Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

16/05/2023, 16:19

230516-ts1dzabe96 3

16/05/2023, 13:14

230516-qgxl6aaa21 3

16/05/2023, 13:08

230516-qdfjgahh9x 3

Analysis

  • max time kernel
    76s
  • max time network
    69s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/05/2023, 13:14

General

  • Target

    Bleu.exe

  • Size

    6.2MB

  • MD5

    8d9304e583f4e09bc979a4329e1725f3

  • SHA1

    03e07b90c49d3121f0cf321fcb702d852584220d

  • SHA256

    bde1e449eaaab9d9edb719d8eb4c915f57e2576abe4a227bcdfd9f8c1312437a

  • SHA512

    a03b496d5d43221051a52b960188a35cce1b6bb38535ceff9ff5ad414fd3a42c35cbcb23397c693608379e1e8b11c1a89835f5524b04716ee4760b5b171f1550

  • SSDEEP

    196608:c1iUw7KYRI8FIIIWNSiU6+bQiyNzDbbB:c1i5HFIIp9Qh+zF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bleu.exe
    "C:\Users\Admin\AppData\Local\Temp\Bleu.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1308

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1308-121-0x0000000000270000-0x00000000008B0000-memory.dmp

    Filesize

    6.2MB

  • memory/1308-122-0x0000000005850000-0x0000000005D4E000-memory.dmp

    Filesize

    5.0MB

  • memory/1308-123-0x0000000005270000-0x0000000005302000-memory.dmp

    Filesize

    584KB

  • memory/1308-124-0x0000000005490000-0x00000000054A0000-memory.dmp

    Filesize

    64KB

  • memory/1308-125-0x0000000005240000-0x000000000524A000-memory.dmp

    Filesize

    40KB

  • memory/1308-126-0x0000000005490000-0x00000000054A0000-memory.dmp

    Filesize

    64KB

  • memory/1308-127-0x0000000005490000-0x00000000054A0000-memory.dmp

    Filesize

    64KB

  • memory/1308-128-0x0000000005490000-0x00000000054A0000-memory.dmp

    Filesize

    64KB

  • memory/1308-134-0x0000000005490000-0x00000000054A0000-memory.dmp

    Filesize

    64KB

  • memory/1308-138-0x0000000005490000-0x00000000054A0000-memory.dmp

    Filesize

    64KB

  • memory/1308-139-0x0000000005490000-0x00000000054A0000-memory.dmp

    Filesize

    64KB

  • memory/1308-140-0x0000000005490000-0x00000000054A0000-memory.dmp

    Filesize

    64KB

  • memory/1308-141-0x000000000B8F0000-0x000000000C096000-memory.dmp

    Filesize

    7.6MB