Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe
Resource
win10v2004-20221111-en
General
-
Target
f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe
-
Size
144KB
-
MD5
761cd905a105ac82309b786901e0a019
-
SHA1
2db7b0a846968a4c29f61b20167c443819c2c2c8
-
SHA256
f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa
-
SHA512
9a543092e7549867aa489d3abd7cdb504bc56eb9b55dd5b444b81810d7c16e8df077ed3d72463132ffdf0bdec704f48d7ce8af171dbea58b8a05e7b1e051650d
-
SSDEEP
1536:qiUQf1OdalnaYJy8PNigFfaGZp78lbcuZ/+J0g:qiUmOEdvTNVfaGZp78lwuUWg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1532 BCSSync.exe 1304 BCSSync.exe -
Loads dropped DLL 2 IoCs
pid Process 1296 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 1296 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 46.28.107.10 Destination IP 46.28.107.10 Destination IP 46.28.107.10 Destination IP 46.28.107.10 -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\8k2o44.com f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe File created C:\Windows\SysWOW64\8k2o44.com.b f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1496 set thread context of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1532 set thread context of 1304 1532 BCSSync.exe 29 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe.b f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1304 BCSSync.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 1532 BCSSync.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1496 wrote to memory of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1496 wrote to memory of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1496 wrote to memory of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1496 wrote to memory of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1496 wrote to memory of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1496 wrote to memory of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1496 wrote to memory of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1496 wrote to memory of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1496 wrote to memory of 1296 1496 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 27 PID 1296 wrote to memory of 1532 1296 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 28 PID 1296 wrote to memory of 1532 1296 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 28 PID 1296 wrote to memory of 1532 1296 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 28 PID 1296 wrote to memory of 1532 1296 f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe 28 PID 1532 wrote to memory of 1304 1532 BCSSync.exe 29 PID 1532 wrote to memory of 1304 1532 BCSSync.exe 29 PID 1532 wrote to memory of 1304 1532 BCSSync.exe 29 PID 1532 wrote to memory of 1304 1532 BCSSync.exe 29 PID 1532 wrote to memory of 1304 1532 BCSSync.exe 29 PID 1532 wrote to memory of 1304 1532 BCSSync.exe 29 PID 1532 wrote to memory of 1304 1532 BCSSync.exe 29 PID 1532 wrote to memory of 1304 1532 BCSSync.exe 29 PID 1532 wrote to memory of 1304 1532 BCSSync.exe 29 PID 1532 wrote to memory of 1304 1532 BCSSync.exe 29 PID 1304 wrote to memory of 520 1304 BCSSync.exe 30 PID 1304 wrote to memory of 520 1304 BCSSync.exe 30 PID 1304 wrote to memory of 520 1304 BCSSync.exe 30 PID 1304 wrote to memory of 520 1304 BCSSync.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe"C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe"C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"5⤵PID:520
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5e7fc0103683f2b1630f7f4845df742d2
SHA1bf98e142407710ab19272cbc9824bbab94df06f3
SHA25615f6fcfd1937b4f095d017cf8e065cbb395ab3c68fa04325a14f1d4ce5562323
SHA5127df0586ca17b5e9318051299f5ca35a5ad24f205a765dadf26c35e13fbee792d0b054038a0734da15b258268d09b444e92f9440caa561aa89add3ac30d88f782
-
Filesize
144KB
MD5e7fc0103683f2b1630f7f4845df742d2
SHA1bf98e142407710ab19272cbc9824bbab94df06f3
SHA25615f6fcfd1937b4f095d017cf8e065cbb395ab3c68fa04325a14f1d4ce5562323
SHA5127df0586ca17b5e9318051299f5ca35a5ad24f205a765dadf26c35e13fbee792d0b054038a0734da15b258268d09b444e92f9440caa561aa89add3ac30d88f782
-
Filesize
144KB
MD5e7fc0103683f2b1630f7f4845df742d2
SHA1bf98e142407710ab19272cbc9824bbab94df06f3
SHA25615f6fcfd1937b4f095d017cf8e065cbb395ab3c68fa04325a14f1d4ce5562323
SHA5127df0586ca17b5e9318051299f5ca35a5ad24f205a765dadf26c35e13fbee792d0b054038a0734da15b258268d09b444e92f9440caa561aa89add3ac30d88f782
-
Filesize
144KB
MD5e7fc0103683f2b1630f7f4845df742d2
SHA1bf98e142407710ab19272cbc9824bbab94df06f3
SHA25615f6fcfd1937b4f095d017cf8e065cbb395ab3c68fa04325a14f1d4ce5562323
SHA5127df0586ca17b5e9318051299f5ca35a5ad24f205a765dadf26c35e13fbee792d0b054038a0734da15b258268d09b444e92f9440caa561aa89add3ac30d88f782
-
Filesize
144KB
MD5e7fc0103683f2b1630f7f4845df742d2
SHA1bf98e142407710ab19272cbc9824bbab94df06f3
SHA25615f6fcfd1937b4f095d017cf8e065cbb395ab3c68fa04325a14f1d4ce5562323
SHA5127df0586ca17b5e9318051299f5ca35a5ad24f205a765dadf26c35e13fbee792d0b054038a0734da15b258268d09b444e92f9440caa561aa89add3ac30d88f782