Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe
Resource
win10v2004-20221111-en
General
-
Target
4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe
-
Size
841KB
-
MD5
cf47ee9f9d6fb14dd856308505c3229c
-
SHA1
1701e546ec25237b5890d05f4a4d90dfc2c4b7ac
-
SHA256
4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb
-
SHA512
ecdbaba1320167bd2113f77a29d9c95f9c3680cd71a3f32fd41238eff0741b3964540655e0dcb9ace508966807839d3f2edb04d81749920dfb2c4967538d8b55
-
SSDEEP
24576:70MdxO63Kc5PTgIfQQAnOsRJo0swQTtNGRPo:70QxO63p90IYQiOL025U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 564 bsprotection.exe -
Loads dropped DLL 2 IoCs
pid Process 748 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 748 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run bsprotection.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\bsprotection.exe" bsprotection.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: bsprotection.exe File opened (read-only) \??\L: bsprotection.exe File opened (read-only) \??\M: bsprotection.exe File opened (read-only) \??\Q: bsprotection.exe File opened (read-only) \??\V: bsprotection.exe File opened (read-only) \??\Z: bsprotection.exe File opened (read-only) \??\R: bsprotection.exe File opened (read-only) \??\Y: bsprotection.exe File opened (read-only) \??\T: bsprotection.exe File opened (read-only) \??\U: bsprotection.exe File opened (read-only) \??\E: bsprotection.exe File opened (read-only) \??\F: bsprotection.exe File opened (read-only) \??\J: bsprotection.exe File opened (read-only) \??\K: bsprotection.exe File opened (read-only) \??\N: bsprotection.exe File opened (read-only) \??\O: bsprotection.exe File opened (read-only) \??\X: bsprotection.exe File opened (read-only) \??\G: bsprotection.exe File opened (read-only) \??\I: bsprotection.exe File opened (read-only) \??\P: bsprotection.exe File opened (read-only) \??\S: bsprotection.exe File opened (read-only) \??\W: bsprotection.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 bsprotection.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 748 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 748 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe 564 bsprotection.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 564 bsprotection.exe 564 bsprotection.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 748 wrote to memory of 564 748 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 28 PID 748 wrote to memory of 564 748 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 28 PID 748 wrote to memory of 564 748 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 28 PID 748 wrote to memory of 564 748 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe"C:\Users\Admin\AppData\Local\Temp\4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:748 -
C:\ProgramData\bsprotection.exeC:\ProgramData\bsprotection.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:564
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824KB
MD525349911e45206c38fb3c4c39dae3a3a
SHA1c6a1ed701f3328cc33f63b2848a88f283833941e
SHA2568e42dd6df5de1042e0b5c6ef203699c86b9f3b5d373e9db5d7e2fb7bf786c43c
SHA512747bc15dd5525744bb4c840ff1fa58ac56e7c4b22669eb4d47086a9dd4c7a24772d9d0a58c5f69753f711401ab465d8e27108970ee90bb9ef17ccc4fe258262f
-
Filesize
824KB
MD525349911e45206c38fb3c4c39dae3a3a
SHA1c6a1ed701f3328cc33f63b2848a88f283833941e
SHA2568e42dd6df5de1042e0b5c6ef203699c86b9f3b5d373e9db5d7e2fb7bf786c43c
SHA512747bc15dd5525744bb4c840ff1fa58ac56e7c4b22669eb4d47086a9dd4c7a24772d9d0a58c5f69753f711401ab465d8e27108970ee90bb9ef17ccc4fe258262f
-
Filesize
824KB
MD525349911e45206c38fb3c4c39dae3a3a
SHA1c6a1ed701f3328cc33f63b2848a88f283833941e
SHA2568e42dd6df5de1042e0b5c6ef203699c86b9f3b5d373e9db5d7e2fb7bf786c43c
SHA512747bc15dd5525744bb4c840ff1fa58ac56e7c4b22669eb4d47086a9dd4c7a24772d9d0a58c5f69753f711401ab465d8e27108970ee90bb9ef17ccc4fe258262f