Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2024, 02:29
Behavioral task
behavioral1
Sample
9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe
Resource
win7-20240903-en
General
-
Target
9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe
-
Size
80KB
-
MD5
ad5f8fc8b9e4ce33333f5d9c07044224
-
SHA1
eeadf00fdc2a56b84c6c2f95bcc9b21b54f38498
-
SHA256
9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81
-
SHA512
f6c8e2743d27613723113ee482b873e038db18cfb55ac01e6aebb5c3919dcb76e87355ec77770df20b8411aaaab6c5dba41a2ee18e8c05558f78cfcf53227e68
-
SSDEEP
1536:ITJxjZZ29Up2U7O0Ov15+o46zqMi9G7WXnQQvaWh3zWKfx/t126a63B:SHZ2up5JkH+o46LuRXnLdpzp/tg6Z3B
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/3228-14-0x0000000000400000-0x000000000046E000-memory.dmp family_blackmoon behavioral2/memory/2040-16-0x0000000000400000-0x000000000046E000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe -
Deletes itself 1 IoCs
pid Process 2040 Syslemdpfvh.exe -
Executes dropped EXE 1 IoCs
pid Process 2040 Syslemdpfvh.exe -
resource yara_rule behavioral2/memory/3228-0-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral2/files/0x0007000000023c93-9.dat upx behavioral2/memory/3228-14-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral2/memory/2040-16-0x0000000000400000-0x000000000046E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemdpfvh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe 2040 Syslemdpfvh.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 2040 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 82 PID 3228 wrote to memory of 2040 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 82 PID 3228 wrote to memory of 2040 3228 9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe"C:\Users\Admin\AppData\Local\Temp\9b8938cae91b8c89a2e869245d546a44afda8762f31f1c1c6413579dc1ab7f81.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\Syslemdpfvh.exe"C:\Users\Admin\AppData\Local\Temp\Syslemdpfvh.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD51026dc87db590bdbb5edb1acea5f7ded
SHA1d5d4b6bcc69a56e63fba15fe9963d75025dd5b30
SHA25622746ebc586c9225c7a57864d0b7cced1c04a486f8099a79334e6795136a5139
SHA5125aad3d05cb1c99c576491770b972192dd6e153a69a8dafdc88f8fa2184a11d61f44ee633afeffeef45a2d7a9102d19d85edab7812dceb907d18a240665f6e0e3
-
Filesize
102B
MD51f3e2965f417b4438afd54da4c8b26ab
SHA17150d82acb3409a2a23b315f0ad94649fa14ff91
SHA2569ea5ef37a4fe1059e35da0af5ed86b283cd0c5bd6c9bb366c4cc6038d5135194
SHA512f32a64a92db769f1f614a8bb05869786aff16ec4be338ddab47411b563d29de0dd886a10e593fd418d684b18aa4e871fe61e094c851d251780ec569ce2705a4a