Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 08:16
Behavioral task
behavioral1
Sample
8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe
Resource
win7-20230831-en
General
-
Target
8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe
-
Size
4.3MB
-
MD5
6688f23fd6b756717469ea31facca8f8
-
SHA1
4c89521c5a3ad6755a9e32fe000df2afc46466c2
-
SHA256
8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4
-
SHA512
112365eea0021d543911bfac166eee59f842be5c833e54a1ee3417ea4a680f55956e21b97a7673c0648bd137d20534e7497e74495752ebf7bdfbf35d736e9785
-
SSDEEP
98304:JiSKMbPs4ZcvDXGsUgG1/Q/g+ZmiPDC+kAE:DGDZHFg+ZTrnkJ
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/3052-4-0x0000000002AB0000-0x0000000002B64000-memory.dmp family_blackmoon behavioral1/memory/3052-20-0x0000000002AB0000-0x0000000002B64000-memory.dmp family_blackmoon -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe 3052 8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe"C:\Users\Admin\AppData\Local\Temp\8941ffa46a44576cc8d19430d38e1d5b9a53291175830c3ce5e4bf367475eec4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3052
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111B
MD5750d1e62d281091d5120890a82eb2542
SHA1159dbe6b56d8f9fd6457d4c3f4d5bdcd58078c28
SHA256e478f0b3c195f14daaf4982550f0d68ca64f12588ee993c9d1644effc095233e
SHA512100497c5d8d05fdff91a905f6836597131f4b3bda303f6e63b7ab894b9a5da1a77320357ce8fb56237ca6f966fc60153df2a3ab7ed0924ec3f15ff8b580daa5e