Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    298s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2025, 01:15

General

  • Target

    1890c78a3c93a98b369c10f6f3cd2de069d9ab456172b732a890c52a5546f3c8.exe

  • Size

    436KB

  • MD5

    b2f6b9e3c10c59c3f0979f4c9b67c8ec

  • SHA1

    ae228cc40ec62a7a83fd4a5426462069e1bc40cf

  • SHA256

    1890c78a3c93a98b369c10f6f3cd2de069d9ab456172b732a890c52a5546f3c8

  • SHA512

    a8ce45f33739726f25170d05fade6ecbcae9ecb13c4e4203b3fc75ad6c1cfedda812b90ddd1508b77b00618256f0e607eb91d4d11c32340e6dc545aed0a83852

  • SSDEEP

    3072:q0mx45LFnq9qDAuSbAXVkQUQ9oPfz0c0uxNUIqTkHoYCDfxj4/0/yjUuMx8kl:q0m2FqgDAuSbAXKfz0c0sUIJHk40/yWp

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1890c78a3c93a98b369c10f6f3cd2de069d9ab456172b732a890c52a5546f3c8.exe
    "C:\Users\Admin\AppData\Local\Temp\1890c78a3c93a98b369c10f6f3cd2de069d9ab456172b732a890c52a5546f3c8.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\AppData\Local\Temp\Syslemeqgqc.exe
      "C:\Users\Admin\AppData\Local\Temp\Syslemeqgqc.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Syslemeqgqc.exe

    Filesize

    436KB

    MD5

    b8425e4c2fab7b3eb34d7dace97e7c64

    SHA1

    8dd3f3921d9ebca4f75fec3253b0f2ee444042ca

    SHA256

    55f1e37ae6c361025a828662263b958fb087f95cd2210b9bb64ded4311e60d1f

    SHA512

    2b0cf241bc5667e4f739564662d16432c4a44ad0ff755b31d17adc9cb1fcd313b9c55be721a0a41e3b2b0b245476fe7f58373708bf1b704e2a85fc31a679b984

  • C:\Users\Admin\AppData\Local\Temp\lpath.ini

    Filesize

    102B

    MD5

    cce0d6b6190cf17c199f4ddef9e1afb9

    SHA1

    7d1273eea354687bfeff833aea8b4f8857edaa15

    SHA256

    b093cf107c6f45018213fa6b684c3a70cdc3b1c74ba9eea1d5d53549ae7efd77

    SHA512

    d0d5cead8834e418ccc787ea74a7e80ec2328d630996b561617534a47c48d3c5ce780f137ee9879b766a8ba3323e6fea4769760fd1458f3f652cb9eef56b5436