Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 08:27
Behavioral task
behavioral1
Sample
60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe
Resource
win7-20230831-en
11 signatures
150 seconds
General
-
Target
60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe
-
Size
1.9MB
-
MD5
d0e343541a4de59af20e512b9a31deda
-
SHA1
534c89486fdd1ef1a30d5e01b4b5e4e159462405
-
SHA256
60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98
-
SHA512
748e7a6e18416fe5d37c140479e26f156e43200297600cce97970d909b954e4ae4751326d67d2d1decdc144ef6242bdd34971b2b72f0597981354e856efe6ee4
-
SSDEEP
49152:rGZ6AR0vIkbpHDZk3nMWLcHphCZ3YLq+WLLP:SZ6/wkbtS3nZaTM3YLLWL
Malware Config
Signatures
-
Detect Blackmoon payload 6 IoCs
resource yara_rule behavioral2/memory/4216-1-0x0000000000800000-0x0000000000A5D000-memory.dmp family_blackmoon behavioral2/memory/4216-2-0x0000000000800000-0x0000000000A5D000-memory.dmp family_blackmoon behavioral2/memory/4216-3-0x0000000000800000-0x0000000000A5D000-memory.dmp family_blackmoon behavioral2/memory/4216-5-0x0000000010000000-0x00000000102E4000-memory.dmp family_blackmoon behavioral2/memory/4216-9-0x0000000000800000-0x0000000000A5D000-memory.dmp family_blackmoon behavioral2/memory/4216-10-0x0000000010000000-0x00000000102E4000-memory.dmp family_blackmoon -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
resource yara_rule behavioral2/memory/4216-6-0x0000000010000000-0x00000000102E4000-memory.dmp upx behavioral2/memory/4216-5-0x0000000010000000-0x00000000102E4000-memory.dmp upx behavioral2/memory/4216-10-0x0000000010000000-0x00000000102E4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 4772 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4216 wrote to memory of 4576 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 85 PID 4216 wrote to memory of 4576 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 85 PID 4216 wrote to memory of 4576 4216 60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe 85 PID 4576 wrote to memory of 4772 4576 cmd.exe 87 PID 4576 wrote to memory of 4772 4576 cmd.exe 87 PID 4576 wrote to memory of 4772 4576 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe"C:\Users\Admin\AppData\Local\Temp\60a57ed2becb72c57c00de8ec810eef2d948fcf72c8a4e84dfa9364286ccce98.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:4772
-
-