Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    17/03/2025, 16:14

General

  • Target

    fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe

  • Size

    87KB

  • MD5

    7d2fe62969a460c13d100081295495c8

  • SHA1

    c5d94f5742d78788cf52a6e42dba440e14131adb

  • SHA256

    fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f

  • SHA512

    6579b008678dd2a9b77b5f11d4c4435e5825cf6e8ee9493736aa5f20f499d5f2528322fb3b7888e7e74ff18a1401bc7e1594cd5298d995cc757e70f2566cb844

  • SSDEEP

    1536:5+4hkM3Yz8wMZhUD2XsjEQWOSkE+Ct6WKBex3GWU5FkWp+AmQwKGSZhCQbIo/tSp:dq6OLM3QasY5Ft71fqWWp+efG4hCQr+

Malware Config

Extracted

Family

qqpass

C2

http://lol.qq.com/act/a20141212poroking/index.htm?atm_cl=ctips&atm_pos=1257?ADTAG=media.innerenter.client.jump

Attributes
  • url

    http://i2.tietuku.com/ebdef15df1128b31.png

  • user_agent

    Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • QQpass

    QQpass is a trojan written in C++..

  • Qqpass family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe
    "C:\Users\Admin\AppData\Local\Temp\fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\Temp\Syslemiyjeh.exe
      "C:\Users\Admin\AppData\Local\Temp\Syslemiyjeh.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lpath.ini

    Filesize

    102B

    MD5

    6ef22b4616d0c68314a174ba95b8fac7

    SHA1

    5449dfc5952420d5f02afd0973bb2c07e10da0e5

    SHA256

    83b3417e7e3eb82ace522fe84b061ee619df0dd13709922432148dc5cde04708

    SHA512

    812d0a99f8d629888c93c352b24236cf976747ac9269cc73efa3519b42fe48cb4725d948968b0e164279b01cf54113a4ffd222bba332fb4525eec5c6323975c1

  • \Users\Admin\AppData\Local\Temp\Syslemiyjeh.exe

    Filesize

    87KB

    MD5

    c54b30956fcf252765dbf76281d909ae

    SHA1

    549d28179c0880a89cbdef024e8821bde0dfd6ea

    SHA256

    d77561f99aad5f82054eb550736bc322f4dd8ad6fd5943a6e1ca3100a48d4c84

    SHA512

    05bc3ec42a45498a346fdf7a153c357b6bd7edd248d866fb5ab4838b5462d69a816b168070d455f01391c4ecc24a02aae885b38cc3bda90ebded349753685786

  • memory/828-19-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2948-0-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2948-7-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB