a6fb70441f47faaa26550b6bf87ff7d1
SHA1c3d6152b08b5bc9295d4769b2f148211cf0039c6
SHA25627eb7c6d0203a0ecf5d1ecac1637890abeb1fb01dc24bdf615f53b7a932b2caa
SHA512c1b0387bb30545d30d0eabfec48331c0958d88ab53f7765ab30c511f178ffcfda15e099a185edf142f6c47521425372ce952cb31f92aee5d04cbcaa08e40af63
-
Filesize
825KB
MD5a6fb70441f47faaa26550b6bf87ff7d1
SHA1c3d6152b08b5bc9295d4769b2f148211cf0039c6
SHA25627eb7c6d0203a0ecf5d1ecac1637890abeb1fb01dc24bdf615f53b7a932b2caa
SHA512c1b0387bb30545d30d0eabfec48331c0958d88ab53f7765ab30c511f178ffcfda15e099a185edf142f6c47521425372ce952cb31f92aee5d04cbcaa08e40af63