Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 14:30
Behavioral task
behavioral1
Sample
b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe
Resource
win7-20240903-en
General
-
Target
b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe
-
Size
1.7MB
-
MD5
2af63a995177fae320cc58227e6350be
-
SHA1
41438e5f51d8fd1f40c48dad31c721f3b4bd1b12
-
SHA256
b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144
-
SHA512
9aa3de8f54224203a8dd740319feed006d05eb18c51ac5b80a9aeafef20131699806f3a1d3307370acc79b194f5a9bdc31dc50ead63a16bd828bb69cb9e4dead
-
SSDEEP
49152:SFlg29tTVgm/I07S1NaPN5p0sUPYu7Udj:4R8WI07oaXpMAV
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/2100-7-0x0000000000CA0000-0x0000000000E7F000-memory.dmp family_blackmoon behavioral2/memory/2100-13-0x0000000000CA0000-0x0000000000E7F000-memory.dmp family_blackmoon behavioral2/memory/2100-16-0x0000000000CA0000-0x0000000000E7F000-memory.dmp family_blackmoon behavioral2/memory/2100-17-0x0000000000CA0000-0x0000000000E7F000-memory.dmp family_blackmoon -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WPS.lnk b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe -
resource yara_rule behavioral2/memory/2100-14-0x0000000002C60000-0x0000000002C78000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe Token: SeLockMemoryPrivilege 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe Token: SeCreateGlobalPrivilege 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe Token: SeBackupPrivilege 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe Token: SeRestorePrivilege 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe Token: SeShutdownPrivilege 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe Token: SeCreateTokenPrivilege 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe Token: SeTakeOwnershipPrivilege 2100 b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe"C:\Users\Admin\AppData\Local\Temp\b0c264e59ec7ef5b9d01b8431fb6b36f1fdd156da0fd613e5814c437773bc144.exe"1⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5051d69a619adca3472e8d7c9b0c0eb5c
SHA16cc795ac90e43e408919e19ba6f5633863560459
SHA256feefc12464985e2057a4cbd54117e9414f2e00a284106fa38b62d63052a1f7dd
SHA51250daa3344aa4d86cdd22cf5736eec993467e6574c5e341cd0fd95757c739e167b6e76c744b29ae302d08c88d469fea0767640a9257f54f9dec2c5fbb87c23b71