Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10unpacme/Bllfgyszs.exe
windows7-x64
10unpacme/Bllfgyszs.exe
windows10-2004-x64
10unpacme/Ne...on.dll
windows7-x64
1unpacme/Ne...on.dll
windows10-2004-x64
1unpacme/Xg...nb.dll
windows7-x64
1unpacme/Xg...nb.dll
windows10-2004-x64
1unpacme/_.dll
windows7-x64
1unpacme/_.dll
windows10-2004-x64
1unpacme/test.exe
windows7-x64
6unpacme/test.exe
windows10-2004-x64
6Analysis
-
max time kernel
42s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/01/2023, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
unpacme/Bllfgyszs.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
unpacme/Bllfgyszs.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
unpacme/Newtonsoft.Json.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
unpacme/Newtonsoft.Json.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
unpacme/Xgibxdxqilgiamhhnb.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
unpacme/Xgibxdxqilgiamhhnb.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
unpacme/_.dll
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
unpacme/_.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
unpacme/test.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
unpacme/test.exe
Resource
win10v2004-20221111-en
General
-
Target
unpacme/Bllfgyszs.exe
-
Size
1.2MB
-
MD5
b4bb8d5ebcafb7cc2681e17e3596649a
-
SHA1
cd7c93d59b53b54e8a3e24e065c9cc93c7101b79
-
SHA256
87e33a27066d4638c3aede2ef053462b8c48395de0dd8fc4087299628ff8e0fa
-
SHA512
9b4edd0cd365ca3d88ba786b258cad7310f8abe5d46dc261edc593fdf4a5a74e05c58d3ff1b7d3b76d10ef9890252d877e6a84212de08ab08018dcf3f06064b3
-
SSDEEP
24576:DBgfiF9Ctf4HCV6eQ3cfDmDjbSZ+/HAjZdMcj6Isc/:Db0tf4e6aDmDfgJbMcD/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Hpyjpn\\Ogtnuzcwp.exe\"," Bllfgyszs.exe -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1552-54-0x0000000000350000-0x0000000000492000-memory.dmp net_reactor -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1552 set thread context of 1984 1552 Bllfgyszs.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1552 Bllfgyszs.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 1984 InstallUtil.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1108 1552 Bllfgyszs.exe 28 PID 1552 wrote to memory of 1108 1552 Bllfgyszs.exe 28 PID 1552 wrote to memory of 1108 1552 Bllfgyszs.exe 28 PID 1552 wrote to memory of 1108 1552 Bllfgyszs.exe 28 PID 1108 wrote to memory of 2000 1108 cmd.exe 30 PID 1108 wrote to memory of 2000 1108 cmd.exe 30 PID 1108 wrote to memory of 2000 1108 cmd.exe 30 PID 1108 wrote to memory of 2000 1108 cmd.exe 30 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31 PID 1552 wrote to memory of 1984 1552 Bllfgyszs.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\unpacme\Bllfgyszs.exe"C:\Users\Admin\AppData\Local\Temp\unpacme\Bllfgyszs.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1984
-