Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/12/2024, 03:46

General

  • Target

    eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121.exe

  • Size

    11.7MB

  • MD5

    b115a4683b00adc3fc396317620764e8

  • SHA1

    8073de2e9565611fcfe3a974117e8f5fa5cda050

  • SHA256

    eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121

  • SHA512

    a00217408f08d20568a8b5af24314ca4ee2133cc8a8dfa24fade4dbbc38becf00290068d1fbf68d57a1b062fcd8d4ebf931a34f0f370536701283a7a1f7f8e7b

  • SSDEEP

    196608:WT1QEHf6YthDVlDAJpFQoiiuCQqNObM57fyCZ2HO/aFOe382SHtmfU7:k1QE/6YJupioB+oiMpf/gPOePSNwy

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • A potential corporate email address has been identified in the URL: png@3x
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121.exe
    "C:\Users\Admin\AppData\Local\Temp\eadcd1bea7b75e3b482d17c321056d85a7dd9e32cbdbdf66def05ba1db933121.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://docs.qq.com/doc/DV0lrck1MZUVBRXV0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    e48c928eb3e1fa4c2a5f76e650d2c84a

    SHA1

    7443baae8427e20a3d966c74191fa50cdba363f4

    SHA256

    20b9e317a0a55b1f6567fb7f8dfdd6571f3eed7224eb2757c5fb4e9525fc9f7c

    SHA512

    faff96e76d83ed6b0eebf8c6a64cbdfe9494cd976a73712fe168d8802e3f113948d0b175f817e87a32610c70553edf2341ff685721a7037a24c1de408d65bb0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfb1897171588214ff1bd69d044026a7

    SHA1

    6152cbf1bc19d3878886e8ad7e78bfd5149b5785

    SHA256

    3835f3eabd9d8d2237c1bceee41eeaf72adfd7543dc3bca60b60a4f54276794d

    SHA512

    b88837d136aac168bd47a1883412d5abded097e251937c36b7d8f97988b961f25672072681e25c4bbe4668452967e5147b3f26580cc99e4a26f9acadb38871ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4593ce419612dfb2d63256edba884809

    SHA1

    83bb2a2eadb22065a24f0d067d1377ea702d5fef

    SHA256

    3022c52532a5378a6ef54808f5c002ff222569ffe0797d87dd2faee4c8f36b81

    SHA512

    b6be4a00ff051c184d1161271eb3d4b6752af2bbcc06f0f351b3c8290f3d326e061cd0a46307b0f0c9e231f4fb3d5a2a656a96a9e2492c6d3ca18f3a2cc30138

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe2ca9bc7786ac4566ed7fd468503139

    SHA1

    101b834d911e055b5945870d9abd2c9e96f0faf5

    SHA256

    d9bf5e628fc1d2b425995c9b8ebef9cd32996295aec81aa6582e3864e380e3af

    SHA512

    9f6faf2ed9cf88065523d9cf3d404b6d82284433982a7ddfb735238b118f4762c04f7dfbd5ed402f3671689fa32474ee09d37c4064aeed1c0be193340300e176

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b7124b07520ffed4fc17e7d4627e153

    SHA1

    7f0928204212610ff0eea392b00b117c8922312c

    SHA256

    845e62001c152587071942b362917d8b9cd00ca3fef860733a96bcdf9501821b

    SHA512

    322f997dd0c7eb756a39996e83c786b76f70292fcae8505ac42c751c0346c09d647cccfd296d64941cac1caabf04f7cdc4ee0f7335ff80ad1a9a95aac70bcdc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35ec0c54eaec018ebcd9f59c874a0cb4

    SHA1

    d4ba26fc8754c741c48a4f0b43a61001aa6ad1d5

    SHA256

    20ef01f169357fbccad1b6ec074eb80797655f5c4e8cb28b3d9b26b3e16fd7d2

    SHA512

    967bbfb2aeeab0dd094872d3e2578dbfef07b54eb5141c8c9a8bbfa7ee2e6562e2ff1131e8a55fa5a4f6e4b8bc162342fbf79d8396cabf938a3e2713d9ba7dd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afdbcdf04fc7e4cab10cf590459e8af9

    SHA1

    1d9ea950ab603b1ffd62e1a934d45ed649d6f77f

    SHA256

    43ec64a7a433d413c48d596cde5aa64391cb6049daf181170a6ebbcbf0cfd2f3

    SHA512

    ae7de160ceb6b022c1391899b86338c2907ee12a6314f53b265d554f0a391971c1e42c0dcdfd2f269b3bdc56957ecb3205519a7f5393e954b0ea9245186a24c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa56bc5f5512fc8b5fa8d8e0399200c8

    SHA1

    f6097ac830b0da9355807448263babf26410b7a7

    SHA256

    a5a59e6c215fb7e16f9e0a54deec0088e5f09a86b06e263c41abf130a78c55f4

    SHA512

    824fcb8fbf326b0c512722d1303e2ff3ccf943b7200264d97a10f0aba420a65b47a61cc13ee4a9073a8e5e8a624eefe7e44a0f4fad6d0ed2326aca305f3be41f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93973c3af309159fc5a99935dc0f2773

