Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 14:34 UTC
Behavioral task
behavioral1
Sample
ba1bae585d31cc86d1ac1b36b6022ad97b6af45922c8edf609e0ce656090a5c5.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ba1bae585d31cc86d1ac1b36b6022ad97b6af45922c8edf609e0ce656090a5c5.dll
Resource
win10v2004-20230831-en
General
-
Target
ba1bae585d31cc86d1ac1b36b6022ad97b6af45922c8edf609e0ce656090a5c5.dll
-
Size
2.6MB
-
MD5
1efe4082d5b71e8dbfb6f82f18174770
-
SHA1
1deb9b094611a1ce8d674de8fd084f75fddd7442
-
SHA256
ba1bae585d31cc86d1ac1b36b6022ad97b6af45922c8edf609e0ce656090a5c5
-
SHA512
0ecf85655ddecb499c8e560fbc362199ac1e81c5960e966fb7b30ce6b54f5434d5c1188e20bf761254500b62639747c001f9169f8ac30fb956e9b46c2993485b
-
SSDEEP
49152:ueFQHevutBDJbCBW6YmSPeZwB0Vd1KscNL218oNdHHt6ZMczoOUTw9UwU/I+eLRh:uee+vutFBCBW6tZwBu1KsiL218edn0+Z
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/4988-4-0x0000000002710000-0x0000000002735000-memory.dmp family_blackmoon -
Blocklisted process makes network request 2 IoCs
flow pid Process 31 4988 rundll32.exe 34 4988 rundll32.exe -
resource yara_rule behavioral2/memory/4988-0-0x0000000074DD0000-0x00000000752CD000-memory.dmp upx behavioral2/memory/4988-26-0x0000000074DD0000-0x00000000752CD000-memory.dmp upx behavioral2/memory/4988-38-0x0000000074DD0000-0x00000000752CD000-memory.dmp upx behavioral2/memory/4988-39-0x0000000074DD0000-0x00000000752CD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-528036852-1341495193-1175965888-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe 4988 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4292 wrote to memory of 4988 4292 rundll32.exe 85 PID 4292 wrote to memory of 4988 4292 rundll32.exe 85 PID 4292 wrote to memory of 4988 4292 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ba1bae585d31cc86d1ac1b36b6022ad97b6af45922c8edf609e0ce656090a5c5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ba1bae585d31cc86d1ac1b36b6022ad97b6af45922c8edf609e0ce656090a5c5.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=fea4abcea7554cc4ae680d26c30b3f8f&localId=w:72CCEFCF-1E8B-80FF-8FEE-BB12795B20EA&deviceId=6966549482693208&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=fea4abcea7554cc4ae680d26c30b3f8f&localId=w:72CCEFCF-1E8B-80FF-8FEE-BB12795B20EA&deviceId=6966549482693208&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=3D40F853643D6D5A06FEEBD165976C30; domain=.bing.com; expires=Sat, 28-Sep-2024 14:34:30 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: EEFE673F235140048EC9976B458C6C95 Ref B: DUS30EDGE0817 Ref C: 2023-09-04T14:34:30Z
date: Mon, 04 Sep 2023 14:34:30 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=fea4abcea7554cc4ae680d26c30b3f8f&localId=w:72CCEFCF-1E8B-80FF-8FEE-BB12795B20EA&deviceId=6966549482693208&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=fea4abcea7554cc4ae680d26c30b3f8f&localId=w:72CCEFCF-1E8B-80FF-8FEE-BB12795B20EA&deviceId=6966549482693208&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=3D40F853643D6D5A06FEEBD165976C30
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 9A3E49E740B847E4BEECE39172115EF8 Ref B: DUS30EDGE0817 Ref C: 2023-09-04T14:34:30Z
date: Mon, 04 Sep 2023 14:34:30 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=fea4abcea7554cc4ae680d26c30b3f8f&localId=w:72CCEFCF-1E8B-80FF-8FEE-BB12795B20EA&deviceId=6966549482693208&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=fea4abcea7554cc4ae680d26c30b3f8f&localId=w:72CCEFCF-1E8B-80FF-8FEE-BB12795B20EA&deviceId=6966549482693208&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=3D40F853643D6D5A06FEEBD165976C30
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F2BB102BDE174E3B9634BD0CCC1B2554 Ref B: DUS30EDGE0817 Ref C: 2023-09-04T14:34:30Z
date: Mon, 04 Sep 2023 14:34:30 GMT
-
Remote address:8.8.8.8:53Request136.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request105.145.253.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request68.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.1.85.104.in-addr.arpaIN PTRResponse198.1.85.104.in-addr.arpaIN PTRa104-85-1-198deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request60.44.125.45.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request4.ipw.cnIN AResponse4.ipw.cnIN A114.132.191.12
-
Remote address:114.132.191.12:80RequestGET /api/ip/myip HTTP/1.1
Connection: Keep-Alive
User-Agent: curl/7.83.1
Host: 4.ipw.cn
ResponseHTTP/1.1 200 OK
Content-Type: application/json;charset=UTF-8
Content-Length: 12
Connection: keep-alive
Access-Control-Allow-Origin: https://ipw.cn
-
Remote address:8.8.8.8:53Request12.191.132.114.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request113.208.253.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.173.189.20.in-addr.arpaIN PTRResponse
-
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=fea4abcea7554cc4ae680d26c30b3f8f&localId=w:72CCEFCF-1E8B-80FF-8FEE-BB12795B20EA&deviceId=6966549482693208&anid=tls, http21.9kB 9.3kB 22 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=fea4abcea7554cc4ae680d26c30b3f8f&localId=w:72CCEFCF-1E8B-80FF-8FEE-BB12795B20EA&deviceId=6966549482693208&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=fea4abcea7554cc4ae680d26c30b3f8f&localId=w:72CCEFCF-1E8B-80FF-8FEE-BB12795B20EA&deviceId=6966549482693208&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=fea4abcea7554cc4ae680d26c30b3f8f&localId=w:72CCEFCF-1E8B-80FF-8FEE-BB12795B20EA&deviceId=6966549482693208&anid=HTTP Response
204 -
1.8kB 600 B 17 14
-
370 B 415 B 6 5
HTTP Request
GET http://4.ipw.cn/api/ip/myipHTTP Response
200
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
72 B 158 B 1 1
DNS Request
136.32.126.40.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
105.145.253.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
68.159.190.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
198.1.85.104.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 125 B 1 1
DNS Request
60.44.125.45.in-addr.arpa
-
54 B 70 B 1 1
DNS Request
4.ipw.cn
DNS Response
114.132.191.12
-
73 B 130 B 1 1
DNS Request
12.191.132.114.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
113.208.253.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.236.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.173.189.20.in-addr.arpa