Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
176s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 14:55
Behavioral task
behavioral1
Sample
12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de.exe
Resource
win7-20221111-en
7 signatures
150 seconds
General
-
Target
12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de.exe
-
Size
614KB
-
MD5
cb7df596d90826c43af76345742176f4
-
SHA1
2f7922566545feb4ec8446aee509e7a2dece16ae
-
SHA256
12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de
-
SHA512
467581592fd9da2bfe8ed5dbb276fe6779bcc5938db4c480dab7aeb6d32a1eb502b9018fd6c0320a5bf23079eb9f56546b0ef9011b2632a54685f0b6f8aff9dd
-
SSDEEP
12288:ybofM/YK57baXhauW703GH3MfQvUhJLeTruUo:y/X57baXhV32H0NteTrfo
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/4688-132-0x0000000000400000-0x00000000005A9200-memory.dmp family_blackmoon behavioral2/memory/4688-179-0x0000000000400000-0x00000000005A9200-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/4688-132-0x0000000000400000-0x00000000005A9200-memory.dmp upx behavioral2/memory/4688-133-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-135-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-136-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-137-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-138-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-140-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-142-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-144-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-146-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-148-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-150-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-152-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-154-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-156-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-158-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-160-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-162-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-164-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-166-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-168-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-170-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-172-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-174-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-176-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-178-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/4688-179-0x0000000000400000-0x00000000005A9200-memory.dmp upx behavioral2/memory/4688-180-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Program crash 3 IoCs
pid pid_target Process procid_target 2268 4688 WerFault.exe 82 1272 4688 WerFault.exe 82 1216 4688 WerFault.exe 82 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4688 12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de.exe 4688 12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de.exe 4688 12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4688 wrote to memory of 2268 4688 12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de.exe 87 PID 4688 wrote to memory of 2268 4688 12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de.exe 87 PID 4688 wrote to memory of 2268 4688 12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de.exe"C:\Users\Admin\AppData\Local\Temp\12a75c224552d98c859c0d2b993491979dfb4854a0579e6727d98ae07f0270de.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 21402⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 21402⤵
- Program crash
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 21402⤵
- Program crash
PID:1216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4688 -ip 46881⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4688 -ip 46881⤵PID:4364