    SHA1

    2e90adf7c867087b5da96884ae18aa3da135b8b8

    SHA256

    b8826ff2a5bbfb7f45b70bc9ae76e21f851ffa30ab965adab4db959fa93cbec5

    SHA512

    b930078bd65f5d7bf62adfc63c58c36959448a227bbbfd5089e07cbb9f6d4e2994b77a9b2974ad4ae8bbced277917cd3438450c9124bf9da1795e7d0f6127725

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    faa94f384ed26324afd9988a4fc862e9

    SHA1

    31c5414ce43800d9b88b27a7df700d6c72b75b8d

    SHA256

    740fb6430977bc10720991ab15bd9afbdfaf2d525cb2b57db6d47e4105ac461c

    SHA512

    caeb943c326a032bdc469c9728693f56ee5edc68aa7befabf6d9143fbe2feddf3bf66af9a97439494fb69b6ae429feaa4fbeadddced5b1c6fe3530cca9d12986

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e9b938d28b38144b957260887d12d2a

    SHA1

    9638f7b2fae59dc0af6c3e5562db17af867b51c1

    SHA256

    8a5893a0ad08ddf46254412ce88a3e7daf1f6a481fbe53949fad1d8780a0b527

    SHA512

    4569bf9300af6ffa3832e34ec8451ae1cf9bc66ae90f76a8f593780210f0866aa8b12e84d704507b9bec28132a4c4983dca471db63f1af5f87d1a3ee2880a0b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8179851ce6e515460760f5fc2e0b548d

    SHA1

    c20983faabfd33ba4c64682b7909f41222efd90f

    SHA256

    45229a27b352c5132c8e4c94822bb2bb6b097bcae5990bc15f4179a113e2674e

    SHA512

    e700aa8fc87aa1e64c4a090a9dab6e40ea0c2bba33360fed50c045afbf061d186bde471ad30ddbb3ffc7a1875705c63447abb212b5e683a310b1b2dbe729dd1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfd7d0c489e676d4c0a5a7db2177bd08

    SHA1

    3ad624e0d3c530c8d03db7de5db92b1e60118b25

    SHA256

    e993efa5d97b35b111755036aef582dec863626a7bc07ed3a8079f318de8df6c

    SHA512

    c1fbb25ecdb2361479e551a0ab5b5e18fa72626d1f2ab1ad2ada31c7a070181d62f4eb2a291743443fe2bf772f0cfb9ce9ee7306b10c2a96709af4575ca3644f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    419063c36308ef5b9b503cc1007efb53

    SHA1

    af72f6b43d5300ad5461bbb78d7cb683c03f70f3

    SHA256

    1a3c9698a8f91f31187fb184d3ffa0c0ef53e5eeeb3614e9b01f351291064da3

    SHA512

    f9c0433ac57d21cf5b5cead8387312a080c61a6171734e170008759548ec8b203b37dc8ea8c13cdd9290d499e0e5db163557dd0295e907cdc529b8107517f13c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebb8183d7f115a3f9e2bea274c99b183

    SHA1

    c26c2f00a9765ca235411e2f600d6105a648cebd

    SHA256

    07ea640d03f95889366b42ef909895431fba6d7b36c405efd12e8835f57f6471

    SHA512

    730024be33f9e6cce425e960e2d29f2b0292128fc2d002c89c36fedac332450f1ad6ae94ab677720711137c8f8c5f6aeb88a51c5669260cb6127f411ae7d2c68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f55fd3ce9a8837a182094813ce1ab835

    SHA1

    2f5a05e9e1a4ed3ff64972cf3d46ceb96c16fab3

    SHA256

    b78bd74109004a2fb237ca3234844ff9a9dd8a9aeb6511b6adfea3281896503a

    SHA512

    4e23deb287cf3fab787ce3d64198ac04faca7e55ae6884c569986bda5c8df0d4ff5c4a311d4217d133b58ac671e6df3e58cadff8d5bcd138a782311a1ffbed34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cb34858baf06f850f1a76bb8c1b6b36

    SHA1

    32890bc353d7589620c87c90ab311e2791d71ba9

    SHA256

    bd77426b76104c583999eb8a40f7b5f49b9cd1f347e99067beebbed1921314f2

    SHA512

    5824f0ebd58a52344e33abba84270a3d5a953a6d906326ff36f87be567f50b8aa25c85753a17c0e08540a44dd0fac6ee7d3b75c744323b7ff932aabf1c886c1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1f634ad5cdaeaf1eaa1ea2b948962c2

    SHA1

    dabef5c4bd8f66fee44f0ae49b2941c0211646be

    SHA256

    d581e260c806570d0aa197682f492956fcf6b3f1b893190f3631fb0056a7084d

    SHA512

    03d3e9f1deb4f3b9e4aed0f8dbcb25577b46afd36a657d565d5b6da6e99b6440b96b884de51d7c7336b30c332d7fdceca6d2662488d4ba76dd324af9e1f95c6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a8d8d2549aaa0166de1a3afeb34f6af

