Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2024, 15:53 UTC

General

  • Target

    50ae7839463137f7fab104e21cda58572dbcf4fbd28c61038187752e2fed9512.dll

  • Size

    430KB

  • MD5

    f7ec875f8ef9e1d72eb0095addc8e3b4

  • SHA1

    38c8bb509c752f94cb938036aa21db72bd75f710

  • SHA256

    50ae7839463137f7fab104e21cda58572dbcf4fbd28c61038187752e2fed9512

  • SHA512

    02ad72e87bc66920ef7ce949a78dec784c2afdab48c4269887d49886cba3b097fe0a93330300569ce92d5dd96290dce33433e12039724e4045ec3a1adf45f5d1

  • SSDEEP

    12288:q9j8pWxJdNxnSJwu416c9y0wiL7s1T37AVu68VnogfN7oSY:q9I+dGwu13UVb+n3fNW

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Detect PurpleFox Rootkit 5 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Purplefox family
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\50ae7839463137f7fab104e21cda58572dbcf4fbd28c61038187752e2fed9512.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\50ae7839463137f7fab104e21cda58572dbcf4fbd28c61038187752e2fed9512.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Windows\SysWOW64\svchost.exe
        svchost.exe fagahawhawhgawccc
        3⤵
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1276
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Windows\SysWOW64\svchost.exe > nul
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:2200
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 2 127.0.0.1
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2836
  • C:\Program Files (x86)\NetMeeting\svchost.exe
    "C:\Program Files (x86)\NetMeeting\svchost.exe" -auto
    1⤵
    • Executes dropped EXE
    PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\NetMeeting\svchost.exe

    Filesize

    20KB

    MD5

    54a47f6b5e09a77e61649109c6a08866

    SHA1

    4af001b3c3816b860660cf2de2c0fd3c1dfb4878

    SHA256

    121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2

    SHA512

    88ee0ef5af1b0b38c19ab4c307636352fc403ea74f3bfb17e246f7fd815ac042183086133cd9fe805bd47e15854776871bb7d384e419862c91503eeb82bfb419

  • memory/1276-17-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-20-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-34-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-21-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-23-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-24-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-22-0x0000000010000000-0x00000000101A0000-memory.dmp

    Filesize

    1.6MB

  • memory/1276-9-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-4-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-19-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-5-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-18-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-25-0x0000000074E1E000-0x0000000074E1F000-memory.dmp

    Filesize

    4KB

  • memory/1276-26-0x0000000010000000-0x00000000101A0000-memory.dmp

    Filesize

    1.6MB

  • memory/1276-15-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-7-0x0000000000400000-0x0000000000543000-memory.dmp

    Filesize

    1.3MB

  • memory/1276-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2116-13-0x0000000010006000-0x0000000010007000-memory.dmp

    Filesize

    4KB

  • memory/2116-1-0x0000000010000000-0x00000000100FE000-memory.dmp

    Filesize

    1016KB

  • memory/2116-3-0x0000000010000000-0x00000000100FE000-memory.dmp

    Filesize

    1016KB

  • memory/2116-16-0x0000000010000000-0x00000000100FE000-memory.dmp

    Filesize

    1016KB

  • memory/2116-2-0x0000000010000000-0x00000000100FE000-memory.dmp

    Filesize

    1016KB

  • memory/2116-0-0x0000000010000000-0x00000000100FE000-memory.dmp

    Filesize

    1016KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.