Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2023, 14:41

General

  • Target

    bokledge4.1.exe

  • Size

    292KB

  • MD5

    500ce28cca98df7f3d40fa8f5e428598

  • SHA1

    83a021883ab8c45b04488074ad5f196dd5bc0de5

  • SHA256

    dc2766f4f8bd2b9b0a2b8fb18426735755ba12ac8e080be1107363305f4c5f5b

  • SHA512

    0a0d6267baad1b5ceec3bd6f8af771456442ea08c3750a0f811dd6bf8281fd66de3e8bdb87a5933dd455af2ab68a795c94a5e0c75e2b6f2b01fd3be207b851b7

  • SSDEEP

    6144:vYa67vB1oNb15mb3SfCt/CE76CQ1vGNJxtkxKKSZvyvB9dSuMwviPnMx5I:vYBvB1Wp8b307NruJnkxqWj4uMVPn/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bokledge4.1.exe
    "C:\Users\Admin\AppData\Local\Temp\bokledge4.1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe
      "C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe" C:\Users\Admin\AppData\Local\Temp\lglfpuxh.i
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe
        "C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 36
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe

    Filesize

    139KB

    MD5

    39e740ff4e6fb6f21830aedff351d66a

    SHA1

    24211bcc5a5caaa5f5fccaa145017cf1266b7e29

    SHA256

    670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

    SHA512

    89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

  • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe

    Filesize

    139KB

    MD5

    39e740ff4e6fb6f21830aedff351d66a

    SHA1

    24211bcc5a5caaa5f5fccaa145017cf1266b7e29

    SHA256

    670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

    SHA512

    89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

  • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe

    Filesize

    139KB

    MD5

    39e740ff4e6fb6f21830aedff351d66a

    SHA1

    24211bcc5a5caaa5f5fccaa145017cf1266b7e29

    SHA256

    670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

    SHA512

    89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

  • C:\Users\Admin\AppData\Local\Temp\lglfpuxh.i

    Filesize

    5KB

    MD5

    b6ff144e77e74f6cdea0365ee31214e7

    SHA1

    50efae8cc2ff6cddf822bd9f330e486cd4252ca8

    SHA256

    614bbeeede1a2ec9afd7ab98e38ed80f807d7b64214c0ab52b900fb055202ce6

    SHA512

    b7303e9e911dbe26f1efe5308b6e537bdfe93427ba4c3494ffdbb7ae1d1779e01ba3386eba13eac7f724e4510e107a619a0977b90514264d99c7de4230402c39

  • C:\Users\Admin\AppData\Local\Temp\slfnfzw.gd

    Filesize

    205KB

    MD5

    3cde900bd825c044f5c2690334fa0f1f

    SHA1

    e0c1a63300eb6cc94940a5eea200b0af8a82c6e5

    SHA256

    f69c5f49d387c16b28ea47a859f83327080d7415cf46354004ac7c6f4976bebe

    SHA512

    28af4f4cde12e2e0d6340a1cb52aa4a1824be05c0549cfe409b0b5ee56233d7a134536650f98475573185679f5aa6dd792ff6f012a1d70a0ca9d4d416324ae61

  • \Users\Admin\AppData\Local\Temp\fmgwqo.exe

    Filesize

    139KB

    MD5

    39e740ff4e6fb6f21830aedff351d66a

    SHA1

    24211bcc5a5caaa5f5fccaa145017cf1266b7e29

    SHA256

    670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

    SHA512

    89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

  • \Users\Admin\AppData\Local\Temp\fmgwqo.exe

    Filesize

    139KB

    MD5

    39e740ff4e6fb6f21830aedff351d66a

    SHA1

    24211bcc5a5caaa5f5fccaa145017cf1266b7e29

    SHA256

    670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

    SHA512

    89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

  • \Users\Admin\AppData\Local\Temp\fmgwqo.exe

    Filesize

    139KB

    MD5

    39e740ff4e6fb6f21830aedff351d66a

    SHA1

    24211bcc5a5caaa5f5fccaa145017cf1266b7e29

    SHA256

    670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

    SHA512

    89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

  • \Users\Admin\AppData\Local\Temp\fmgwqo.exe

    Filesize

    139KB

    MD5

    39e740ff4e6fb6f21830aedff351d66a

    SHA1

    24211bcc5a5caaa5f5fccaa145017cf1266b7e29

    SHA256

    670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

    SHA512

    89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

  • \Users\Admin\AppData\Local\Temp\fmgwqo.exe

    Filesize

    139KB

    MD5

    39e740ff4e6fb6f21830aedff351d66a

    SHA1

    24211bcc5a5caaa5f5fccaa145017cf1266b7e29

    SHA256

    670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

    SHA512

    89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

  • memory/1272-54-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB