Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 18:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
073dc549aa6aecd244155473c7c1e1ab86c1017276fd022e6f4677f2a80bab9d.exe
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
073dc549aa6aecd244155473c7c1e1ab86c1017276fd022e6f4677f2a80bab9d.exe
-
Size
84KB
-
MD5
07bf44c783963132cb3744ac5fd31141
-
SHA1
1d463822299829abd0183dc3715c33f86ba9f9a9
-
SHA256
073dc549aa6aecd244155473c7c1e1ab86c1017276fd022e6f4677f2a80bab9d
-
SHA512
b32a286ff8949ec97361ccbc536403bd42fd7952f54ccfe1eb19577273d50b9f590689bf83dbc674603e003dda4be090dab9a965e5e78c3979fb3b17a361c6c6
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIgt7WxZKmNDnX77lY8/X5Qgrciv:ymb3NkkiQ3mdBjFIgte0mNb77Bptfr
Malware Config
Signatures
-
Detect Blackmoon payload 7 IoCs
resource yara_rule behavioral1/memory/3056-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3056-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2588-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2568-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1604-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1148-294-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 8 IoCs
resource yara_rule behavioral1/memory/3056-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3056-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2588-35-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1820-67-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2568-90-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2960-106-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1604-232-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1148-294-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
resource yara_rule behavioral1/memory/3056-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1820-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1604-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1148-294-0x0000000000400000-0x0000000000429000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\073dc549aa6aecd244155473c7c1e1ab86c1017276fd022e6f4677f2a80bab9d.exe"C:\Users\Admin\AppData\Local\Temp\073dc549aa6aecd244155473c7c1e1ab86c1017276fd022e6f4677f2a80bab9d.exe"1⤵PID:2356
-
\??\c:\4282828.exec:\4282828.exe1⤵PID:540
-
\??\c:\20286.exec:\20286.exe1⤵PID:924
-
\??\c:\tnbttt.exec:\tnbttt.exe1⤵PID:1972
-
\??\c:\rlfllxx.exec:\rlfllxx.exe2⤵PID:3068
-
\??\c:\bnhnbh.exec:\bnhnbh.exe3⤵PID:3012
-
\??\c:\26884.exec:\26884.exe4⤵PID:2128
-
\??\c:\xrrrxrx.exec:\xrrrxrx.exe5⤵PID:3056
-
\??\c:\04664.exec:\04664.exe6⤵PID:2592
-
\??\c:\6088662.exec:\6088662.exe7⤵PID:2696
-
\??\c:\jjvvv.exec:\jjvvv.exe8⤵PID:2480
-
\??\c:\640444.exec:\640444.exe9⤵PID:2408
-
\??\c:\468842.exec:\468842.exe10⤵PID:2464
-
\??\c:\hbhhtn.exec:\hbhhtn.exe11⤵PID:2028
-
\??\c:\5xlllrr.exec:\5xlllrr.exe12⤵PID:1648
-
\??\c:\3dpdj.exec:\3dpdj.exe13⤵PID:2964
-
\??\c:\3pvvv.exec:\3pvvv.exe14⤵PID:3052
-
\??\c:\lfrfflr.exec:\lfrfflr.exe15⤵PID:2064
-
\??\c:\7llfrrf.exec:\7llfrrf.exe16⤵PID:2748
-
\??\c:\rlfflrx.exec:\rlfflrx.exe17⤵PID:2648
-
\??\c:\hhnbnt.exec:\hhnbnt.exe18⤵PID:2504
-
\??\c:\c082008.exec:\c082008.exe19⤵PID:356
-
\??\c:\24064.exec:\24064.exe20⤵PID:2764
-
\??\c:\0840284.exec:\0840284.exe21⤵PID:2332
-
\??\c:\hbntbh.exec:\hbntbh.exe22⤵PID:2620
-
\??\c:\5dpjv.exec:\5dpjv.exe23⤵PID:1308
-
\??\c:\jjvdj.exec:\jjvdj.exe24⤵PID:2320
-
\??\c:\pdddp.exec:\pdddp.exe25⤵PID:2152
-
\??\c:\42402.exec:\42402.exe26⤵PID:1252
-
\??\c:\i868846.exec:\i868846.exe27⤵PID:1620
-
\??\c:\480640.exec:\480640.exe28⤵PID:488
-
\??\c:\e20462.exec:\e20462.exe29⤵PID:1612
-
\??\c:\20406.exec:\20406.exe30⤵PID:1488
-
\??\c:\0806628.exec:\0806628.exe31⤵PID:1832
-
\??\c:\424844.exec:\424844.exe32⤵PID:688
-
\??\c:\w64082.exec:\w64082.exe33⤵PID:1532
-
\??\c:\6400006.exec:\6400006.exe34⤵PID:1876
-
\??\c:\dvdvv.exec:\dvdvv.exe35⤵PID:1316
-
\??\c:\tnbnnn.exec:\tnbnnn.exe36⤵PID:2864
-
\??\c:\8640600.exec:\8640600.exe37⤵PID:976
-
\??\c:\68040.exec:\68040.exe38⤵PID:2000
-
\??\c:\xrrlrlr.exec:\xrrlrlr.exe39⤵PID:608
-
\??\c:\e80240.exec:\e80240.exe40⤵PID:2908
-
\??\c:\nhtnnh.exec:\nhtnnh.exe41⤵PID:1144
-
\??\c:\626660.exec:\626660.exe42⤵PID:2168
-
\??\c:\htbtbb.exec:\htbtbb.exe43⤵PID:2200
-
\??\c:\w66022.exec:\w66022.exe44⤵PID:2672
-
\??\c:\jjvvj.exec:\jjvvj.exe45⤵PID:2656
-
\??\c:\0802028.exec:\0802028.exe46⤵PID:2092
-
\??\c:\4880262.exec:\4880262.exe47⤵PID:2724
-
\??\c:\260684.exec:\260684.exe48⤵PID:2736
-
\??\c:\42446.exec:\42446.exe49⤵PID:312
-
\??\c:\bntbhn.exec:\bntbhn.exe50⤵PID:1428
-
\??\c:\jppjj.exec:\jppjj.exe51⤵PID:2464
-
\??\c:\hhbhth.exec:\hhbhth.exe52⤵PID:2580
-
\??\c:\jddjv.exec:\jddjv.exe53⤵PID:1572
-
\??\c:\826288.exec:\826288.exe54⤵PID:2596
-
\??\c:\hbhnbh.exec:\hbhnbh.exe55⤵PID:2484
-
\??\c:\82028.exec:\82028.exe56⤵PID:2984
-
\??\c:\lrrrffl.exec:\lrrrffl.exe57⤵PID:2496
-
\??\c:\pjvdj.exec:\pjvdj.exe58⤵PID:2748
-
\??\c:\8202402.exec:\8202402.exe59⤵PID:2772
-
\??\c:\nthtbh.exec:\nthtbh.exe60⤵PID:1928
-
\??\c:\4802246.exec:\4802246.exe61⤵PID:1220
-
\??\c:\vjvvd.exec:\vjvvd.exe62⤵PID:1040
-
\??\c:\20888.exec:\20888.exe63⤵PID:2492
-
\??\c:\jdpdp.exec:\jdpdp.exe64⤵PID:2620
-
\??\c:\dvjvd.exec:\dvjvd.exe65⤵PID:1292
-
