Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 05:16
Behavioral task
behavioral1
Sample
786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe
Resource
win7-20240903-en
General
-
Target
786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe
-
Size
396KB
-
MD5
bec7c9faf5bb63cdc51302fe0ea5e002
-
SHA1
715d1d2cf44a04d8522bf6eef3721df1c26eafe3
-
SHA256
786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22
-
SHA512
18739b242b3a74406958f00225d5e28ea6021acc6e7c4e226aecd8956f13fc826223e7ce526ca7f96582a143ef880b228637bf4b24757c7b15c98e4603d1c10f
-
SSDEEP
6144:7vbuWQu/cuaS2l8iE0B55FrJJJekPdb5J22l:7vqWQub2lrE0B55FpekPdb/22l
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x00090000000242cc-11.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe -
Executes dropped EXE 1 IoCs
pid Process 3856 Syslemvjxto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemvjxto.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe 3856 Syslemvjxto.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5612 wrote to memory of 3856 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 88 PID 5612 wrote to memory of 3856 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 88 PID 5612 wrote to memory of 3856 5612 786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe"C:\Users\Admin\AppData\Local\Temp\786a239ae39c35117b5388ec4d7705898c5d1f3192c237f68be8db6f332b1a22.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5612 -
C:\Users\Admin\AppData\Local\Temp\Syslemvjxto.exe"C:\Users\Admin\AppData\Local\Temp\Syslemvjxto.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD583ea8d6727682d283bf74725bd855a05
SHA113099e35557bf90b32c17627b3a55d2c1454f1a9
SHA256efad552bfec7951f18cd1716a35bf95e548b4e2603bf289e7e81d84138188836
SHA5127cc614d294a29a81d25d170219dfebf231aeb931c2d9293830bc43d3fc8fb01a0c5c18a45a1772128c5bfc6592cde1eaf4f60fec1f41c936503df58e5b052fd7
-
Filesize
102B
MD538e573fac354271844137cc55e09b34e
SHA1905c43906d277227ccc2e1a2bed33a44269d4655
SHA256a0b303cb2d365f5412329c87a505c707c67f40804208526b3ec20bd1ca50a5d7
SHA51252a3bb75cb648594c08bce3a68a5bd5924a6ea847f85bc6bd02be1d569ae16368fb473c0abd4f5dedbc2ee4181ca68b2f52e2888c61c979c891bf432390e631a