Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
18/03/2025, 02:22
Behavioral task
behavioral1
Sample
32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe
Resource
win7-20241023-en
General
-
Target
32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe
-
Size
339KB
-
MD5
29925e49ebee7466d78ba6896de1b280
-
SHA1
3b8da560f2436a3a065fadfdb542c753f40bdcd9
-
SHA256
32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de
-
SHA512
c771c9e91fd150249c76974ba55d9e1f1b00e8c734d27efc093ad68b613ed133c728caec0133df303f82270b563064929d206c147d41e2d95702a0cde0c683ec
-
SSDEEP
6144:IXdaAfyvRwWoe2XlFSFb3bzpYpYFRQnyHWPBsx1:IXdaAqvRwWoe2XjSVvUYuyHWPBsx1
Malware Config
Extracted
qqpass
http://cf.qq.com/act/a20141214luxury/?ADTAG=client.btn.detail
-
url
http://i3.tietuku.com/801db876cdcaa96c.png
-
user_agent
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000015cfc-189.dat family_blackmoon -
Qqpass family
-
Executes dropped EXE 1 IoCs
pid Process 1656 Sysceamfqzec.exe -
Loads dropped DLL 2 IoCs
pid Process 2076 32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe 2076 32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysceamfqzec.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 1900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd90b000000010000001200000044006900670069004300650072007400000014000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd155090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde 32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Sysceamfqzec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Sysceamfqzec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe 1656 Sysceamfqzec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1656 2076 32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe 29 PID 2076 wrote to memory of 1656 2076 32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe 29 PID 2076 wrote to memory of 1656 2076 32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe 29 PID 2076 wrote to memory of 1656 2076 32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe"C:\Users\Admin\AppData\Local\Temp\32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Sysceamfqzec.exe"C:\Users\Admin\AppData\Local\Temp\Sysceamfqzec.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C
Filesize471B
MD5748ac2950512e7a84706ead4ae3ca696
SHA1721e46335a8612ef899a10a398f09832710914b6
SHA256199b44a2d5a612c2eb543d4d781201fd3127af4418e308866e0803d9ba24262e
SHA51279e3167a99a4f30935825c8cc06ce4782012cb551db16826df40ff7c1506b88b0133cdd3195755568dc78b19c345fc000ce27b240f68f641c9338abba2b9801f
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_A0B760D8ABF6F649D185B46E3E114CC2
Filesize471B
MD5dee3b52e37da8d91dbd87b552263ce4a
SHA17b92d79052d127852947eb6d45a5744c74d465b4
SHA256b1a4186d325a70198b7662eb18094bf097fc349ed2f3c9f9226f518c4d0b4acb
SHA512420b058aaafedad2de52cc011c5554197aed6e1c911b20eb7a822badad06f606ee1e21071ffba41b1100c4516cec920330320fd45816d2cba1d7a6fda6a51eba
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C
Filesize398B
MD5b8de3c06d1c992c0af6af22a5469119f
SHA13053172bfc0605e5e41d6d6bdc81f598a2a66e13
SHA256e448007dd9e8c1ed564c73ae28b21c25855db9a0f8b574fc28563c32292dd471
SHA51236fa00f0493ff3fda0523b96904e0566ca31a06c8a78c0512cd25e16c95f311c499be39306cdfb436dadd465e648279fcb063f3ed19f581d122b54f9f3a39d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dae01b0f0f764086627e649e5dd82f0
SHA137a74b9a83c9964fc678054e9dc0a4f510990aa5
SHA2564983f49e0dc0179f283403ab350d5baea5ec84331e64a2a2430f13863d0b9699
SHA5121f77f4dc6ed57ffd194255f2590121fa91f814d323d0189e5c0680af038541c93e1f77bcfff57e71bad8c99cfd092cfb5ebb61f27e58129ebb2d5a20aa88cbda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_A0B760D8ABF6F649D185B46E3E114CC2
Filesize410B
MD556cc423da3d6e05b4217b112e2f3eb63
SHA119d3f4e6a0854d82c15b763d386df152d2aa7a11
SHA25613d4fdddbbe33aadc5a3fcb1b0eb38d0c9cf5ffbd121d3921d5140d29c794a1d
SHA5124641bbdd86f0201922ca61a3904c9b1e0ec920b5573bbfe08160765d3240e9fbdd645b3218d9414771cf42a3c31854990d0359a1d67dc4fc41be75b271844df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C1B8D87CA29E93F2FEEB2834BE22FBB2
Filesize250B
MD59a30612bd567cacbd86d770abc9c7876
SHA12b8358498cd1894f6bed0e8ad647102fd60499f7
SHA256d91bb811487714a51acf79a81fbd7eb0fe9c3c156acc1405b77c72a7fff0c1b9
SHA5128e532f3b6252d00da169e3a32c6440c0c5583accd7705e34b9f08ff8da0b54128333c71789e8cc1a59093ac436085399edf89c6897a53fbf0b45d27f2a274e7e
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
102B
MD5664c199d6569a35101a3245ed3de9eea
SHA149c4e25a77b83cacd69dfd59ff7ba2f86b4dfd34
SHA25643df73d8cb456ea8ed9c236a58b5587a6c59877c9e026fcd6b31925436c28013
SHA512cb2567ac507d941792f3d214f043a321beec068d54b075e6746ce86ff163119766c677c486b521a5b1023ef57218bdbc664145a541c1a9bc68a6d9431b28bb77
-
Filesize
339KB
MD539ffe103c23f9173820099f3edaeec83
SHA13d3fa90856bbefacf16c1b70934d3b06aaaaf0f7
SHA256d36d62474b8d9fe4bc86c1022872243bd4384c28824d1bd8ee616e46aa580a18
SHA512c9debead4cb986d29a752a9b60fb9fbd090da76926e85be01c6cf579b425f5b501012053bf21dde43349c8087da6bc47afef95869fce0bd67140ba47f6acf7a9