Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe
Resource
win10v2004-20241007-en
General
-
Target
fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe
-
Size
334KB
-
MD5
2b55bfa9fe8ed2417a08e6d252f50960
-
SHA1
8b1f558835bb69d51784cd1bbdbffe9199a30d72
-
SHA256
fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ce
-
SHA512
6621cb07afd52d83d10be3cca7699db6915cec6e283d9d1c690136bfee7c29365b82d2fa8bf6618ef72e03a8e96b2da72cd9f8bdf25fc0b8b84531caa0d7b8b3
-
SSDEEP
6144:hiEEj3+LBFhz7wR9U/xLZB9KUBCgs/ikmXPr1yg6wCvBdecAPCuhObSUM:wxj3+LjBMRGhsKkmD1QwAd74+M
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe -
Executes dropped EXE 2 IoCs
pid Process 1860 Protected3.exe 464 Blackout Crypter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1328 1860 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Protected3.exe -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Blackout Crypter.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Blackout Crypter.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Blackout Crypter.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Blackout Crypter.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Blackout Crypter.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Blackout Crypter.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings Blackout Crypter.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Blackout Crypter.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Blackout Crypter.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Blackout Crypter.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Blackout Crypter.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Blackout Crypter.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Blackout Crypter.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Blackout Crypter.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Blackout Crypter.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Blackout Crypter.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Blackout Crypter.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Blackout Crypter.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Blackout Crypter.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Blackout Crypter.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 464 Blackout Crypter.exe 464 Blackout Crypter.exe 464 Blackout Crypter.exe 464 Blackout Crypter.exe 464 Blackout Crypter.exe 464 Blackout Crypter.exe 464 Blackout Crypter.exe 464 Blackout Crypter.exe 464 Blackout Crypter.exe 464 Blackout Crypter.exe 464 Blackout Crypter.exe 464 Blackout Crypter.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1860 3528 fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe 88 PID 3528 wrote to memory of 1860 3528 fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe 88 PID 3528 wrote to memory of 1860 3528 fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe 88 PID 3528 wrote to memory of 464 3528 fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe 89 PID 3528 wrote to memory of 464 3528 fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe"C:\Users\Admin\AppData\Local\Temp\fa51d3f26d979a4a1c4cf78a82e53c43d6accd90430872f72fa3cfce1afc15ceN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\Protected3.exe"C:\Users\Admin\AppData\Local\Temp\Protected3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 2683⤵
- Program crash
PID:1328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Blackout Crypter.exe"C:\Users\Admin\AppData\Local\Temp\Blackout Crypter.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1860 -ip 18601⤵PID:512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD559f3fbd4c3132e14f75417c19b25fc7f
SHA1337a7c42097debedfe6222fd81a5b390beba54e0
SHA256d055aa878a6359bd50c15a2a378059e320759f5672d00fd46a4b96553b8a3bb0
SHA512365bf4cae6733b11df630f8b1a85374f65f22b316c9c4adaa3f1b5fca83b6d708b830baa621c37093580506bd8c0415268415dc4c55e0c43878a85c25860704d
-
Filesize
253KB
MD59637d6da20f9f0c32aa71f0229369da1
SHA1b5046f174c767f018658325178c9329a65b02748
SHA25693b7cb363085041b27a02d20c90ed2249d8d349412ed5e3da56f6d2707de8a95
SHA512fbcaccb31862740c4e17a012f0dbd2cd1bbb37f859a18456fff9026f449041bbca48c72a7ecfd5eb29d3316600f6b00760867f8d6d9cebb1ccbb77785381bd90