Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    299s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2025, 02:22

General

  • Target

    32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe

  • Size

    339KB

  • MD5

    29925e49ebee7466d78ba6896de1b280

  • SHA1

    3b8da560f2436a3a065fadfdb542c753f40bdcd9

  • SHA256

    32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de

  • SHA512

    c771c9e91fd150249c76974ba55d9e1f1b00e8c734d27efc093ad68b613ed133c728caec0133df303f82270b563064929d206c147d41e2d95702a0cde0c683ec

  • SSDEEP

    6144:IXdaAfyvRwWoe2XlFSFb3bzpYpYFRQnyHWPBsx1:IXdaAqvRwWoe2XjSVvUYuyHWPBsx1

Malware Config

Extracted

Family

qqpass

C2

http://cf.qq.com/act/a20141214luxury/?ADTAG=client.btn.detail

Attributes
  • url

    http://i3.tietuku.com/801db876cdcaa96c.png

  • user_agent

    Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 1 IoCs
  • QQpass

    QQpass is a trojan written in C++..

  • Qqpass family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe
    "C:\Users\Admin\AppData\Local\Temp\32fac7c582f5a5b5c74ad95997a1e914aa5410926fdfa179eeb5ab8540bd10de.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\Sysceamfqzec.exe
      "C:\Users\Admin\AppData\Local\Temp\Sysceamfqzec.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:1656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C

    Filesize

    471B

    MD5

    748ac2950512e7a84706ead4ae3ca696

    SHA1

    721e46335a8612ef899a10a398f09832710914b6

    SHA256

    199b44a2d5a612c2eb543d4d781201fd3127af4418e308866e0803d9ba24262e

    SHA512

    79e3167a99a4f30935825c8cc06ce4782012cb551db16826df40ff7c1506b88b0133cdd3195755568dc78b19c345fc000ce27b240f68f641c9338abba2b9801f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_A0B760D8ABF6F649D185B46E3E114CC2

    Filesize

    471B

    MD5

    dee3b52e37da8d91dbd87b552263ce4a

    SHA1

    7b92d79052d127852947eb6d45a5744c74d465b4

    SHA256

    b1a4186d325a70198b7662eb18094bf097fc349ed2f3c9f9226f518c4d0b4acb

    SHA512

    420b058aaafedad2de52cc011c5554197aed6e1c911b20eb7a822badad06f606ee1e21071ffba41b1100c4516cec920330320fd45816d2cba1d7a6fda6a51eba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C1B8D87CA29E93F2FEEB2834BE22FBB2

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C

    Filesize

    398B

    MD5

    b8de3c06d1c992c0af6af22a5469119f

    SHA1

    3053172bfc0605e5e41d6d6bdc81f598a2a66e13

    SHA256

    e448007dd9e8c1ed564c73ae28b21c25855db9a0f8b574fc28563c32292dd471

    SHA512

    36fa00f0493ff3fda0523b96904e0566ca31a06c8a78c0512cd25e16c95f311c499be39306cdfb436dadd465e648279fcb063f3ed19f581d122b54f9f3a39d74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0dae01b0f0f764086627e649e5dd82f0

    SHA1

    37a74b9a83c9964fc678054e9dc0a4f510990aa5

    SHA256

    4983f49e0dc0179f283403ab350d5baea5ec84331e64a2a2430f13863d0b9699

    SHA512

    1f77f4dc6ed57ffd194255f2590121fa91f814d323d0189e5c0680af038541c93e1f77bcfff57e71bad8c99cfd092cfb5ebb61f27e58129ebb2d5a20aa88cbda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_A0B760D8ABF6F649D185B46E3E114CC2

    Filesize

    410B

    MD5

    56cc423da3d6e05b4217b112e2f3eb63

    SHA1

    19d3f4e6a0854d82c15b763d386df152d2aa7a11

    SHA256

    13d4fdddbbe33aadc5a3fcb1b0eb38d0c9cf5ffbd121d3921d5140d29c794a1d

    SHA512

    4641bbdd86f0201922ca61a3904c9b1e0ec920b5573bbfe08160765d3240e9fbdd645b3218d9414771cf42a3c31854990d0359a1d67dc4fc41be75b271844df0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C1B8D87CA29E93F2FEEB2834BE22FBB2

    Filesize

    250B

    MD5

    9a30612bd567cacbd86d770abc9c7876

    SHA1

    2b8358498cd1894f6bed0e8ad647102fd60499f7

    SHA256

    d91bb811487714a51acf79a81fbd7eb0fe9c3c156acc1405b77c72a7fff0c1b9

    SHA512

    8e532f3b6252d00da169e3a32c6440c0c5583accd7705e34b9f08ff8da0b54128333c71789e8cc1a59093ac436085399edf89c6897a53fbf0b45d27f2a274e7e

  • C:\Users\Admin\AppData\Local\Temp\Tar546E.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • C:\Users\Admin\AppData\Local\Temp\cpath.ini

    Filesize

    102B

    MD5

    664c199d6569a35101a3245ed3de9eea

    SHA1

    49c4e25a77b83cacd69dfd59ff7ba2f86b4dfd34

    SHA256

    43df73d8cb456ea8ed9c236a58b5587a6c59877c9e026fcd6b31925436c28013

    SHA512

    cb2567ac507d941792f3d214f043a321beec068d54b075e6746ce86ff163119766c677c486b521a5b1023ef57218bdbc664145a541c1a9bc68a6d9431b28bb77

  • \Users\Admin\AppData\Local\Temp\Sysceamfqzec.exe

    Filesize

    339KB

    MD5

    39ffe103c23f9173820099f3edaeec83

    SHA1

    3d3fa90856bbefacf16c1b70934d3b06aaaaf0f7

    SHA256

    d36d62474b8d9fe4bc86c1022872243bd4384c28824d1bd8ee616e46aa580a18

    SHA512

    c9debead4cb986d29a752a9b60fb9fbd090da76926e85be01c6cf579b425f5b501012053bf21dde43349c8087da6bc47afef95869fce0bd67140ba47f6acf7a9