\??\c:\6062068.exec:\6062068.exe66⤵PID:2088
-
\??\c:\60646.exec:\60646.exe67⤵PID:2424
-
\??\c:\xrxfrrf.exec:\xrxfrrf.exe68⤵PID:1952
-
\??\c:\286864.exec:\286864.exe69⤵PID:2304
-
\??\c:\868406.exec:\868406.exe70⤵PID:540
-
\??\c:\ffxlflx.exec:\ffxlflx.exe71⤵PID:3020
-
\??\c:\fxffrrf.exec:\fxffrrf.exe72⤵PID:1864
-
\??\c:\8202440.exec:\8202440.exe73⤵PID:552
-
\??\c:\rlxxxxx.exec:\rlxxxxx.exe74⤵PID:1004
-
\??\c:\208022.exec:\208022.exe75⤵PID:2872
-
\??\c:\7btbbh.exec:\7btbbh.exe76⤵PID:2880
-
\??\c:\xrrllrx.exec:\xrrllrx.exe77⤵PID:2316
-
\??\c:\rlxlfxf.exec:\rlxlfxf.exe78⤵PID:472
-
\??\c:\fflrrrf.exec:\fflrrrf.exe79⤵PID:1980
-
\??\c:\20220.exec:\20220.exe80⤵PID:1148
-
\??\c:\w24066.exec:\w24066.exe81⤵PID:284
-
\??\c:\pddjp.exec:\pddjp.exe82⤵PID:1824
-
\??\c:\thhhtt.exec:\thhhtt.exe83⤵PID:1476
-
\??\c:\rlxxrfr.exec:\rlxxrfr.exe84⤵PID:2184
-
\??\c:\40422.exec:\40422.exe85⤵PID:2128
-
\??\c:\6600284.exec:\6600284.exe86⤵PID:2600
-
\??\c:\64062.exec:\64062.exe87⤵PID:1796
-
\??\c:\3vdvd.exec:\3vdvd.exe88⤵PID:572
-
\??\c:\tnthtn.exec:\tnthtn.exe89⤵PID:2692
-
\??\c:\a8000.exec:\a8000.exe90⤵PID:2444
-
\??\c:\6406820.exec:\6406820.exe91⤵PID:2156
-
\??\c:\20886.exec:\20886.exe92⤵PID:1628
-
\??\c:\4228006.exec:\4228006.exe93⤵PID:2256
-
\??\c:\ppvdj.exec:\ppvdj.exe94⤵PID:1540
-
\??\c:\nntntt.exec:\nntntt.exe95⤵PID:2932
-
\??\c:\vdjpd.exec:\vdjpd.exe96⤵PID:2920
-
\??\c:\jdjjj.exec:\jdjjj.exe97⤵PID:2124
-
\??\c:\s8662.exec:\s8662.exe98⤵PID:2064
-
\??\c:\42446.exec:\42446.exe99⤵PID:2808
-
\??\c:\3dvvv.exec:\3dvvv.exe100⤵PID:1592
-
\??\c:\6422284.exec:\6422284.exe101⤵PID:2780
-
\??\c:\2846480.exec:\2846480.exe102⤵PID:356
-
\??\c:\26468.exec:\26468.exe103⤵PID:1816
-
\??\c:\9nnttn.exec:\9nnttn.exe104⤵PID:2800
-
\??\c:\rrlxrff.exec:\rrlxrff.exe105⤵PID:1728
-
\??\c:\4824602.exec:\4824602.exe106⤵PID:2388
-
\??\c:\ffxlfrx.exec:\ffxlfrx.exe107⤵PID:1676
-
\??\c:\jjpjv.exec:\jjpjv.exe108⤵PID:2296
-
\??\c:\i806662.exec:\i806662.exe109⤵PID:2100
-
\??\c:\4464808.exec:\4464808.exe110⤵PID:772
-
\??\c:\8404040.exec:\8404040.exe111⤵PID:296
-
\??\c:\e88800.exec:\e88800.exe112⤵PID:1736
-
\??\c:\bhnbbh.exec:\bhnbbh.exe113⤵PID:1604
-
\??\c:\dpdjd.exec:\dpdjd.exe114⤵PID:1188
-
\??\c:\606046.exec:\606046.exe115⤵PID:1344
-
\??\c:\5nbbbh.exec:\5nbbbh.exe116⤵PID:1240
-
\??\c:\jdppj.exec:\jdppj.exe117⤵PID:3048
-
\??\c:\u600884.exec:\u600884.exe118⤵PID:1856
-
\??\c:\fxxlrfl.exec:\fxxlrfl.exe119⤵PID:2340
-
\??\c:\lflrxfr.exec:\lflrxfr.exe120⤵PID:848
-
\??\c:\5llrflx.exec:\5llrflx.exe121⤵PID:3044
-
\??\c:\42062.exec:\42062.exe122⤵PID:1988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-