Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe
Resource
win7-20240705-en
General
-
Target
023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe
-
Size
88.4MB
-
MD5
6fc6d0151b894c6edb99a13677f64b7d
-
SHA1
29e643902e9e2a78eb45bb7668771b8ad81a85cf
-
SHA256
023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e
-
SHA512
0cc9c7e87e5c018f6e9c33a1605d5ffe9383f25c301bf1f802d470f5b1480fa42b5ae812c63307d002da6468a2c840a940eb5a3b92fee6b65c5b932c8e77d82b
-
SSDEEP
1572864:cdOzxAzZz4816LdTqUEg//kBnAzZz4816LdTqUEg//kBnAzZz4816LdTqUEg//kO:wpzZtCogHkBAzZtCogHkBAzZtCogHkBQ
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2368-0-0x0000000010000000-0x0000000010246000-memory.dmp family_blackmoon -
Loads dropped DLL 1 IoCs
pid Process 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe 2368 023af2de696de62a4424c48d203ddb721422c9629b43809d5f90f9c6da4fea9e.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5a3b2cf55c7370fb05e26a788ede52342
SHA1ee699ba7eee607dc98638fd1bb6ff6be9852d60f
SHA25610b3e08f2a144809ed178e5b7e8382439ffaef8bf1e351cda606453e07ee5c1e
SHA51251bff44116e1d5e7018e60023b882cf1c8f0198b7396b50d1ae5f00f5e93979b9131f897f4f593af27d9f298f56268fa98ec1d301ea49b2cf4e04a7e512342b7