Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 03:35
Behavioral task
behavioral1
Sample
4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe
Resource
win7-20240903-en
General
-
Target
4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe
-
Size
366KB
-
MD5
355d2ded45a14353d8f45b36d2ba98ee
-
SHA1
caefd74e1104c5f5ffa0d375c043b5974195692c
-
SHA256
4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1
-
SHA512
d0f239398b6f33c38d158603ed558ac9f78bd605e04c76835cfbf96299022989c0a7401218a0332c7ac9b74e1dd9b4c6dcc31f342465994b82aad098fa6ca580
-
SSDEEP
6144:BSfSHl+gv5gY1F53Aul/Egv4+E6qnwEGvIkJ7G9P1w:B2SHl+gv5gY1b5Eo4+EsEEIkJ7G9P1w
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x00070000000242e2-8.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe -
Deletes itself 1 IoCs
pid Process 4892 Syslemybnsb.exe -
Executes dropped EXE 1 IoCs
pid Process 4892 Syslemybnsb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemybnsb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe 4892 Syslemybnsb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4184 wrote to memory of 4892 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 88 PID 4184 wrote to memory of 4892 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 88 PID 4184 wrote to memory of 4892 4184 4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe"C:\Users\Admin\AppData\Local\Temp\4e41422bb2b4d06ee9d73a82ddb4bb23d2a57d76f4a04d8fae29293ec3a309e1.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\Syslemybnsb.exe"C:\Users\Admin\AppData\Local\Temp\Syslemybnsb.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366KB
MD5bd6e73bad7ea33494f945d8523791417
SHA156fccb460b1c356c9b6b17695a6984d69767ab2b
SHA2569e393d0d6c48e967d5c2df408640135002198da8fcdb1a48ec9ea7ca4f0fcec1
SHA512a84de8a85e3fc29337a0b9abc1d3bacc01dd9dfde3572fd164f3b25065f6805afcf5936ebc729275c6d94992db95184f4b021b8cb248e62e8d17101bd75eeb28
-
Filesize
102B
MD5039e2e82d3f5b880f6e375c8501dfd05
SHA14a7034365c968f40f105004af27c957f90af0536
SHA256c3af00f04ce5844b8a5d1dc164b54ff6e13aa59897cf90afecac745c68c645fa
SHA5123a09257f070bb5e19783e6cc2e79e1a6a11f542c569b374663777ed69bcb0b643f3d5b1cc96d5ee0df9e62c9bac6d74a41a028e6ff47568a4656165041a8080a