Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/12/2024, 02:29
Behavioral task
behavioral1
Sample
9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe
Resource
win7-20240903-en
General
-
Target
9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe
-
Size
80KB
-
MD5
ad5f8fc8b9e4ce33333f5d9c07044224
-
SHA1
eeadf00fdc2a56b84c6c2f95bcc9b21b54f38498
-
SHA256
9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81
-
SHA512
f6c8e2743d27613723113ee482b873e038db18cfb55ac01e6aebb5c3919dcb76e87355ec77770df20b8411aaaab6c5dba41a2ee18e8c05558f78cfcf53227e68
-
SSDEEP
1536:ITJxjZZ29Up2U7O0Ov15+o46zqMi9G7WXnQQvaWh3zWKfx/t126a63B:SHZ2up5JkH+o46LuRXnLdpzp/tg6Z3B
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/2232-7-0x0000000000400000-0x000000000046E000-memory.dmp family_blackmoon behavioral1/memory/2920-17-0x0000000000400000-0x000000000046E000-memory.dmp family_blackmoon behavioral1/memory/2920-21-0x0000000000400000-0x000000000046E000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 2920 Syslemwfpre.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 Syslemwfpre.exe -
Loads dropped DLL 2 IoCs
pid Process 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe -
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2232-7-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/files/0x0006000000019275-15.dat upx behavioral1/memory/2920-17-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral1/memory/2920-21-0x0000000000400000-0x000000000046E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe 2920 Syslemwfpre.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2920 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 31 PID 2232 wrote to memory of 2920 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 31 PID 2232 wrote to memory of 2920 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 31 PID 2232 wrote to memory of 2920 2232 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe"C:\Users\Admin\AppData\Local\Temp\9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Syslemwfpre.exe"C:\Users\Admin\AppData\Local\Temp\Syslemwfpre.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD573b7734a4b7a5e46bf21c8bd9e8f6328
SHA12bd1ad6ec208f57e340404df39007c7cf5b4bf1f
SHA25624410bd597f001ea46a5c1caba399db6d703e97cb70707c6b6d194d4b5039dbf
SHA512e4a9ff0908f272d1a15a156cd07a7b480f80be5bc769887e8e27c4adf20c31714f27d903c74e8e531b7ba5fe13a291a7103e775fefd884838b516b94dbc7d6a1
-
Filesize
102B
MD51f3e2965f417b4438afd54da4c8b26ab
SHA17150d82acb3409a2a23b315f0ad94649fa14ff91
SHA2569ea5ef37a4fe1059e35da0af5ed86b283cd0c5bd6c9bb366c4cc6038d5135194
SHA512f32a64a92db769f1f614a8bb05869786aff16ec4be338ddab47411b563d29de0dd886a10e593fd418d684b18aa4e871fe61e094c851d251780ec569ce2705a4a