Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/02/2025, 22:29
250226-2epdjsvygx 1026/02/2025, 21:48
250226-1nyg5stzdt 1021/02/2025, 20:45
250221-zjsweszqar 10Analysis
-
max time kernel
719s -
max time network
720s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 22:29
Behavioral task
behavioral1
Sample
brain.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
brain.exe
Resource
win10v2004-20250217-en
General
-
Target
brain.exe
-
Size
147KB
-
MD5
448f1796fe8de02194b21c0715e0a5f6
-
SHA1
935c0b39837319fda571aa800b67d997b79c3198
-
SHA256
eb82946fa0de261e92f8f60aa878c9fef9ebb34fdababa66995403b110118b12
-
SHA512
0b93b2c881b1351ff688089abf12bbfcff279c5d6ca8733d6d821c83148d73c85cfedf5ab5bc02c2145970124b518551db3a9fc701d8084f01009ae20f71a831
-
SSDEEP
3072:l6glyuxE4GsUPnliByocWep0yjEJ3hDRMK89nB2:l6gDBGpvEByocWeebbMjV4
Malware Config
Extracted
C:\sYMY1N6ah.README.txt
braincipher
http://mybmtbgd7aprdnw2ekxht5qap5daam2wch25coqerrq2zdioanob34ad.onion
Signatures
-
Brain Cipher
Ransomware family based on Lockbit that was first observed in June 2024.
-
Braincipher family
-
Deletes itself 1 IoCs
pid Process 2128 D836.tmp -
Executes dropped EXE 1 IoCs
pid Process 2128 D836.tmp -
Loads dropped DLL 1 IoCs
pid Process 2316 brain.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini brain.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini brain.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2316 brain.exe 2316 brain.exe 2316 brain.exe 2316 brain.exe 2128 D836.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D836.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2316 brain.exe 2316 brain.exe 2316 brain.exe 2316 brain.exe 2316 brain.exe 2316 brain.exe 2316 brain.exe 2316 brain.exe 2316 brain.exe 2316 brain.exe 2316 brain.exe 2316 brain.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp 2128 D836.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeDebugPrivilege 2316 brain.exe Token: 36 2316 brain.exe Token: SeImpersonatePrivilege 2316 brain.exe Token: SeIncBasePriorityPrivilege 2316 brain.exe Token: SeIncreaseQuotaPrivilege 2316 brain.exe Token: 33 2316 brain.exe Token: SeManageVolumePrivilege 2316 brain.exe Token: SeProfSingleProcessPrivilege 2316 brain.exe Token: SeRestorePrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSystemProfilePrivilege 2316 brain.exe Token: SeTakeOwnershipPrivilege 2316 brain.exe Token: SeShutdownPrivilege 2316 brain.exe Token: SeDebugPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeBackupPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe Token: SeSecurityPrivilege 2316 brain.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2128 2316 brain.exe 32 PID 2316 wrote to memory of 2128 2316 brain.exe 32 PID 2316 wrote to memory of 2128 2316 brain.exe 32 PID 2316 wrote to memory of 2128 2316 brain.exe 32 PID 2316 wrote to memory of 2128 2316 brain.exe 32 PID 2128 wrote to memory of 1924 2128 D836.tmp 33 PID 2128 wrote to memory of 1924 2128 D836.tmp 33 PID 2128 wrote to memory of 1924 2128 D836.tmp 33 PID 2128 wrote to memory of 1924 2128 D836.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\brain.exe"C:\Users\Admin\AppData\Local\Temp\brain.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\ProgramData\D836.tmp"C:\ProgramData\D836.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\D836.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:2252
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\EnableCheckpoint.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD50858b98a82d66ba9be9043b922cf60a4
SHA10b8d47678da998df1f8db46d62c562a1c57e6dc5
SHA256fcbc42819af7d30427e46192006ca264d1ffa67b4bd029d5f4cf24e3848c186b
SHA512554b0d8b86e0434edf39444d702a826b505cd16b85af05d8da8a2842f6884c2782f1c46bc12f6c16b042ccadbba21197fb11f4cf6c141343e0051d7cb91243ed
-
Filesize
147KB
MD507e7cd9e2b9c7030ca6af3bcaaea718b
SHA1ad8c28991aab6b73ff74e8948ecfea9d1e2c5bf0
SHA25673c1ade4196b4bfa28cc724b6758e909e5deae351e2b84c79dd7e57a5802dc2d
SHA512e2d4d6f9df2fd5df59ceb6e6f3418c2b0b43e4a9e9f5c0c5492d1cb80bb9217cb51af70932d406d5daa0673d0cca521bbff47e31a5215f3d449f08f62e1a4bed
-
Filesize
1KB
MD5deb2e0756d331362d57ad9fe408c4ff3
SHA1870865aad7c7cccafbca0c1f50f7eecaedbd4bf1
SHA2561ddacee1d25936970279557169037a335b362f86c3797ded625d68077bd0145c
SHA512e218624d2704517a358df0dfb794116bbeed3ad81daae8c07d5d969e61e7936ed043911008f4816d663de373fd23515219c8038dd22e5838af7df1678a0134a6
-
Filesize
129B
MD52085613b67019b35e650eebf7573beee
SHA1e81dd0350af13cabc88b23b70b120fe2ed36f3ba
SHA2561240693bbdd872ea21b36933de311c8c6453ea6b7b2320f48910b9ae41681b67
SHA512bc9552308cca89ea8e3ed99b15acb09b058e575d670d9efb17710c307796cb4ffb21fff4877333e79c79b64652eb15b9609721a6a8d71846b3c3055974fd5956
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf