Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21/09/2023, 04:07
Behavioral task
behavioral1
Sample
682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe
Resource
win7-20230831-en
8 signatures
150 seconds
General
-
Target
682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe
-
Size
4.5MB
-
MD5
0253defb4a7362f5ceeae2445e59c2de
-
SHA1
76d3878a1652b26ef64bd8c40bda0000da5d6e26
-
SHA256
682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952
-
SHA512
7a2dbea2251ac96f2285c03e56657a961511414ac588c38972908df92a93b7df43016aebc9699ed826bc265f5bb7467f851f39041375fa7fefbd2f9cb887706d
-
SSDEEP
49152:aNQwUH5rvvgLDiwnHvRcIuz53wJWqr2NO61Ai2oB9Kgk6EaXtgjMdHCX0l0AlAvq:aOt5r3uNvCIgE2NBSiLKwESgjMxS8
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2972-3-0x0000000000400000-0x00000000008B7000-memory.dmp family_blackmoon behavioral1/memory/2972-4-0x0000000000400000-0x00000000008B7000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/2972-0-0x0000000010000000-0x0000000010019000-memory.dmp upx behavioral1/memory/2972-2-0x0000000010000000-0x0000000010019000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dult.dll 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2580 2972 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2972 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2972 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe 2972 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2580 2972 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe 28 PID 2972 wrote to memory of 2580 2972 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe 28 PID 2972 wrote to memory of 2580 2972 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe 28 PID 2972 wrote to memory of 2580 2972 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe"C:\Users\Admin\AppData\Local\Temp\682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 3642⤵
- Program crash
PID:2580
-