Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 02:00
Behavioral task
behavioral1
Sample
5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe
Resource
win7-20231129-en
General
-
Target
5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe
-
Size
1.8MB
-
MD5
e62c8dd01651b0b125bc1cf30e99cd73
-
SHA1
5b9ee6c9f8f39a110427976c313d563d6dbb61f5
-
SHA256
5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3
-
SHA512
d0bce64422386facffef52f5086ed8b380735133d8d45d7b664f50d481171c8c3b654025959963877c3d57ce5272b4542aef3f15ccbfa72681d0f8a3af3fb2d0
-
SSDEEP
24576:HfqMeY3QBhoWYJgIDWAeTkzZ+RkFN/yKBUZZAFDrrqBh3SWgSklWXKBUZq:HneXoWS5ZRN/yKiZEDrKBST1WXKiZq
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/3204-0-0x0000000000400000-0x0000000000602000-memory.dmp family_blackmoon behavioral2/files/0x000e000000023153-3.dat family_blackmoon behavioral2/memory/3204-5-0x0000000000400000-0x0000000000602000-memory.dmp family_blackmoon behavioral2/memory/744-20-0x0000000000400000-0x0000000000602000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 744 EJAO.QLR -
Loads dropped DLL 2 IoCs
pid Process 744 EJAO.QLR 744 EJAO.QLR -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ESPI11.dll EJAO.QLR File opened for modification C:\Windows\SysWOW64\ESPI11.dll EJAO.QLR -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR 744 EJAO.QLR -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3204 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 3204 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 744 EJAO.QLR 744 EJAO.QLR -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3204 wrote to memory of 744 3204 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 86 PID 3204 wrote to memory of 744 3204 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 86 PID 3204 wrote to memory of 744 3204 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 86 PID 744 wrote to memory of 2008 744 EJAO.QLR 91 PID 744 wrote to memory of 2008 744 EJAO.QLR 91 PID 744 wrote to memory of 2008 744 EJAO.QLR 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe"C:\Users\Admin\AppData\Local\Temp\5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\EJAO.QLR"C:\Users\Admin\AppData\Local\Temp\EJAO.QLR"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\netsh.exenetsh winsock reset3⤵PID:2008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5d30c77e0775750ff5e648c610733c232
SHA13ae6799e4211f1c6034d24687e128240abf906e2
SHA256ac0b5e7424f62b3b2803575a2847f8a5679301691351f8f2efd57c45aed3c656
SHA512122cb4ee010cd00b333ef9a3186563eac3b824a84ed500fd19ef8109285da90c1fd0710e55f5dba72771b464338d5dff17a24718008da279455b69f7ff4cc07d
-
Filesize
120KB
MD5c3adbb35a05b44bc877a895d273aa270
SHA18afe20d8261d217fd23ccfe53bd45ad3bec82d2d
SHA256b2b2ea9737587313d420bde96a42063c002a83e35d9f987f8ec0d5d4d96c262c
SHA512614dc24e3368047d68e2833ecdf9cda1f5ef290fc74287769a70df46bfa937386ce2e1332b3bada0f7e54b470ecdfe7c8bbd4ec3fa1c815f52993bb7edb93afc