Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2023, 04:07
Behavioral task
behavioral1
Sample
682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe
Resource
win7-20230831-en
8 signatures
150 seconds
General
-
Target
682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe
-
Size
4.5MB
-
MD5
0253defb4a7362f5ceeae2445e59c2de
-
SHA1
76d3878a1652b26ef64bd8c40bda0000da5d6e26
-
SHA256
682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952
-
SHA512
7a2dbea2251ac96f2285c03e56657a961511414ac588c38972908df92a93b7df43016aebc9699ed826bc265f5bb7467f851f39041375fa7fefbd2f9cb887706d
-
SSDEEP
49152:aNQwUH5rvvgLDiwnHvRcIuz53wJWqr2NO61Ai2oB9Kgk6EaXtgjMdHCX0l0AlAvq:aOt5r3uNvCIgE2NBSiLKwESgjMxS8
Malware Config
Signatures
-
Detect Blackmoon payload 6 IoCs
resource yara_rule behavioral2/memory/3736-3-0x0000000000400000-0x00000000008B7000-memory.dmp family_blackmoon behavioral2/memory/3736-4-0x0000000000400000-0x00000000008B7000-memory.dmp family_blackmoon behavioral2/memory/3736-5-0x0000000000400000-0x00000000008B7000-memory.dmp family_blackmoon behavioral2/memory/3736-6-0x0000000000400000-0x00000000008B7000-memory.dmp family_blackmoon behavioral2/memory/3736-7-0x0000000000400000-0x00000000008B7000-memory.dmp family_blackmoon behavioral2/memory/3736-8-0x0000000000400000-0x00000000008B7000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/3736-1-0x0000000010000000-0x0000000010019000-memory.dmp upx behavioral2/memory/3736-0-0x0000000010000000-0x0000000010019000-memory.dmp upx behavioral2/memory/3736-9-0x0000000010000000-0x0000000010019000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dult.dll 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3740 3736 WerFault.exe 80 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3736 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3736 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe 3736 682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe"C:\Users\Admin\AppData\Local\Temp\682740669d06ed2274d92e01619e3c4aa2de28c39f9720c4085684b6f02a4952.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 7562⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3736 -ip 37361⤵PID:2260