Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/12/2024, 21:36
Behavioral task
behavioral1
Sample
562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe
Resource
win7-20240903-en
General
-
Target
562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe
-
Size
80KB
-
MD5
2108c501ee09814f34e1038b5766c96b
-
SHA1
3e8e07ee1d4993582078d555c1dd840e5a869f18
-
SHA256
562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d
-
SHA512
571cbfe59a5dac6b59aebfae01d9ea4652204cc1d17cfd714bf4972b3068e7cfa99d414df30b471dc52a9bfc1e29f10866c6ee6cd3484344ff8d855b2116aa90
-
SSDEEP
1536:ITJxjZZ29Up2U7O0Ov15+o46zqMi9G7WXnQQvaWh3zWKfx/t126a63E:SHZ2up5JkH+o46LuRXnLdpzp/tg6Z3E
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/4832-14-0x0000000000400000-0x000000000046E000-memory.dmp family_blackmoon behavioral2/memory/4804-17-0x0000000000400000-0x000000000046E000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe -
Deletes itself 1 IoCs
pid Process 4804 Syslemnszko.exe -
Executes dropped EXE 1 IoCs
pid Process 4804 Syslemnszko.exe -
resource yara_rule behavioral2/memory/4832-0-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral2/files/0x0007000000023c8c-9.dat upx behavioral2/memory/4832-14-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral2/memory/4804-17-0x0000000000400000-0x000000000046E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemnszko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe 4804 Syslemnszko.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4804 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 82 PID 4832 wrote to memory of 4804 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 82 PID 4832 wrote to memory of 4804 4832 562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe"C:\Users\Admin\AppData\Local\Temp\562f3946eec5bd665777fa1f95df701859ae3f94b747439c5b66ddd480c2b62d.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\Syslemnszko.exe"C:\Users\Admin\AppData\Local\Temp\Syslemnszko.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD518977837d705874d8cd308001662a450
SHA162ecfd85c3de92bf659f084b5b3bbea5438063e5
SHA2560de9e7e1593d750f0ab63a527ed16a622d8c03d072ae85379355a3a570f13204
SHA5127af60da84b2d72a599a2d6f5472ea175ce58c06c279f8e006067b2ec6517c94c17379f99c3de3b0832fb1044be9a732a81e2b85439c781d27fbdaafd1e0b5468
-
Filesize
102B
MD5d7ff81d9fbc0fdb7447f016aefe7e42d
SHA1aa8cab914b5c0ea9a0f545d1b8af8f0ce39e33a1
SHA25685da4e2ba347a0d9eaa7f75e3536bc2a065361f02cec9fd077127857c4867cc1
SHA512b0edcf998029b3e16661f0ea20959c15d6a839229fa1517e0053e5ca14110d716ecc00d7923110cd0927964afae5edad5bf940dc42dd9cd5537820180a075bdc