Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2024, 04:55
Behavioral task
behavioral1
Sample
99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe
Resource
win7-20240903-en
General
-
Target
99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe
-
Size
357KB
-
MD5
6b47674ad50a1b4ccbb496405e61e04c
-
SHA1
8c49abe1fbff4e5a928fbbb9df9b4da8fc766cad
-
SHA256
99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700
-
SHA512
cc140fbd622b218a8b27bc01e64102a5d4d3938534437ffd8108889335e78f799c8426af67925354e8aacfebcc750f9b1d7f65748cac9722f169962fb86ed380
-
SSDEEP
6144:mvk3Q5ibjnNuuXckaL7pbRBkce97aw/N4L7oR:mvMQ5ibjnwka3pbRC19Gw/NsoR
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b6a-8.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe -
Deletes itself 1 IoCs
pid Process 1696 Systemlhqea.exe -
Executes dropped EXE 1 IoCs
pid Process 1696 Systemlhqea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemlhqea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe 1696 Systemlhqea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1696 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 84 PID 1436 wrote to memory of 1696 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 84 PID 1436 wrote to memory of 1696 1436 99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe"C:\Users\Admin\AppData\Local\Temp\99ebea7b7ddaf3aabe69feeff7d55743d15e036184dab086170b8849d7aee700.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Systemlhqea.exe"C:\Users\Admin\AppData\Local\Temp\Systemlhqea.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357KB
MD5ccb4ef6c9488de678dcf6d7824ae1936
SHA194a390d87887f60c7f2949c88fdd8118e334a920
SHA2568cd59aa7dc00a0bbf416f3026193261d9ee21267ac58b8b70e97b188acfc3d0a
SHA512b118ff2ab8e2150b9adc0b1eacf74dfe18595f7253d7e0fd93cbdbe9ecb6cc6cfbb4e206ffdb3bf26a81ec9e7a88a3fd4a82b2f2e876b4a01fdabf931aef03b5
-
Filesize
102B
MD5018fe4448883aeb32e332a39feaa0fdb
SHA18322dcbcce6f23511efa33a370d572b60adf5761
SHA25665071fa34f9d135d889ab212416d1c6b2c2bb60f204aff693b3aeebbbf1d9f6f
SHA512ddad3b6a06ec46fb9f9c9530d52f96b7d16b482d2fa0d0e472204ebd2f4c249fe068c5642a96f741d511a17e9b28aba51ffe8f3c82ebb4182ae7d88cf26d579d