Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe
Resource
win7-20221111-en
9 signatures
150 seconds
General
-
Target
f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe
-
Size
4.5MB
-
MD5
5029e522685735a64b2144d1bc055341
-
SHA1
d18eabb20553c040cb3ec59a5973cf1e22cb044a
-
SHA256
f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a
-
SHA512
9173b50738149ec003399465448dcfed27fc8478efa3c1ec862bdfe07a5ff16f2a380d31a6f71926cc3120d4cea028c6475d04244f5ef8717dbb91cae939fc1d
-
SSDEEP
98304:eL3EGbtU6AMHA+dZ+voSBkG9rYtgRu6h9sx6KHm8XyTXhGG3:Sv4Mg+d4wEkuBp9sx6mmTFGG
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/memory/1476-132-0x0000000000400000-0x0000000000F0E000-memory.dmp family_blackmoon behavioral2/memory/1476-133-0x0000000000400000-0x0000000000F0E000-memory.dmp family_blackmoon behavioral2/memory/1476-146-0x0000000000400000-0x0000000000F0E000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/1476-136-0x0000000002F30000-0x0000000002F53000-memory.dmp upx behavioral2/memory/1476-138-0x0000000002F30000-0x0000000002F53000-memory.dmp upx behavioral2/memory/1476-139-0x0000000002F30000-0x0000000002F53000-memory.dmp upx behavioral2/memory/1476-140-0x0000000002FA0000-0x0000000002FC3000-memory.dmp upx behavioral2/memory/1476-142-0x0000000002FA0000-0x0000000002FC3000-memory.dmp upx behavioral2/memory/1476-143-0x0000000002FA0000-0x0000000002FC3000-memory.dmp upx behavioral2/memory/1476-144-0x0000000002F30000-0x0000000002F53000-memory.dmp upx behavioral2/memory/1476-145-0x0000000002FA0000-0x0000000002FC3000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBIOSVersion f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBIOSDate f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe Token: SeDebugPrivilege 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe Token: SeDebugPrivilege 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe Token: SeDebugPrivilege 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe 1476 f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe"C:\Users\Admin\AppData\Local\Temp\f679337d58f6c263914e5bc75985240a29694e590d4d791322a652fcbd36140a.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1476