Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 20:00
Behavioral task
behavioral1
Sample
323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe
Resource
win7-20240215-en
General
-
Target
323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe
-
Size
355KB
-
MD5
dfd66b395c4f6b6e3b317c87af46ab14
-
SHA1
e01be7f31115b7056525834584c11698d659f60d
-
SHA256
323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a
-
SHA512
8c53a31ac833e2c7f26af01abe4bfd602768c04e269db55010f833946588504bab4a6943bf7b49b70fa33ff84227507858f56854b00368323ed7f870546d669a
-
SSDEEP
6144:/qvk3Q5ibjnNuuXckaL7pbRBkce97aw/N4L7oQ:/qvMQ5ibjnwka3pbRC19Gw/NsoQ
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000013ab9-7.dat family_blackmoon -
Deletes itself 1 IoCs
pid Process 2496 Systemjmuot.exe -
Executes dropped EXE 1 IoCs
pid Process 2496 Systemjmuot.exe -
Loads dropped DLL 2 IoCs
pid Process 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe 2496 Systemjmuot.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2496 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 29 PID 2660 wrote to memory of 2496 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 29 PID 2660 wrote to memory of 2496 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 29 PID 2660 wrote to memory of 2496 2660 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe"C:\Users\Admin\AppData\Local\Temp\323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Systemjmuot.exe"C:\Users\Admin\AppData\Local\Temp\Systemjmuot.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5064a8d51c507884ea1899b30dff325aa
SHA172771a500214c0e399a96a8245c44e628b9f2a0c
SHA2567eed1c50ed4b04a2103a8e6ac7d00dcda9f831182031cd5999e0139ea6a9b058
SHA5126ee33e6b36de2d1a0513fe8d98d1668b8393ecaf8ef3ef1b316f67b7d5a214e139a0561c0618b2df7d6309c6ec1771b4aedb31286876e89c5f02b69180ec4dd7
-
Filesize
355KB
MD558a8a932113c11cd620b38e48dfcadf4
SHA131aebbe34621419283738f1235b06e59504e6ca2
SHA256f22ae78941d46aad24c69005dc75370da3195033325ccc57d1aa06d267e4714f
SHA512af3b3b2173abc8ec84239e7661d61679a2a7b751bd7707685262eaea1ea8fb79dc73772a8b833879e3524b7fa4f25daacfb0698348335cc38f5b2d99169c6cff