Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/02/2025, 22:29
250226-2epdjsvygx 1026/02/2025, 21:48
250226-1nyg5stzdt 1021/02/2025, 20:45
250221-zjsweszqar 10Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 21:48
Behavioral task
behavioral1
Sample
brain.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
brain.exe
Resource
win10v2004-20250217-en
General
-
Target
brain.exe
-
Size
147KB
-
MD5
448f1796fe8de02194b21c0715e0a5f6
-
SHA1
935c0b39837319fda571aa800b67d997b79c3198
-
SHA256
eb82946fa0de261e92f8f60aa878c9fef9ebb34fdababa66995403b110118b12
-
SHA512
0b93b2c881b1351ff688089abf12bbfcff279c5d6ca8733d6d821c83148d73c85cfedf5ab5bc02c2145970124b518551db3a9fc701d8084f01009ae20f71a831
-
SSDEEP
3072:l6glyuxE4GsUPnliByocWep0yjEJ3hDRMK89nB2:l6gDBGpvEByocWeebbMjV4
Malware Config
Extracted
C:\sYMY1N6ah.README.txt
braincipher
http://mybmtbgd7aprdnw2ekxht5qap5daam2wch25coqerrq2zdioanob34ad.onion
Signatures
-
Brain Cipher
Ransomware family based on Lockbit that was first observed in June 2024.
-
Braincipher family
-
Deletes itself 1 IoCs
pid Process 2968 D7E8.tmp -
Executes dropped EXE 1 IoCs
pid Process 2968 D7E8.tmp -
Loads dropped DLL 1 IoCs
pid Process 2552 brain.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini brain.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini brain.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2552 brain.exe 2552 brain.exe 2552 brain.exe 2552 brain.exe 2968 D7E8.tmp -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D7E8.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2552 brain.exe 2552 brain.exe 2552 brain.exe 2552 brain.exe 2552 brain.exe 2552 brain.exe 2552 brain.exe 2552 brain.exe 2552 brain.exe 2552 brain.exe 2552 brain.exe 2552 brain.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp 2968 D7E8.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeDebugPrivilege 2552 brain.exe Token: 36 2552 brain.exe Token: SeImpersonatePrivilege 2552 brain.exe Token: SeIncBasePriorityPrivilege 2552 brain.exe Token: SeIncreaseQuotaPrivilege 2552 brain.exe Token: 33 2552 brain.exe Token: SeManageVolumePrivilege 2552 brain.exe Token: SeProfSingleProcessPrivilege 2552 brain.exe Token: SeRestorePrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSystemProfilePrivilege 2552 brain.exe Token: SeTakeOwnershipPrivilege 2552 brain.exe Token: SeShutdownPrivilege 2552 brain.exe Token: SeDebugPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeBackupPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe Token: SeSecurityPrivilege 2552 brain.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2968 2552 brain.exe 33 PID 2552 wrote to memory of 2968 2552 brain.exe 33 PID 2552 wrote to memory of 2968 2552 brain.exe 33 PID 2552 wrote to memory of 2968 2552 brain.exe 33 PID 2552 wrote to memory of 2968 2552 brain.exe 33 PID 2968 wrote to memory of 2172 2968 D7E8.tmp 34 PID 2968 wrote to memory of 2172 2968 D7E8.tmp 34 PID 2968 wrote to memory of 2172 2968 D7E8.tmp 34 PID 2968 wrote to memory of 2172 2968 D7E8.tmp 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\brain.exe"C:\Users\Admin\AppData\Local\Temp\brain.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\ProgramData\D7E8.tmp"C:\ProgramData\D7E8.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\D7E8.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD57fc1744d93ddf0c154b67f2cc1d36f25
SHA17e6f93c414036b340b4b1a3f74c413b0bc632f95
SHA256118d622680c0fcdb315e40bcd9d0de57fe73b518639d689ade3bf4b996a72c4b
SHA51297dd845d38ed3e694e57deb651fd42b7ffad9923ee2ec3c084784638b0a1f88dadb8fd882c811fe00722e971e04389fa7e5c21da56d92f63775112514b3254aa
-
Filesize
147KB
MD5f1a3da0c7f215b7a76eaf162f2d9b2ee
SHA146b7b8378b77a8c00019dda4ac5d96b2c1852e25
SHA256e1dad2bbadbdef5173cd776b5e223b078d5ae1ee225ae33193b9c638b9b55021
SHA512392431e1ba1b4d93756481cd6ae953e5f8a64f962e5aa4b00a8cd959cfb0b9e0e920726b2c37eda5f016d0c4cb7b75920a16003fd34629295850fbec4869fc9c
-
Filesize
1KB
MD5deb2e0756d331362d57ad9fe408c4ff3
SHA1870865aad7c7cccafbca0c1f50f7eecaedbd4bf1
SHA2561ddacee1d25936970279557169037a335b362f86c3797ded625d68077bd0145c
SHA512e218624d2704517a358df0dfb794116bbeed3ad81daae8c07d5d969e61e7936ed043911008f4816d663de373fd23515219c8038dd22e5838af7df1678a0134a6
-
Filesize
129B
MD52a10f59f365024c637609f9393473108
SHA1575eb5090ac97c12eb7a60e842db953088aa32b8
SHA256e5a5bf4cd39992ad48442cd699d20ed1355c4c2a961dfc52c62986c3e7653e0f
SHA512fc80eec67e93ddffe0d39065e977235f37fa1db768ac47645f02a5886764a23b21bb960ce731ddf10032ef5805a26ed19fc72057700a99375d520f5f9fc81746
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf