Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
205s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe
Resource
win10v2004-20221111-en
General
-
Target
4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe
-
Size
841KB
-
MD5
cf47ee9f9d6fb14dd856308505c3229c
-
SHA1
1701e546ec25237b5890d05f4a4d90dfc2c4b7ac
-
SHA256
4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb
-
SHA512
ecdbaba1320167bd2113f77a29d9c95f9c3680cd71a3f32fd41238eff0741b3964540655e0dcb9ace508966807839d3f2edb04d81749920dfb2c4967538d8b55
-
SSDEEP
24576:70MdxO63Kc5PTgIfQQAnOsRJo0swQTtNGRPo:70QxO63p90IYQiOL025U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5080 bsprotection.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run bsprotection.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\bsprotection.exe" bsprotection.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: bsprotection.exe File opened (read-only) \??\E: bsprotection.exe File opened (read-only) \??\F: bsprotection.exe File opened (read-only) \??\H: bsprotection.exe File opened (read-only) \??\J: bsprotection.exe File opened (read-only) \??\K: bsprotection.exe File opened (read-only) \??\R: bsprotection.exe File opened (read-only) \??\T: bsprotection.exe File opened (read-only) \??\X: bsprotection.exe File opened (read-only) \??\G: bsprotection.exe File opened (read-only) \??\M: bsprotection.exe File opened (read-only) \??\O: bsprotection.exe File opened (read-only) \??\P: bsprotection.exe File opened (read-only) \??\W: bsprotection.exe File opened (read-only) \??\Y: bsprotection.exe File opened (read-only) \??\I: bsprotection.exe File opened (read-only) \??\L: bsprotection.exe File opened (read-only) \??\N: bsprotection.exe File opened (read-only) \??\Q: bsprotection.exe File opened (read-only) \??\S: bsprotection.exe File opened (read-only) \??\U: bsprotection.exe File opened (read-only) \??\Z: bsprotection.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 bsprotection.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 8 IoCs
pid pid_target Process procid_target 3992 5080 WerFault.exe 81 4992 5080 WerFault.exe 81 2420 5080 WerFault.exe 81 1768 5080 WerFault.exe 81 2124 5080 WerFault.exe 81 2532 5080 WerFault.exe 81 2536 5080 WerFault.exe 81 4328 5080 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3564 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 3564 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 5080 bsprotection.exe 5080 bsprotection.exe 5080 bsprotection.exe 5080 bsprotection.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3564 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 5080 bsprotection.exe 5080 bsprotection.exe 5080 bsprotection.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5080 bsprotection.exe 5080 bsprotection.exe 5080 bsprotection.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5080 bsprotection.exe 5080 bsprotection.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3564 wrote to memory of 5080 3564 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 81 PID 3564 wrote to memory of 5080 3564 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 81 PID 3564 wrote to memory of 5080 3564 4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe"C:\Users\Admin\AppData\Local\Temp\4dd2e1457151f0fd690d3710cf1f5fd932cf87e7141ded39f4e8aad72f02aecb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\ProgramData\bsprotection.exeC:\ProgramData\bsprotection.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 7443⤵
- Program crash
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 11203⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 11683⤵
- Program crash
PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 12603⤵
- Program crash
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 12963⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 13043⤵
- Program crash
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 13243⤵
- Program crash
PID:2536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 13723⤵
- Program crash
PID:4328
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5080 -ip 50801⤵PID:1848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 5080 -ip 50801⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5080 -ip 50801⤵PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 5080 -ip 50801⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5080 -ip 50801⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5080 -ip 50801⤵PID:532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5080 -ip 50801⤵PID:1328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5080 -ip 50801⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5080 -ip 50801⤵PID:4256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824KB
MD525349911e45206c38fb3c4c39dae3a3a
SHA1c6a1ed701f3328cc33f63b2848a88f283833941e
SHA2568e42dd6df5de1042e0b5c6ef203699c86b9f3b5d373e9db5d7e2fb7bf786c43c
SHA512747bc15dd5525744bb4c840ff1fa58ac56e7c4b22669eb4d47086a9dd4c7a24772d9d0a58c5f69753f711401ab465d8e27108970ee90bb9ef17ccc4fe258262f
-
Filesize
824KB
MD525349911e45206c38fb3c4c39dae3a3a
SHA1c6a1ed701f3328cc33f63b2848a88f283833941e
SHA2568e42dd6df5de1042e0b5c6ef203699c86b9f3b5d373e9db5d7e2fb7bf786c43c
SHA512747bc15dd5525744bb4c840ff1fa58ac56e7c4b22669eb4d47086a9dd4c7a24772d9d0a58c5f69753f711401ab465d8e27108970ee90bb9ef17ccc4fe258262f