Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/12/2024, 02:29

General

  • Target

    9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe

  • Size

    80KB

  • MD5

    ad5f8fc8b9e4ce33333f5d9c07044224

  • SHA1

    eeadf00fdc2a56b84c6c2f95bcc9b21b54f38498

  • SHA256

    9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81

  • SHA512

    f6c8e2743d27613723113ee482b873e038db18cfb55ac01e6aebb5c3919dcb76e87355ec77770df20b8411aaaab6c5dba41a2ee18e8c05558f78cfcf53227e68

  • SSDEEP

    1536:ITJxjZZ29Up2U7O0Ov15+o46zqMi9G7WXnQQvaWh3zWKfx/t126a63B:SHZ2up5JkH+o46LuRXnLdpzp/tg6Z3B

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe
    "C:\Users\Admin\AppData\Local\Temp\9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Users\Admin\AppData\Local\Temp\Syslemdpfvh.exe
      "C:\Users\Admin\AppData\Local\Temp\Syslemdpfvh.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Syslemdpfvh.exe

    Filesize

    80KB

    MD5

    1026dc87db590bdbb5edb1acea5f7ded

    SHA1

    d5d4b6bcc69a56e63fba15fe9963d75025dd5b30

    SHA256

    22746ebc586c9225c7a57864d0b7cced1c04a486f8099a79334e6795136a5139

    SHA512

    5aad3d05cb1c99c576491770b972192dd6e153a69a8dafdc88f8fa2184a11d61f44ee633afeffeef45a2d7a9102d19d85edab7812dceb907d18a240665f6e0e3

  • C:\Users\Admin\AppData\Local\Temp\lpath.ini

    Filesize

    102B

    MD5

    1f3e2965f417b4438afd54da4c8b26ab

    SHA1

    7150d82acb3409a2a23b315f0ad94649fa14ff91

    SHA256

    9ea5ef37a4fe1059e35da0af5ed86b283cd0c5bd6c9bb366c4cc6038d5135194

    SHA512

    f32a64a92db769f1f614a8bb05869786aff16ec4be338ddab47411b563d29de0dd886a10e593fd418d684b18aa4e871fe61e094c851d251780ec569ce2705a4a

  • memory/2040-16-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/3228-0-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/3228-14-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB