Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 08:30 UTC
Behavioral task
behavioral1
Sample
74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe
Resource
win7-20240704-en
General
-
Target
74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe
-
Size
12.9MB
-
MD5
94ef8f16e591a76c7ea12782c65b2d05
-
SHA1
048f8aa1224513d6c20fec2ed34aebdd0350f5a3
-
SHA256
74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500
-
SHA512
723c3e2221c3c31d138837e42b9f2ce9277646c9b198b5bbb0997e79a847b6ab8a0243c37bd078a4f9945ddc716f3616c87abc85ad1eeaf0f2598f5b51f768c9
-
SSDEEP
196608:jEafli2XykeihBWeFXy+IFTYMjcuNwYli2XykeihBWeFXy+IFTYMjcuU/X8+P:yNHcBWeFXOlRj/wTNHcBWeFXOlRj/UF
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2284-0-0x0000000000400000-0x00000000011BB000-memory.dmp family_blackmoon behavioral1/memory/2284-7647-0x0000000000400000-0x00000000011BB000-memory.dmp family_blackmoon -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe 2284 74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe"C:\Users\Admin\AppData\Local\Temp\74ee8f4094db4ea89296c81352a734bd428da4ee4156b1b23ce4fcb10af77500.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2284