Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/11/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
babylockerkz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
babylockerkz.exe
Resource
win10v2004-20241007-en
General
-
Target
babylockerkz.exe
-
Size
624KB
-
MD5
84b88ac81e4872ff3bf15c72f431d101
-
SHA1
0823d067541de16325e5454a91b57262365a0705
-
SHA256
4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6
-
SHA512
185691b0103669c5aa25b22c36f29ddb66f074e0f2e3ae6a36ed8917c35f1fba71fba65c11c3211ce64f6c5919ac879ce0fdcc4dddae420cbecf40711dff1860
-
SSDEEP
12288:V4eCA30wfnlxvaUwZNf6qYID7ZJuIQOsknZh20QyCkje0ZM7qgbGKTO7muYpralU:3C8valgsDyfSBKXyMUkW2LILGBm3IzPB
Malware Config
Signatures
-
pid Process 2784 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2896 2696 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language babylockerkz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2784 2696 babylockerkz.exe 31 PID 2696 wrote to memory of 2784 2696 babylockerkz.exe 31 PID 2696 wrote to memory of 2784 2696 babylockerkz.exe 31 PID 2696 wrote to memory of 2784 2696 babylockerkz.exe 31 PID 2696 wrote to memory of 2896 2696 babylockerkz.exe 33 PID 2696 wrote to memory of 2896 2696 babylockerkz.exe 33 PID 2696 wrote to memory of 2896 2696 babylockerkz.exe 33 PID 2696 wrote to memory of 2896 2696 babylockerkz.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\babylockerkz.exe"C:\Users\Admin\AppData\Local\Temp\babylockerkz.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { }"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 1162⤵
- Program crash
PID:2896
-