Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    123s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 05:45

General

  • Target

    cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe

  • Size

    1.4MB

  • MD5

    f069af3bf6f9bc95b863ef6520c482cb

  • SHA1

    ad6b1a78b2c29fc33585c7a8e714fc60825be268

  • SHA256

    cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d

  • SHA512

    8d37e7bb797047ce6b1ad6998ea0e4fb515be153ac3a5608b1da8e2bd318f549764d564509b15c964ab8fa31fb92ccb02424ad7891100b669f34eb1ff45f7ba0

  • SSDEEP

    24576:nG5MAvRLUD9S0mgqDvn7UwOEhVQw0Ogp1O9y2XX2rHwECF4:GXYM0mgqDDcw0pgyK2Xw

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe
    "C:\Users\Admin\AppData\Local\Temp\cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.3gri.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:308
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6023ff6d5101b18ed04779c05801ea3f

    SHA1

    94f052c5f1fce26737195b079b1efbb3d5333964

    SHA256

    db96443ed070aa7d88c0d43be79f7d95360d967472db6d9a048509074c145eb0

    SHA512

    f15ef4fd7b4f21532bae6215f49ff797a6b68025dc5c9d791756230a4150d89ce8c9df62d4e1a4caed17510aaf590f6aafea1fe39af3727a76aa865fd1284730

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XB6YKGN8\M0Q5HNYT.htm

    Filesize

    151KB

    MD5

    2f7006618d7de2ad307a1048c4cf4f90

    SHA1

    f8b7280bead96e54823b3ffd123a3bbb2ae1a26f

    SHA256

    715dadd2e46242949e27c77e13c8999f41ee3b18450a4f3ee329476b97a04c9c

    SHA512

    100df74b5c7dbb5648c10b5e462d47707a849a87b6be5259ec7606050326a7756d004423ed4d81f13285220e77ac02caccf4f947645bb9767982e8bd4d3ee05b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JFTSKV4I.txt

    Filesize

    603B

    MD5

    3353535336b917e029c9ef4989835e1e

    SHA1

    cf2d7c7d3584720569542747adf4f4606331b767

    SHA256

    28eec2e1a824605e047cb9c442aadf855f6e70d81cc3e56296eb3e9bd9039116

    SHA512

    b73cd2ee0e2aaf113f27865ae42353b9512995f7c6703fb18dc013494defcafd217499af121623efdeafe49eb15985a22d9a326a086212c961872b3dce935403

  • memory/896-54-0x0000000075E31000-0x0000000075E33000-memory.dmp

    Filesize

    8KB

  • memory/896-55-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/896-57-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/896-58-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/896-59-0x0000000000400000-0x000000000075C000-memory.dmp

    Filesize

    3.4MB

  • memory/896-60-0x00000000002F0000-0x00000000002F8000-memory.dmp

    Filesize

    32KB

  • memory/896-61-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/896-62-0x0000000000400000-0x000000000075C000-memory.dmp

    Filesize

    3.4MB