Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15/02/2023, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
bokledge4.1.exe
Resource
win7-20220901-en
General
-
Target
bokledge4.1.exe
-
Size
292KB
-
MD5
500ce28cca98df7f3d40fa8f5e428598
-
SHA1
83a021883ab8c45b04488074ad5f196dd5bc0de5
-
SHA256
dc2766f4f8bd2b9b0a2b8fb18426735755ba12ac8e080be1107363305f4c5f5b
-
SHA512
0a0d6267baad1b5ceec3bd6f8af771456442ea08c3750a0f811dd6bf8281fd66de3e8bdb87a5933dd455af2ab68a795c94a5e0c75e2b6f2b01fd3be207b851b7
-
SSDEEP
6144:vYa67vB1oNb15mb3SfCt/CE76CQ1vGNJxtkxKKSZvyvB9dSuMwviPnMx5I:vYBvB1Wp8b307NruJnkxqWj4uMVPn/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1328 fmgwqo.exe 1064 fmgwqo.exe -
Loads dropped DLL 5 IoCs
pid Process 1272 bokledge4.1.exe 1328 fmgwqo.exe 1268 WerFault.exe 1268 WerFault.exe 1268 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1328 set thread context of 1064 1328 fmgwqo.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1268 1064 WerFault.exe 28 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1328 fmgwqo.exe 1328 fmgwqo.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1272 wrote to memory of 1328 1272 bokledge4.1.exe 27 PID 1272 wrote to memory of 1328 1272 bokledge4.1.exe 27 PID 1272 wrote to memory of 1328 1272 bokledge4.1.exe 27 PID 1272 wrote to memory of 1328 1272 bokledge4.1.exe 27 PID 1328 wrote to memory of 1064 1328 fmgwqo.exe 28 PID 1328 wrote to memory of 1064 1328 fmgwqo.exe 28 PID 1328 wrote to memory of 1064 1328 fmgwqo.exe 28 PID 1328 wrote to memory of 1064 1328 fmgwqo.exe 28 PID 1328 wrote to memory of 1064 1328 fmgwqo.exe 28 PID 1064 wrote to memory of 1268 1064 fmgwqo.exe 29 PID 1064 wrote to memory of 1268 1064 fmgwqo.exe 29 PID 1064 wrote to memory of 1268 1064 fmgwqo.exe 29 PID 1064 wrote to memory of 1268 1064 fmgwqo.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bokledge4.1.exe"C:\Users\Admin\AppData\Local\Temp\bokledge4.1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe"C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe" C:\Users\Admin\AppData\Local\Temp\lglfpuxh.i2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe"C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 364⤵
- Loads dropped DLL
- Program crash
PID:1268
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD539e740ff4e6fb6f21830aedff351d66a
SHA124211bcc5a5caaa5f5fccaa145017cf1266b7e29
SHA256670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37
SHA51289489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e
-
Filesize
139KB
MD539e740ff4e6fb6f21830aedff351d66a
SHA124211bcc5a5caaa5f5fccaa145017cf1266b7e29
SHA256670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37
SHA51289489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e
-
Filesize
139KB
MD539e740ff4e6fb6f21830aedff351d66a
SHA124211bcc5a5caaa5f5fccaa145017cf1266b7e29
SHA256670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37
SHA51289489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e
-
Filesize
5KB
MD5b6ff144e77e74f6cdea0365ee31214e7
SHA150efae8cc2ff6cddf822bd9f330e486cd4252ca8
SHA256614bbeeede1a2ec9afd7ab98e38ed80f807d7b64214c0ab52b900fb055202ce6
SHA512b7303e9e911dbe26f1efe5308b6e537bdfe93427ba4c3494ffdbb7ae1d1779e01ba3386eba13eac7f724e4510e107a619a0977b90514264d99c7de4230402c39
-
Filesize
205KB
MD53cde900bd825c044f5c2690334fa0f1f
SHA1e0c1a63300eb6cc94940a5eea200b0af8a82c6e5
SHA256f69c5f49d387c16b28ea47a859f83327080d7415cf46354004ac7c6f4976bebe
SHA51228af4f4cde12e2e0d6340a1cb52aa4a1824be05c0549cfe409b0b5ee56233d7a134536650f98475573185679f5aa6dd792ff6f012a1d70a0ca9d4d416324ae61
-
Filesize
139KB
MD539e740ff4e6fb6f21830aedff351d66a
SHA124211bcc5a5caaa5f5fccaa145017cf1266b7e29
SHA256670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37
SHA51289489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e
-
Filesize
139KB
MD539e740ff4e6fb6f21830aedff351d66a
SHA124211bcc5a5caaa5f5fccaa145017cf1266b7e29
SHA256670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37
SHA51289489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e
-
Filesize
139KB
MD539e740ff4e6fb6f21830aedff351d66a
SHA124211bcc5a5caaa5f5fccaa145017cf1266b7e29
SHA256670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37
SHA51289489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e
-
Filesize
139KB
MD539e740ff4e6fb6f21830aedff351d66a
SHA124211bcc5a5caaa5f5fccaa145017cf1266b7e29
SHA256670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37
SHA51289489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e
-
Filesize
139KB
MD539e740ff4e6fb6f21830aedff351d66a
SHA124211bcc5a5caaa5f5fccaa145017cf1266b7e29
SHA256670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37
SHA51289489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e