Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
271s -
max time network
365s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe
Resource
win10v2004-20220812-en
General
-
Target
ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe
-
Size
110KB
-
MD5
3b583c9f616ebe0bf1bdb31c45cce2d3
-
SHA1
2060532701285b62ed897afa7558ec4575e8f01f
-
SHA256
ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e
-
SHA512
c7a59949bad248f815ec3919f3aae44e9b0920fae24e617164124b564aecd78aba672b2de5d5256a8af78612aa2cae02172ebfc5af875a72db3509aa7e6a850d
-
SSDEEP
1536:dTKdhmMFi+lokn0CcuQpuv0Ix0vkHWR8ceQDxeOk:dT8cUi20DuQpKnsMkrBk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1528 BCSSync.exe 364 BCSSync.exe -
Loads dropped DLL 2 IoCs
pid Process 1872 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 1872 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 792 set thread context of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 1528 set thread context of 364 1528 BCSSync.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 792 wrote to memory of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 792 wrote to memory of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 792 wrote to memory of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 792 wrote to memory of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 792 wrote to memory of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 792 wrote to memory of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 792 wrote to memory of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 792 wrote to memory of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 792 wrote to memory of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 792 wrote to memory of 1872 792 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 28 PID 1872 wrote to memory of 1528 1872 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 29 PID 1872 wrote to memory of 1528 1872 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 29 PID 1872 wrote to memory of 1528 1872 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 29 PID 1872 wrote to memory of 1528 1872 ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe 29 PID 1528 wrote to memory of 364 1528 BCSSync.exe 30 PID 1528 wrote to memory of 364 1528 BCSSync.exe 30 PID 1528 wrote to memory of 364 1528 BCSSync.exe 30 PID 1528 wrote to memory of 364 1528 BCSSync.exe 30 PID 1528 wrote to memory of 364 1528 BCSSync.exe 30 PID 1528 wrote to memory of 364 1528 BCSSync.exe 30 PID 1528 wrote to memory of 364 1528 BCSSync.exe 30 PID 1528 wrote to memory of 364 1528 BCSSync.exe 30 PID 1528 wrote to memory of 364 1528 BCSSync.exe 30 PID 1528 wrote to memory of 364 1528 BCSSync.exe 30 PID 364 wrote to memory of 1160 364 BCSSync.exe 31 PID 364 wrote to memory of 1160 364 BCSSync.exe 31 PID 364 wrote to memory of 1160 364 BCSSync.exe 31 PID 364 wrote to memory of 1160 364 BCSSync.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe"C:\Users\Admin\AppData\Local\Temp\ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe"C:\Users\Admin\AppData\Local\Temp\ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe"C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\ad3a51a9582304c3fa5c342ed215c9bf45c252145cc069f43c454c5a200a044e.exe5⤵PID:1160
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
110KB
MD573d1f5c6c299639a03ec8f08bc1d3a17
SHA1f327154a16d8d280d8b1fe64865c4403610a0d56
SHA256e255c7bf30f43ae705ec2aae34eb5721ee4a7293e4845c5c0cae07b0a47daaea
SHA5127a89d1726274aac389da1153c4fad2bd4865c79da05f03c1536746d4f229076f8f52ae4a529af1e2d420a0a7070c863a883eb4ea56f124c0fd18db1e733e19af
-
Filesize
110KB
MD573d1f5c6c299639a03ec8f08bc1d3a17
SHA1f327154a16d8d280d8b1fe64865c4403610a0d56
SHA256e255c7bf30f43ae705ec2aae34eb5721ee4a7293e4845c5c0cae07b0a47daaea
SHA5127a89d1726274aac389da1153c4fad2bd4865c79da05f03c1536746d4f229076f8f52ae4a529af1e2d420a0a7070c863a883eb4ea56f124c0fd18db1e733e19af
-
Filesize
110KB
MD573d1f5c6c299639a03ec8f08bc1d3a17
SHA1f327154a16d8d280d8b1fe64865c4403610a0d56
SHA256e255c7bf30f43ae705ec2aae34eb5721ee4a7293e4845c5c0cae07b0a47daaea
SHA5127a89d1726274aac389da1153c4fad2bd4865c79da05f03c1536746d4f229076f8f52ae4a529af1e2d420a0a7070c863a883eb4ea56f124c0fd18db1e733e19af
-
Filesize
110KB
MD573d1f5c6c299639a03ec8f08bc1d3a17
SHA1f327154a16d8d280d8b1fe64865c4403610a0d56
SHA256e255c7bf30f43ae705ec2aae34eb5721ee4a7293e4845c5c0cae07b0a47daaea
SHA5127a89d1726274aac389da1153c4fad2bd4865c79da05f03c1536746d4f229076f8f52ae4a529af1e2d420a0a7070c863a883eb4ea56f124c0fd18db1e733e19af
-
Filesize
110KB
MD573d1f5c6c299639a03ec8f08bc1d3a17
SHA1f327154a16d8d280d8b1fe64865c4403610a0d56
SHA256e255c7bf30f43ae705ec2aae34eb5721ee4a7293e4845c5c0cae07b0a47daaea
SHA5127a89d1726274aac389da1153c4fad2bd4865c79da05f03c1536746d4f229076f8f52ae4a529af1e2d420a0a7070c863a883eb4ea56f124c0fd18db1e733e19af