Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
18/03/2025, 01:17
Behavioral task
behavioral1
Sample
16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe
Resource
win7-20250207-en
General
-
Target
16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe
-
Size
440KB
-
MD5
d545053a9c721cc5b9d513264beb92b8
-
SHA1
31bcda7c3aebeae23edbe73782d68416805dd9e8
-
SHA256
16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a
-
SHA512
1eec9db9fdc723d47539801a4bf69dbdbae7670609b8575b4a5e7eec4829909fa8b6f71abc601c19c1f77e876ecbf290c775d98fdabb76b3c781afe60e58cf3e
-
SSDEEP
6144:xozXQKqfmiiyWwuiFOLeyOV0R7YRXxMSaAW:xgXQKSLpOCtV0R8xMSaAW
Malware Config
Extracted
qqpass
http://lol.qq.com/act/a20141212poroking/index.htm?atm_cl=ctips&atm_pos=1257?ADTAG=media.innerenter.client.jump
-
url
http://i2.tietuku.com/ebdef15df1128b31.png
-
user_agent
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000015cb7-7.dat family_blackmoon -
Qqpass family
-
Deletes itself 1 IoCs
pid Process 2832 Syslemfuyvr.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 Syslemfuyvr.exe -
Loads dropped DLL 2 IoCs
pid Process 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe 2832 Syslemfuyvr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2832 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 31 PID 2164 wrote to memory of 2832 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 31 PID 2164 wrote to memory of 2832 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 31 PID 2164 wrote to memory of 2832 2164 16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe"C:\Users\Admin\AppData\Local\Temp\16cc88e682c36823d09dd1d626fc315b960fca78aa798d7f75e799de7c21886a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Syslemfuyvr.exe"C:\Users\Admin\AppData\Local\Temp\Syslemfuyvr.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5dcbdd25641e21844b2edbc2d5fab7066
SHA1ef8bb78633d5123b09cdf3bb94933aa1b3384bbd
SHA256fbe5d2884ad88173e7bbed99f3acf6b1e9795a8528b577bdd36318b960dd34ae
SHA512e22b49c4bf7d19da0f526d79e535e77a3cb23e6b306a0dea19f573a2a731a6d45d670b169f1bad55f0a70cae55c9982fb24ea30170ef64fd00a8ac6d081c6cf3
-
Filesize
440KB
MD5738beb9249468ee9ed19190868347369
SHA1853e1bf406079845e70db4d9e1394f5a4e6b2c45
SHA2568096144219454341a403fcff3de863b33913d066c56da9475f23bbea924c79df
SHA51213a54397002d21b58ecf1c95b53220ebf01faa2a776545743268b2f981a5fe38983700b1eb31cb62c254e84c56928609ec32d37deec81b5fd9e8908c2f2f1a6e