Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/12/2024, 02:46
Behavioral task
behavioral1
Sample
d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe
Resource
win7-20240903-en
General
-
Target
d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe
-
Size
69KB
-
MD5
26aafcb37ad64fd9b71ae85cf33c3494
-
SHA1
0542cefc8f008f0f21f5ea6b7c29331337a6def6
-
SHA256
d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe
-
SHA512
3e1f84f1eafc2fca85bc73e2898263f43bd5496911619a099261c81adb68f708a0a7b5e68bb9db96cdf791cb18198d9a305b90c64f74bb7b9e4ef4c18535bd07
-
SSDEEP
1536:TPyr5BWPJgzJrQsA4MJ8SS5gq9a2pJ+jZOb4W9nouy8a0:T6DJrXAnHmgMJ+dOnFouta0
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/1716-29-0x0000000000400000-0x0000000000468000-memory.dmp family_blackmoon behavioral1/memory/1716-59-0x0000000000400000-0x0000000000468000-memory.dmp family_blackmoon behavioral1/memory/2620-67-0x0000000000400000-0x0000000000468000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 2620 Sysceamunbku.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe 1716 d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe -
resource yara_rule behavioral1/memory/1716-0-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1716-29-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/files/0x0006000000016cf6-37.dat upx behavioral1/memory/1716-59-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2620-67-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysceamunbku.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe 2620 Sysceamunbku.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2620 1716 d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe 29 PID 1716 wrote to memory of 2620 1716 d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe 29 PID 1716 wrote to memory of 2620 1716 d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe 29 PID 1716 wrote to memory of 2620 1716 d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe"C:\Users\Admin\AppData\Local\Temp\d47ccf05f2aa6bb319c18b321377b21609e94613879cc500d73c8e92bdeea1fe.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\Sysceamunbku.exe"C:\Users\Admin\AppData\Local\Temp\Sysceamunbku.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475
Filesize1KB
MD589488477da45f81f0c615e6f38027f45
SHA1398e8b22b4b6cbfa12a661b6f08d7997bf9c66c4
SHA256540762af47d9b6f3b36f20612b2aa57f54992279447f6f6ba732d739d442b703
SHA5122329de7b26ec2591a07d773a2b1e38980d8820b056ac916441cabfe87177bf5576a2e65438ad86d1d339b31bcd6e057849f63911e06a0a0f4e09cb5adf4a5f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C
Filesize471B
MD5be2ae8a9d738667774406810e9474047
SHA1abb5d75fbcfbf8fbfae4cbf00a8998a527e01f7e
SHA256f38efc0a7fffa5640e03bf0adbb8388225e7580f5d01e6630bb6d83109187a68
SHA512e5e10da017d491467f27fa7211eea836c6f1c2e383cf5d3d121e710b6ae8ee6570abb7fb9de20c897982497025da716e4eee21b501aa237f380984fad74cbf3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_A0B760D8ABF6F649D185B46E3E114CC2
Filesize471B
MD5011ddb737cff5db5a6c49b4b76524753
SHA17661adacc256199dedc2710f16d0a87a42ef22fe
SHA2567e737c5606dd1bcea7cee237c4ffaa3d72e055794b8fd8dca99b4f15fbc0e5a5
SHA5123c694ff56719783d966fc4a29cf7d2e15b0626b5a276f5ee703af717ddf013d8b7068092a47a9563816c6c2b00283150a997a5d864a9c09af2fb93f9c5535b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CF14D1855652602540DFCFECD21854DB_54BE0F4A529F65D13ED30F3AD0874E58
Filesize1KB
MD55878870e4ae5e16eec6810a360b6b964
SHA18e733643abb3a73bb852b3e247271499323e1104
SHA2567da7de2eb5d8fdbae0121ddeec005515dc48c70e9cbaa5f9855d7de13570ff34
SHA512815d2b707f6cfb07d2cf261b4a366119ae07de89f9962a7f89e1bb74f0f35c28ffb652d4dc6b49934c73eb9417ce6670a6b297ba72682952376219c91b7e5b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475
Filesize500B
MD510f24a5e469e3da356868f9a094a3bbd
SHA15de5ffd8a1ea247fb4f5c6561e67c51b2f057032
SHA2564495ed1f9593ff8010fbdd7eda38d69131ed356f9101c0aef99b4c005a46a321
SHA512e8d4079f29cc721ea68447a8fc1ef2d4549d9950d3a400de6427686d39491ef034a085bae3369232bddcc75658867d97b45a34dd0bf27a8748707fd45e9ad69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C
Filesize398B
MD56fe3fc6e35781a06259c895a000fa1d5
SHA1d6a8adb352126c00bf0009c5043c47be448ceb91
SHA2564d6758f6d94ae4122793b84d2fcda7d8ee19015f18bb86cb311e20bb7f6be914
SHA5122945414637f2ee1120572b4e9ec87a9344214899676cf10b858efa735b49c7ff31adf4ec0cdf5865facdd54ea6a1cede3ed66683a73f7112cab0a51c54fa8b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e43649c711cf9a8c1207cdf7d22ee4
SHA186a6f475e92e49f12bc93f08e6b3772638cb7be1
SHA256ed92f01e306b6f88550f2292284c4638ea53d3d420aae43b60fef0c75098724e
SHA512e85057c898b24a4b8973ff4f366937b9235d0c9ef5031828d31684e1f6b36b1178cdb4a60f1869adc4d1e2d8e6c13e4d12f4b4ab041ceac95dfaf464d8d79fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_A0B760D8ABF6F649D185B46E3E114CC2
Filesize410B
MD5ed1f847f8ccd7b9680471b5943230a6f
SHA10d5736a4956664c7e2a31d21c4eec2a3a828e876
SHA2564f429100ff1a547225f574e197c67bbdd48e4efee16b50ec9815acabf79ade72
SHA5122f4c61d5250a7427e12719435f8a778f9c4ade126915082311d3106bef054a907de95c7bfd974fe044bd2eb9c3962ffc7d3744c20b97f951640b0ff35f6c70a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CF14D1855652602540DFCFECD21854DB_54BE0F4A529F65D13ED30F3AD0874E58
Filesize536B
MD503521c8ced1205c9d51acf49a452aa03
SHA1bcdcaa0d6dc95e6385fcaa8fdf6d0dcb6305c830
SHA256bbe97ab2a212e5f52fe8570f096e756cfb0143ea1f3c148c73ae05e2b48120e3
SHA51228b9fe5b19b91d8afc931efd12fd4de921d69ef3219874a6d35c422316df2821d044d5a1eb6ceda3240e4e7bd8404dcda635f6a07510c820391f987522b849b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
69KB
MD55100a93d042d79bd5ce1e0ed1ba9d0ef
SHA1f91b2d6ceda31ae9909b5fa99e3033315f94d49b
SHA256a7b614035d8633fcb09f701845790ed8a90dc489176efbc636375f0e1b09e94b
SHA512a5d459a6439f1df659d3bce7ff656f89e2219ef76dc327ff56656d783cdff6a64de1fa18db069b3c6a26625ac611f65999a12d4e88b5dfbc60bd06ac95b9ea7b
-
Filesize
102B
MD529d3892a72c8e40a2d6ce8d09f7f17dd
SHA1b79c3014b1b63e20326f0273c9ac612e6c4fa9d4
SHA256538dbd2e3556dbf15cce32c33c3e015dcff313cc50e8b58f3739b7ddbdef81de
SHA51220c8df7851a095307e413d74e70c0017462308f153e8c43ae077a76af714eb97847f7799faf78a067e70c4715b7d2fbe86c3613c0405245f56d2283c84cac963