Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 15:42
Behavioral task
behavioral1
Sample
blum_complete_edition.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
blum_complete_edition.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
blum_complete_edition.pyc
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
blum_complete_edition.pyc
Resource
win10v2004-20240226-en
General
-
Target
blum_complete_edition.exe
-
Size
63.2MB
-
MD5
f16acd7f170eef74a788cb74476bbba5
-
SHA1
6c65f9630f3387057431245ef37f01ec11cc556d
-
SHA256
8665b6743466fb1771aaefb404ca2d0db0840bd7eb7ce2a999a64df906d4a587
-
SHA512
810d9e8daf911122324574629a76e2da02e8b26d5164bef2651e7fd33333a60c737c897560f9e54b3e5448b2ad15512bc20498e301617ffe593d7486bd0e0c85
-
SSDEEP
1572864:tFP/V4f6Gj53ikjt4jRq2GqFOPV5aiIJ2qHWB75iVwSG5cW7I8:tt/VG6RmtCRlGPrwJ2qHO5iVwSMc
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1216 blum_complete_edition.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1216 2352 blum_complete_edition.exe 29 PID 2352 wrote to memory of 1216 2352 blum_complete_edition.exe 29 PID 2352 wrote to memory of 1216 2352 blum_complete_edition.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe"C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe"C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe"2⤵
- Loads dropped DLL
PID:1216
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2064
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723