Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 05:59

General

  • Target

    f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe

  • Size

    144KB

  • MD5

    761cd905a105ac82309b786901e0a019

  • SHA1

    2db7b0a846968a4c29f61b20167c443819c2c2c8

  • SHA256

    f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa

  • SHA512

    9a543092e7549867aa489d3abd7cdb504bc56eb9b55dd5b444b81810d7c16e8df077ed3d72463132ffdf0bdec704f48d7ce8af171dbea58b8a05e7b1e051650d

  • SSDEEP

    1536:qiUQf1OdalnaYJy8PNigFfaGZp78lbcuZ/+J0g:qiUmOEdvTNVfaGZp78lwuUWg

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Unexpected DNS network traffic destination 4 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe
    "C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe
      "C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1296
      • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
        "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\f02a398bdbcaa0339158daf18d7104006fb25090fadf3d56f387a85723f902aa.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
          "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1304
          • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe
            "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"
            5⤵
              PID:520

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

      Filesize

      144KB

      MD5

      e7fc0103683f2b1630f7f4845df742d2

      SHA1

      bf98e142407710ab19272cbc9824bbab94df06f3

      SHA256

      15f6fcfd1937b4f095d017cf8e065cbb395ab3c68fa04325a14f1d4ce5562323

      SHA512

      7df0586ca17b5e9318051299f5ca35a5ad24f205a765dadf26c35e13fbee792d0b054038a0734da15b258268d09b444e92f9440caa561aa89add3ac30d88f782

    • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

      Filesize

      144KB

      MD5

      e7fc0103683f2b1630f7f4845df742d2

      SHA1

      bf98e142407710ab19272cbc9824bbab94df06f3

      SHA256

      15f6fcfd1937b4f095d017cf8e065cbb395ab3c68fa04325a14f1d4ce5562323

      SHA512

      7df0586ca17b5e9318051299f5ca35a5ad24f205a765dadf26c35e13fbee792d0b054038a0734da15b258268d09b444e92f9440caa561aa89add3ac30d88f782

    • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

      Filesize

      144KB

      MD5

      e7fc0103683f2b1630f7f4845df742d2

      SHA1

      bf98e142407710ab19272cbc9824bbab94df06f3

      SHA256

      15f6fcfd1937b4f095d017cf8e065cbb395ab3c68fa04325a14f1d4ce5562323

      SHA512

      7df0586ca17b5e9318051299f5ca35a5ad24f205a765dadf26c35e13fbee792d0b054038a0734da15b258268d09b444e92f9440caa561aa89add3ac30d88f782

    • \Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

      Filesize

      144KB

      MD5

      e7fc0103683f2b1630f7f4845df742d2

      SHA1

      bf98e142407710ab19272cbc9824bbab94df06f3

      SHA256

      15f6fcfd1937b4f095d017cf8e065cbb395ab3c68fa04325a14f1d4ce5562323

      SHA512

      7df0586ca17b5e9318051299f5ca35a5ad24f205a765dadf26c35e13fbee792d0b054038a0734da15b258268d09b444e92f9440caa561aa89add3ac30d88f782

    • \Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

      Filesize

      144KB

      MD5

      e7fc0103683f2b1630f7f4845df742d2

      SHA1

      bf98e142407710ab19272cbc9824bbab94df06f3

      SHA256

      15f6fcfd1937b4f095d017cf8e065cbb395ab3c68fa04325a14f1d4ce5562323

      SHA512

      7df0586ca17b5e9318051299f5ca35a5ad24f205a765dadf26c35e13fbee792d0b054038a0734da15b258268d09b444e92f9440caa561aa89add3ac30d88f782

    • memory/1296-56-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1296-60-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1296-59-0x00000000761F1000-0x00000000761F3000-memory.dmp

      Filesize

      8KB

    • memory/1296-74-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1296-78-0x0000000074751000-0x0000000074753000-memory.dmp

      Filesize

      8KB

    • memory/1296-79-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1304-77-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB