Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 06:32
Behavioral task
behavioral1
Sample
64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe
Resource
win7-20230712-en
8 signatures
150 seconds
General
-
Target
64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe
-
Size
15.7MB
-
MD5
7bbc0c9ffe49bcbd02b28e21d92fb691
-
SHA1
7bed808549afcbfa3147cfbca3bef39fa5ba7438
-
SHA256
64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7
-
SHA512
ad21fa69e11df687ea7fdd9c5757c760265f44102f9356741694792bde993062a75efef204e00c2910bf9b105f921ed69c21250ff9e7ac9617113c0dbb342515
-
SSDEEP
196608:7Pr/SXRLQc3F5Rq056oCvnc5mv/T3MM38rj+Ao6J4277FKPiEkWcuZENeMm7BtoC:7Dag0v5mv/IWmaf5+7aCZuy4M/UXz7B
Malware Config
Signatures
-
Detect Blackmoon payload 8 IoCs
resource yara_rule behavioral2/memory/4276-2-0x0000000000400000-0x00000000013F8000-memory.dmp family_blackmoon behavioral2/memory/4276-1-0x0000000000400000-0x00000000013F8000-memory.dmp family_blackmoon behavioral2/memory/4276-6-0x0000000000400000-0x00000000013F8000-memory.dmp family_blackmoon behavioral2/memory/4276-12-0x0000000000400000-0x00000000013F8000-memory.dmp family_blackmoon behavioral2/memory/4276-48-0x0000000000400000-0x00000000013F8000-memory.dmp family_blackmoon behavioral2/memory/4276-49-0x0000000000400000-0x00000000013F8000-memory.dmp family_blackmoon behavioral2/memory/4276-50-0x0000000000400000-0x00000000013F8000-memory.dmp family_blackmoon behavioral2/memory/4276-51-0x0000000000400000-0x00000000013F8000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/4276-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4276-52-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe Token: SeDebugPrivilege 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe 4276 64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe"C:\Users\Admin\AppData\Local\Temp\64ecd1dbfc6ffc762ccd413d10e6348db80794ce5e8baa6b87ef25480207d1c7.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4276