Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
167s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 20:00
Behavioral task
behavioral1
Sample
323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe
Resource
win7-20240215-en
General
-
Target
323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe
-
Size
355KB
-
MD5
dfd66b395c4f6b6e3b317c87af46ab14
-
SHA1
e01be7f31115b7056525834584c11698d659f60d
-
SHA256
323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a
-
SHA512
8c53a31ac833e2c7f26af01abe4bfd602768c04e269db55010f833946588504bab4a6943bf7b49b70fa33ff84227507858f56854b00368323ed7f870546d669a
-
SSDEEP
6144:/qvk3Q5ibjnNuuXckaL7pbRBkce97aw/N4L7oQ:/qvMQ5ibjnwka3pbRC19Gw/NsoQ
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023260-8.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe -
Deletes itself 1 IoCs
pid Process 4440 Systemwoxpw.exe -
Executes dropped EXE 1 IoCs
pid Process 4440 Systemwoxpw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe 4440 Systemwoxpw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3328 wrote to memory of 4440 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 103 PID 3328 wrote to memory of 4440 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 103 PID 3328 wrote to memory of 4440 3328 323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe"C:\Users\Admin\AppData\Local\Temp\323875be6f0aefa4f97ecf1c68cb227af0a85d5ad3e457e53621c4b1c64c8c7a.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\Systemwoxpw.exe"C:\Users\Admin\AppData\Local\Temp\Systemwoxpw.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5248 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:3180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5c582d29aec1b4442b59440738df50028
SHA186bd17a7f49effbb1cea3edabb50eaec6645ff18
SHA2561415dd1f829eee24097bcb88532eb4a69cb22aeecbdba84997b5d9352054a95d
SHA5123566ce80bde22df8ba61f11d53fdd616209e6374a761ee8b1c165817e5828355a934528d7b627c19c533b1222459b464790781638f7446b63b509c8541905a81
-
Filesize
102B
MD5064a8d51c507884ea1899b30dff325aa
SHA172771a500214c0e399a96a8245c44e628b9f2a0c
SHA2567eed1c50ed4b04a2103a8e6ac7d00dcda9f831182031cd5999e0139ea6a9b058
SHA5126ee33e6b36de2d1a0513fe8d98d1668b8393ecaf8ef3ef1b316f67b7d5a214e139a0561c0618b2df7d6309c6ec1771b4aedb31286876e89c5f02b69180ec4dd7