Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2025, 16:14
Behavioral task
behavioral1
Sample
fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe
Resource
win7-20250207-en
General
-
Target
fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe
-
Size
87KB
-
MD5
7d2fe62969a460c13d100081295495c8
-
SHA1
c5d94f5742d78788cf52a6e42dba440e14131adb
-
SHA256
fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f
-
SHA512
6579b008678dd2a9b77b5f11d4c4435e5825cf6e8ee9493736aa5f20f499d5f2528322fb3b7888e7e74ff18a1401bc7e1594cd5298d995cc757e70f2566cb844
-
SSDEEP
1536:5+4hkM3Yz8wMZhUD2XsjEQWOSkE+Ct6WKBex3GWU5FkWp+AmQwKGSZhCQbIo/tSp:dq6OLM3QasY5Ft71fqWWp+efG4hCQr+
Malware Config
Extracted
qqpass
http://lol.qq.com/act/a20141212poroking/index.htm?atm_cl=ctips&atm_pos=1257?ADTAG=media.innerenter.client.jump
-
url
http://i2.tietuku.com/ebdef15df1128b31.png
-
user_agent
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/1744-14-0x0000000000400000-0x000000000047F000-memory.dmp family_blackmoon behavioral2/memory/4472-16-0x0000000000400000-0x000000000047F000-memory.dmp family_blackmoon -
Qqpass family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe -
Deletes itself 1 IoCs
pid Process 4472 Syslemvqlrd.exe -
Executes dropped EXE 1 IoCs
pid Process 4472 Syslemvqlrd.exe -
resource yara_rule behavioral2/memory/1744-0-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x000700000001e6ad-9.dat upx behavioral2/memory/1744-14-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4472-16-0x0000000000400000-0x000000000047F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemvqlrd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe 4472 Syslemvqlrd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1744 wrote to memory of 4472 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 91 PID 1744 wrote to memory of 4472 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 91 PID 1744 wrote to memory of 4472 1744 fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe"C:\Users\Admin\AppData\Local\Temp\fbbe1fe68bbf79fdd9eb90f2f124dfbaa1622ad6cec11557f91f020d68747a3f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Syslemvqlrd.exe"C:\Users\Admin\AppData\Local\Temp\Syslemvqlrd.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD59975e94765bfcc2c0ec0a861dbab552c
SHA13848d2042a94ad80b352a0efdab9e35f673bd6b9
SHA256b2b24d11012604e30b001ab84565d3a8c4bd3f8d8253ef09ae8549ef3498bc81
SHA51216f3503314888bfd345e8c3446a09d6e68505e79e8fccbe11038ada33125943c4a2075ee07bad9bb3357f67a3a6d9af8a600b300d910d8b15965a140531cbfe3
-
Filesize
102B
MD56ef22b4616d0c68314a174ba95b8fac7
SHA15449dfc5952420d5f02afd0973bb2c07e10da0e5
SHA25683b3417e7e3eb82ace522fe84b061ee619df0dd13709922432148dc5cde04708
SHA512812d0a99f8d629888c93c352b24236cf976747ac9269cc73efa3519b42fe48cb4725d948968b0e164279b01cf54113a4ffd222bba332fb4525eec5c6323975c1