Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2025, 02:01

General

  • Target

    7f4c3c0133233a9eec5e8c97e905b767f3a9e9a642f54da068d31f39c6311e76.exe

  • Size

    520KB

  • MD5

    45215ec7f8b8c4970d04c8aa7fe60c6d

  • SHA1

    18c3f4806fe113ad86a062fb7bbb264c7faa6bed

  • SHA256

    7f4c3c0133233a9eec5e8c97e905b767f3a9e9a642f54da068d31f39c6311e76

  • SHA512

    b85585ee0a0fda99228e6b6fbd5cf9542182645ad20b9d71a0f9f507e6e279c3ca2d2f67dba0d0e43a2b4e9e9e04c518a126f8f0b4463aad28e0ba73f1d8e4cb

  • SSDEEP

    12288:zW6n3sX4yCFr2ZemYOpSPIsGWeKZl4q7sioXq:zW6ncoyqOp6IsTl/mXq

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 15 IoCs
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f4c3c0133233a9eec5e8c97e905b767f3a9e9a642f54da068d31f39c6311e76.exe
    "C:\Users\Admin\AppData\Local\Temp\7f4c3c0133233a9eec5e8c97e905b767f3a9e9a642f54da068d31f39c6311e76.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\TempFYNJS.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "TCCOULIMHPEFXVE" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\LETDLAUARMGBGVW\service.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1856
    • C:\Users\Admin\AppData\Local\Temp\LETDLAUARMGBGVW\service.exe
      "C:\Users\Admin\AppData\Local\Temp\LETDLAUARMGBGVW\service.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\TempQRWDE.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "HUBKYUSCXJCWDUN" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\TNGMTEFSXPXLWMI\service.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2208
      • C:\Users\Admin\AppData\Local\Temp\TNGMTEFSXPXLWMI\service.exe
        "C:\Users\Admin\AppData\Local\Temp\TNGMTEFSXPXLWMI\service.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Users\Admin\AppData\Local\Temp\TNGMTEFSXPXLWMI\service.exe
          C:\Users\Admin\AppData\Local\Temp\TNGMTEFSXPXLWMI\service.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2604
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              6⤵
              • Modifies firewall policy service
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:2576
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\TNGMTEFSXPXLWMI\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\TNGMTEFSXPXLWMI\service.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\TNGMTEFSXPXLWMI\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\TNGMTEFSXPXLWMI\service.exe:*:Enabled:Windows Messanger" /f
              6⤵
              • Modifies firewall policy service
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:3052
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2556
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              6⤵
              • Modifies firewall policy service
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:3068
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\service.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\service.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\service.exe:*:Enabled:Windows Messanger" /f
              6⤵
              • Modifies firewall policy service
              • System Location Discovery: System Language Discovery
              • Modifies registry key
              PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\TempFYNJS.bat

    Filesize

    163B

    MD5

    748ae393e5989b410dfb895266f7a269

    SHA1

    835cd872e97c2fc98e602c6bba86e05d7fab3fcc

    SHA256

    d864c0c0dd4ce72ab9c0456adb769e10fb99626b46cd17e21dc8bfd118313137

    SHA512

    b5486ea1d3b8678683ca5cd394bf35b5b005c2bc5bf3ff8960f2ea36aadc8b73371b5f66c247ce36fcf6e795390a70cd1a40f965b5026a3140ad71814def45a0

  • C:\Users\Admin\AppData\Local\TempQRWDE.bat

    Filesize

    163B

    MD5

    5f86bd202bfcd38eb1df9dc3f99b3f2d

    SHA1

    20eb5c3c335c0ae536940a2687e7a4b19f36ce56

    SHA256

    d321062aed8a7c06ac93888227db15ce99c621f0c1f748ed53813a296aa4ab84

    SHA512

    4ce449ef9cbe9707adba1be3be1a650c1ff846ad9f3af74ed8428ab64f9c35f0425482af8c5d68afc7d9eff857e369b949b65d9f03e4f7f515f1f3fb3b02045c

  • C:\Users\Admin\AppData\Local\Temp\LETDLAUARMGBGVW\service.exe

    Filesize

    520KB

    MD5

    ef973386711ce7bea7dbd0b72532b061

    SHA1

    5a0400b2561aae4ec23c0d34d37eb5d182504e53

    SHA256

    6d7bb17d221217b0449fe99c4f5ac270dac81b6649b86c4fe134dbfe4cca8ddc

    SHA512

    d7f7b2fa91ea247de0a33e2f73b7b079fbee68e76533ef483f7b69770a8f620a58276a0d6c6ef457d64ff2f35c469830e0daeeb8eb703b177728e7a1982e3c12

  • \Users\Admin\AppData\Local\Temp\TNGMTEFSXPXLWMI\service.exe

    Filesize

    520KB

    MD5

    e0269e99a3d5ebbe7a9061f49ae420f9

    SHA1

    a73a6e743145e4bff1ee04f0b456563e6390f9b6

    SHA256

    447d82721ffb445bc5db9f778745b1b98b657bca3411b770562aa2fb01d39474

    SHA512

    1cb815b612f10b7bc6408dcfc107ff58097f4e50c0005e1939dc8910888c036c482862550dda2d1594904af1b98bde7eeaa61028a0f527307c94367bd944377e

  • memory/2588-71-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-75-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-68-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-70-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-62-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-72-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-74-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-67-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-76-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-78-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-79-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-80-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-82-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-83-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2588-84-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB