Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
5s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 09:19
Behavioral task
behavioral1
Sample
d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe
Resource
win7-20230831-en
General
-
Target
d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe
-
Size
5.8MB
-
MD5
e08015604f562f1409440fec6a32b1f8
-
SHA1
f84afe3ff4bf4e463a881ab1e92de37e23d3a0b9
-
SHA256
d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a
-
SHA512
dda10ce2ba42e22032065942b03f51fd1d2f96247ad09725d1de10c8e3eebead7a5d1e9b40813c08830bb88beec0ff18496a9e00a0fc0cb2f5e27b61ef7b0f51
-
SSDEEP
98304:FLcFdRkuo92IMlQnbVIPzf83ouM3z7JYnGrxMy+FY9i3voKziPDC+kAECq4:F0dRdo929MxMfaoN6ILgjmrnkJ6
Malware Config
Signatures
-
Detect Blackmoon payload 7 IoCs
resource yara_rule behavioral2/memory/4680-9-0x0000000000400000-0x00000000009F8000-memory.dmp family_blackmoon behavioral2/memory/4680-10-0x0000000000400000-0x00000000009F8000-memory.dmp family_blackmoon behavioral2/memory/4680-12-0x0000000000400000-0x00000000009F8000-memory.dmp family_blackmoon behavioral2/memory/3280-17-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral2/memory/3280-19-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral2/memory/3280-26-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral2/memory/4680-386-0x0000000000400000-0x00000000009F8000-memory.dmp family_blackmoon -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\libcurl.dll d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4188 set thread context of 4680 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 94 PID 4188 set thread context of 3280 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 95 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 4680 dllhst3g.exe 4680 dllhst3g.exe 4680 dllhst3g.exe 4680 dllhst3g.exe 3280 RdpSaUacHelper.exe 3280 RdpSaUacHelper.exe 3280 RdpSaUacHelper.exe 3280 RdpSaUacHelper.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 4680 dllhst3g.exe 3280 RdpSaUacHelper.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4188 wrote to memory of 4788 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 86 PID 4188 wrote to memory of 4788 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 86 PID 4188 wrote to memory of 4788 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 86 PID 4188 wrote to memory of 3252 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 87 PID 4188 wrote to memory of 3252 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 87 PID 4188 wrote to memory of 3252 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 87 PID 4188 wrote to memory of 2092 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 88 PID 4188 wrote to memory of 2092 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 88 PID 4188 wrote to memory of 2092 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 88 PID 4188 wrote to memory of 3728 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 89 PID 4188 wrote to memory of 3728 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 89 PID 4188 wrote to memory of 3728 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 89 PID 4188 wrote to memory of 4692 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 90 PID 4188 wrote to memory of 4692 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 90 PID 4188 wrote to memory of 4692 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 90 PID 4188 wrote to memory of 4564 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 91 PID 4188 wrote to memory of 4564 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 91 PID 4188 wrote to memory of 4564 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 91 PID 4188 wrote to memory of 5092 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 92 PID 4188 wrote to memory of 5092 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 92 PID 4188 wrote to memory of 5092 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 92 PID 4188 wrote to memory of 1852 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 93 PID 4188 wrote to memory of 1852 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 93 PID 4188 wrote to memory of 1852 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 93 PID 4188 wrote to memory of 4680 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 94 PID 4188 wrote to memory of 4680 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 94 PID 4188 wrote to memory of 4680 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 94 PID 4188 wrote to memory of 4680 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 94 PID 4188 wrote to memory of 4680 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 94 PID 4188 wrote to memory of 4680 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 94 PID 4188 wrote to memory of 4680 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 94 PID 4188 wrote to memory of 4680 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 94 PID 4188 wrote to memory of 4680 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 94 PID 4188 wrote to memory of 3280 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 95 PID 4188 wrote to memory of 3280 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 95 PID 4188 wrote to memory of 3280 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 95 PID 4188 wrote to memory of 3280 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 95 PID 4188 wrote to memory of 3280 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 95 PID 4188 wrote to memory of 3280 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 95 PID 4188 wrote to memory of 3280 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 95 PID 4188 wrote to memory of 3280 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 95 PID 4188 wrote to memory of 3280 4188 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe"C:\Users\Admin\AppData\Local\Temp\d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\sfc.exesfc.exe2⤵PID:4788
-
-
C:\Windows\SysWOW64\auditpol.exeauditpol.exe2⤵PID:3252
-
-
C:\Windows\SysWOW64\mcbuilder.exemcbuilder.exe2⤵PID:2092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe2⤵PID:3728
-
-
C:\Windows\SysWOW64\cttune.execttune.exe2⤵PID:4692
-
-
C:\Windows\SysWOW64\write.exewrite.exe2⤵PID:4564
-
-
C:\Windows\SysWOW64\curl.execurl.exe2⤵PID:5092
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32.exe2⤵PID:1852
-
-
C:\Windows\SysWOW64\dllhst3g.exedllhst3g.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4680
-
-
C:\Windows\SysWOW64\RdpSaUacHelper.exeRdpSaUacHelper.exe Mzeasst2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3280
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260B
MD548cf4e6b553dbc5432b14476bd096bed
SHA16a98f5b0e385a7188c367c326665b1d88dd2c641
SHA2560e4fa0074803f18390697bcc03a4b88a42dbbfdef8698003a9e2d27b6d39306a
SHA51245273ba55ae6f5d3e7bb2532464ad9bd9418643db99866540fb7773994f814a581ba450cf6aa56a60b8a05f8311516062f218f691805d00180da8d1d5cdadb50
-
Filesize
213B
MD530d33686e7db5f692d64977a6fdfddd9
SHA19db3ff86dc705e7bebec29dfd9e871ca8d20ec23
SHA2568b4ead3c39bd85793ea400410d902cf8759e9a0bc6b3519cebb73e76db13449a
SHA512eb4348c01bdb685b038edc861254af926ea98bf625fdedd5615eb703777668f344862381f28389bdb26a0d42fa40501431a6d16afa389d488d1eca568366a312