Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
84ab6cc07b8fbccc1a87f7064b754d90N.exe
Resource
win7-20240708-en
General
-
Target
84ab6cc07b8fbccc1a87f7064b754d90N.exe
-
Size
44KB
-
MD5
84ab6cc07b8fbccc1a87f7064b754d90
-
SHA1
3533a9fd5cc215e651b6ce1900cb99d7bc16f996
-
SHA256
e4339d0f2ee61d0118db3713b9e6cbfc2d9ef0bcc97e217123d5379945449ea7
-
SHA512
7b16e13df6014105b063f9d154509a29a78d69bb7f3e7647f4631638bc9d1fae95f544e3ec71a3a203883d280bd590a29fed8b6d1a48ab6dcf7e98c61e230d05
-
SSDEEP
768:KmZ70XUP0K2I5f6VJiPy6jBZTCRoMUHIYhlDkYi0sDaF8QCFSXbyt/CSF7p97Dp:Kf2V2IOSXQoMUHFhSYr+DQLytpFF
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/3608-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/764-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 764 fxxrffr.exe -
Executes dropped EXE 1 IoCs
pid Process 764 fxxrffr.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\friendl.dll fxxrffr.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84ab6cc07b8fbccc1a87f7064b754d90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrffr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3608 wrote to memory of 764 3608 84ab6cc07b8fbccc1a87f7064b754d90N.exe 83 PID 3608 wrote to memory of 764 3608 84ab6cc07b8fbccc1a87f7064b754d90N.exe 83 PID 3608 wrote to memory of 764 3608 84ab6cc07b8fbccc1a87f7064b754d90N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\84ab6cc07b8fbccc1a87f7064b754d90N.exe"C:\Users\Admin\AppData\Local\Temp\84ab6cc07b8fbccc1a87f7064b754d90N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
\??\c:\fxxrffr.exec:\fxxrffr.exe2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5737263c6acd82a583dbcc1a9abae4ea1
SHA13241951dbf37cea32d2385d1362c9f1b70d7c4d9
SHA256dee89afe9677c6145a75dc2515205590b66624f11af300cbd06df3be145af297
SHA512632715cbcbca335e55ef514925b8b1e34477f36a563b493ef79cbc2c714282bea6e65e8e137db3cf61512fc6cc095b756479029d1e25f58faf605ebc16893864
-
Filesize
71B
MD5a07f555b0ff4dcc3fc0bc8851ea53265
SHA155c196d33b6225b25915b8dee568c56bf5e3a3f7
SHA256e981a2d7e1a533cda59b6271ad1d59a5991640a60af825210bc6e5a04980beb7
SHA5124db3e7755f2f8b4044604a73b07fb5bf5b5eac379ac51943fd7d66e9770a0ae82f976d8714d81aa31d42836f5845aa1df8000de22397008d5d52956a48a86947