    SHA1

    42991abb7ca4b8c740bd99265eeb26ceff2a11ac

    SHA256

    3c9dacae369cdf8d01a345a339a9b90dcb2bb27d96533878fd4366c733728330

    SHA512

    696f60c12833355691c6221bb77dc61244632ab64fbfa692e3c029a421a56a9965ad6e0ff56a0da3d56321b22936fdf97270dacfd2ea9fd87e0e82417c0e1578

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CF14D1855652602540DFCFECD21854DB_F4BA400FC87361C05D40DBAF6EA131E5

    Filesize

    532B

    MD5

    cd0881056a77a0db3c5d7bae54d3f8c9

    SHA1

    3c564d1285c5dba04d80529e606387e840e9599e

    SHA256

    4872329bdcdb2790a3ec58d293a3e9eac255ce88f352ac7b60c75ccc094946ac

    SHA512

    8f6c7ef00884eeec5f38802fed866628566859f357b3bef86ebe8aee13c4b07ec1cbc9bfe05513a664d5a125173019d94e7702af02fe6a1b8f8e02487e685ab8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    13df60d64df005d9f61686e1e5785766

    SHA1

    f59ab2d6d7e866eccbe764174cf6a6bb164be4eb

    SHA256

    3939b6710f9cf56bd890f75b0cd1e64fd6d846f435ed13984f457170844b586b

    SHA512

    082461e986adba190ff686c325f63803d0983562717390788bfb33c5621d1109abc6d009a382e6ae577b11b936afe6d92491d987f91604641ab98838667c18b5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\favicon[1].htm

    Filesize

    6KB

    MD5

    f689e6a2633bc536b658080159376918

    SHA1

    743cc92cd11032a1d728920da01cf0d62964c64a

    SHA256

    aed43a6ca91664b9a37a87f48f623aa85916bc82be60073e4ccee0328c780651

    SHA512

    7a5000fc60c5538da80c68b35f0e715f2fe858f5b93a35a9a703319d4db474c81f37121add5f07ba594df31d21ca4151465155dbfc6f03d8f63e09d5f5d51d92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\file_web_logo_32-b074c7d607[2].svg

    Filesize

    1KB

    MD5

    b074c7d607991bcee487b6bab7fe41ac

    SHA1

    b04ce477a18812918bc66f567b474261fa5fed46

    SHA256

    395427601a092f229ea1af00aec598e8b1f8028d200dd6b0cfd51a2639f6d647

    SHA512

    b82e671573d07b4630a2f0295c5be39399c242bb7f899065a2918e89e826fe703fe6a176fb223ee361601f03d505d3a45185d335c7b30220a9c19363ef48e274

  • C:\Users\Admin\AppData\Local\Temp\Cab2AF9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2AFA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Downloader\libcurl.dll

    Filesize

    729KB

    MD5

    f28f2bc74c40804a95c870ea710d5371

    SHA1

    8654243c7de98a74ede2bcf45e8506f92e77d6fa

    SHA256

    cf6e5d1db6eb6965e639db3bdffaee8eb38c9a603ed5317e2e7c92e8ea7bdc1d

    SHA512

    2542aad8117f91a039d27fe4d844675dd88dc267cc8643c6b2820fc05ab1b02ee05c77d7bdc6d9f56a992572ab67bfaab32bda3b03947a2c7175cd16fbf5726b

  • memory/3068-17-0x0000000075BA0000-0x0000000075CB0000-memory.dmp

    Filesize

    1.1MB

  • memory/3068-18-0x0000000075BA0000-0x0000000075CB0000-memory.dmp

    Filesize

    1.1MB

  • memory/3068-20-0x0000000000400000-0x0000000001B1F000-memory.dmp

    Filesize

    23.1MB

  • memory/3068-19-0x0000000000400000-0x0000000001B1F000-memory.dmp

    Filesize

    23.1MB

  • memory/3068-15-0x0000000075BA0000-0x0000000075CB0000-memory.dmp

    Filesize

    1.1MB

  • memory/3068-16-0x0000000075BA0000-0x0000000075CB0000-memory.dmp

    Filesize

    1.1MB

  • memory/3068-0-0x0000000000400000-0x0000000001B1F000-memory.dmp

    Filesize

    23.1MB

  • memory/3068-22-0x00000000003D0000-0x00000000003EA000-memory.dmp

    Filesize

    104KB

  • memory/3068-21-0x0000000075BA0000-0x0000000075CB0000-memory.dmp

    Filesize

    1.1MB

  • memory/3068-9-0x0000000075BA0000-0x0000000075CB0000-memory.dmp

    Filesize

    1.1MB

  • memory/3068-11-0x0000000075BA0000-0x0000000075CB0000-memory.dmp

    Filesize

    1.1MB

  • memory/3068-8-0x0000000075BB4000-0x0000000075BB5000-memory.dmp

    Filesize

    4KB

  • memory/3068-7-0x0000000003BA0000-0x0000000003C5E000-memory.dmp

    Filesize

    760KB

  • memory/3068-6-0x00000000003D0000-0x00000000003EA000-memory.dmp

    Filesize

    104KB

  • memory/3068-1-0x0000000010000000-0x0000000010116000-memory.dmp

    Filesize

    1.1MB