Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    163s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 09:34

General

  • Target

    051a75f91d68a31a77134c030776ee50edc26b8a6e993ab8a06dc2eea8f66ecc.exe

  • Size

    10.0MB

  • MD5

    3e2e351dcc7ec78da876800db3ffe62c

  • SHA1

    fa8b4e6dd410855855175a1fb0b34790ddcaad31

  • SHA256

    051a75f91d68a31a77134c030776ee50edc26b8a6e993ab8a06dc2eea8f66ecc

  • SHA512

    c2338fcbfb09d5ec546332e08b39977ba9236182582e41467151708258fcbc92865cd5bc75e2f7313d6642e92b4369a4291c4bd619e91e6f2ce6a8ec329683a4

  • SSDEEP

    196608:zYnf1sfEKWUGNEoiN/A4scYomKDJdd7slXhM6syktUqtECQ7:Unf1IpGNvcYFKidGdtECQ7

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 6 IoCs
  • Program crash 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\051a75f91d68a31a77134c030776ee50edc26b8a6e993ab8a06dc2eea8f66ecc.exe
    "C:\Users\Admin\AppData\Local\Temp\051a75f91d68a31a77134c030776ee50edc26b8a6e993ab8a06dc2eea8f66ecc.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4936
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 1592
      2⤵
      • Program crash
      PID:4404
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 1620
      2⤵
      • Program crash
      PID:1568
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 1604
      2⤵
      • Program crash
      PID:2304
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4936 -ip 4936
    1⤵
      PID:1880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4936 -ip 4936
      1⤵
        PID:4144
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4936 -ip 4936
        1⤵
          PID:4372

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4936-0-0x0000000000400000-0x0000000000927000-memory.dmp

          Filesize

          5.2MB

        • memory/4936-1-0x0000000000400000-0x0000000000927000-memory.dmp

          Filesize

          5.2MB

        • memory/4936-2-0x0000000000400000-0x0000000000927000-memory.dmp

          Filesize

          5.2MB

        • memory/4936-3-0x0000000000400000-0x0000000000927000-memory.dmp

          Filesize

          5.2MB

        • memory/4936-4-0x0000000000400000-0x0000000000927000-memory.dmp

          Filesize

          5.2MB

        • memory/4936-8-0x0000000000400000-0x0000000000927000-memory.dmp

          Filesize

          5.2MB

        • memory/4936-9-0x0000000000400000-0x0000000000927000-memory.dmp

          Filesize

          5.2MB

        • memory/4936-12-0x0000000003B40000-0x0000000003B41000-memory.dmp

          Filesize

          4KB

        • memory/4936-13-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/4936-14-0x0000000003FE0000-0x0000000003FE1000-memory.dmp

          Filesize

          4KB

        • memory/4936-15-0x0000000000400000-0x0000000000927000-memory.dmp

          Filesize

          5.2MB