Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 20:00

General

  • Target

    323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe

  • Size

    355KB

  • MD5

    dfd66b395c4f6b6e3b317c87af46ab14

  • SHA1

    e01be7f31115b7056525834584c11698d659f60d

  • SHA256

    323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a

  • SHA512

    8c53a31ac833e2c7f26af01abe4bfd602768c04e269db55010f833946588504bab4a6943bf7b49b70fa33ff84227507858f56854b00368323ed7f870546d669a

  • SSDEEP

    6144:/qvk3Q5ibjnNuuXckaL7pbRBkce97aw/N4L7oQ:/qvMQ5ibjnwka3pbRC19Gw/NsoQ

Score
10/10

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe
    "C:\Users\Admin\AppData\Local\Temp\323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\AppData\Local\Temp\Systemjmuot.exe
      "C:\Users\Admin\AppData\Local\Temp\Systemjmuot.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fpath.ini

    Filesize

    102B

    MD5

    064a8d51c507884ea1899b30dff325aa

    SHA1

    72771a500214c0e399a96a8245c44e628b9f2a0c

    SHA256

    7eed1c50ed4b04a2103a8e6ac7d00dcda9f831182031cd5999e0139ea6a9b058

    SHA512

    6ee33e6b36de2d1a0513fe8d98d1668b8393ecaf8ef3ef1b316f67b7d5a214e139a0561c0618b2df7d6309c6ec1771b4aedb31286876e89c5f02b69180ec4dd7

  • \Users\Admin\AppData\Local\Temp\Systemjmuot.exe

    Filesize

    355KB

    MD5

    58a8a932113c11cd620b38e48dfcadf4

    SHA1

    31aebbe34621419283738f1235b06e59504e6ca2

    SHA256

    f22ae78941d46aad24c69005dc75370da3195033325ccc57d1aa06d267e4714f

    SHA512

    af3b3b2173abc8ec84239e7661d61679a2a7b751bd7707685262eaea1ea8fb79dc73772a8b833879e3524b7fa4f25daacfb0698348335cc38f5b2d99169c6cff