Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 07:01 UTC
Behavioral task
behavioral1
Sample
30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe
Resource
win7-20240704-en
General
-
Target
30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe
-
Size
6.4MB
-
MD5
dcbdd831f36abea3aa671235d45d8617
-
SHA1
def917bf8c8fef22dc701af46a8157c6e3aa6114
-
SHA256
30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9
-
SHA512
e830e00f1bcb038d771cd3f5a78157500b0d33d964433611dd5f25e32240de887d7f5cdb2cfcdb8496fbf0c09dcdc91ba93023a0fb8cfb867eed289db8dc0bad
-
SSDEEP
98304:BxMsFme9BLT2nmYQNwlt9lQoVf2B3eoh7whgBiux19C1B5BaL7HRJPfaL:B2aBLqnmY8wjpUO8gYx19YTq7HLK
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2728-9-0x0000000000400000-0x0000000001121000-memory.dmp family_blackmoon behavioral1/memory/2728-13-0x0000000000400000-0x0000000001121000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/2728-9-0x0000000000400000-0x0000000001121000-memory.dmp vmprotect behavioral1/memory/2728-13-0x0000000000400000-0x0000000001121000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2728 30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2604 2728 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2728 30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe 2728 30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2604 2728 30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe 31 PID 2728 wrote to memory of 2604 2728 30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe 31 PID 2728 wrote to memory of 2604 2728 30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe 31 PID 2728 wrote to memory of 2604 2728 30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe"C:\Users\Admin\AppData\Local\Temp\30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 5602⤵
- Program crash
PID:2604
-
Network
-
Remote address:8.8.8.8:53Requestwww.baidu.comIN AResponsewww.baidu.comIN CNAMEwww.a.shifen.comwww.a.shifen.comIN CNAMEwww.wshifen.comwww.wshifen.comIN A103.235.46.96www.wshifen.comIN A103.235.47.188
-
Remote address:103.235.46.96:443RequestGET / HTTP/1.1
Host: www.baidu.com
Accept: */*
ResponseHTTP/1.1 200 OK
Cache-Control: no-cache
Connection: keep-alive
Content-Length: 9508
Content-Type: text/html
Date: Fri, 13 Sep 2024 07:01:27 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Pragma: no-cache
Server: BWS/1.1
Set-Cookie: BAIDUID=014DED08F528B0A5D5BCB491F2FA3436:FG=1; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: BIDUPSID=014DED08F528B0A5D5BCB491F2FA3436; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: PSTM=1726210887; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: BAIDUID=014DED08F528B0A51BB1446E36D4017E:FG=1; max-age=31536000; expires=Sat, 13-Sep-25 07:01:27 GMT; domain=.baidu.com; path=/; version=1; comment=bd
Traceid: 1726210887373602509810915253944034931250
Vary: Accept-Encoding
X-Ua-Compatible: IE=Edge,chrome=1
X-Xss-Protection: 1;mode=block
-
DNSdxmsoft.oss-cn-shanghai.aliyuncs.com30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exeRemote address:8.8.8.8:53Requestdxmsoft.oss-cn-shanghai.aliyuncs.comIN AResponsedxmsoft.oss-cn-shanghai.aliyuncs.comIN A139.196.119.45
-
103.235.46.96:443https://www.baidu.com/tls, http30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe1.5kB 22.7kB 23 31
HTTP Request
GET https://www.baidu.com/HTTP Response
200 -
-
-
139.196.119.45:443dxmsoft.oss-cn-shanghai.aliyuncs.com30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe152 B 3
-
59 B 144 B 1 1
DNS Request
www.baidu.com
DNS Response
103.235.46.96103.235.47.188
-
8.8.8.8:53dxmsoft.oss-cn-shanghai.aliyuncs.comdns30d4ef807af7d8e8791aeb8f4eeea499a9ab0d961492dc97cbbd1d46c1ff1db9.exe82 B 98 B 1 1
DNS Request
dxmsoft.oss-cn-shanghai.aliyuncs.com
DNS Response
139.196.119.45