Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/11/2024, 12:17

241113-pgf4qs1mdz 10

13/11/2024, 12:17

241113-pf2n2s1mds 10

Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/11/2024, 12:17

General

  • Target

    babylockerkz.exe

  • Size

    624KB

  • MD5

    84b88ac81e4872ff3bf15c72f431d101

  • SHA1

    0823d067541de16325e5454a91b57262365a0705

  • SHA256

    4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6

  • SHA512

    185691b0103669c5aa25b22c36f29ddb66f074e0f2e3ae6a36ed8917c35f1fba71fba65c11c3211ce64f6c5919ac879ce0fdcc4dddae420cbecf40711dff1860

  • SSDEEP

    12288:V4eCA30wfnlxvaUwZNf6qYID7ZJuIQOsknZh20QyCkje0ZM7qgbGKTO7muYpralU:3C8valgsDyfSBKXyMUkW2LILGBm3IzPB

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\babylockerkz.exe
    "C:\Users\Admin\AppData\Local\Temp\babylockerkz.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "& { }"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2784
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 116
      2⤵
      • Program crash
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2784-2-0x0000000073911000-0x0000000073912000-memory.dmp

    Filesize

    4KB

  • memory/2784-3-0x0000000073910000-0x0000000073EBB000-memory.dmp

    Filesize

    5.7MB

  • memory/2784-4-0x0000000073910000-0x0000000073EBB000-memory.dmp

    Filesize

    5.7MB

  • memory/2784-5-0x0000000073910000-0x0000000073EBB000-memory.dmp

    Filesize

    5.7MB

  • memory/2784-6-0x0000000073910000-0x0000000073EBB000-memory.dmp

    Filesize

    5.7MB