Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/03/2025, 06:23
Behavioral task
behavioral1
Sample
96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe
Resource
win7-20240903-en
General
-
Target
96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe
-
Size
452KB
-
MD5
07c286fc278d5b87fa2510cbc50691dd
-
SHA1
b4c0166d681b26a44bfd4f18c8a1519d8707f6de
-
SHA256
96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605
-
SHA512
d9b3ad65bb1748657b3d361eb64cd573865c95c70982552155a6a410f57b37a8038ebfe6a6366ad6a764ac9916c5bc1f6719985639569fed974de552f2546117
-
SSDEEP
6144:/vPBvEQR6H3Udg2FuHRfepwqHpA7b2+yO2COKCZJ:/vpv/R6H3U25fehHpAW+yOBOKCZJ
Malware Config
Extracted
qqpass
-
user_agent
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral1/memory/2336-0-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral1/memory/2336-11-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral1/files/0x00070000000167ea-13.dat family_blackmoon behavioral1/memory/2828-21-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral1/memory/2828-145-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon -
Qqpass family
-
Executes dropped EXE 1 IoCs
pid Process 2828 elxplorerbzzwh.exe -
Loads dropped DLL 2 IoCs
pid Process 2336 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 2336 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe -
resource yara_rule behavioral1/memory/2336-0-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2336-11-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/files/0x00070000000167ea-13.dat upx behavioral1/memory/2828-21-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2828-145-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elxplorerbzzwh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2336 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 2336 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 2336 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe 2828 elxplorerbzzwh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2828 2336 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 32 PID 2336 wrote to memory of 2828 2336 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 32 PID 2336 wrote to memory of 2828 2336 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 32 PID 2336 wrote to memory of 2828 2336 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe"C:\Users\Admin\AppData\Local\Temp\96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\elxplorerbzzwh.exe"C:\Users\Admin\AppData\Local\Temp\elxplorerbzzwh.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
452KB
MD506fc833a87febe383cd21746e166e15c
SHA1f2eae5c6fd6ece617f51fd8c86e31a248ea745c4
SHA256a645f2fa6a9dbb807bbbdaf8c25c89293e58d4122a29da03bf0c3c23527ce0e0
SHA512f840cf09ebd7fd1f1b28bf3a94edc4124226e5faedc240c7cc49da60084d11035f464ed75ef316007ac53b9836ff87656a79cdb63dcd3773ca8819072913cfc9
-
Filesize
102B
MD5a00c1612477ac64985dba634ca7a0983
SHA1a1b2da105e5bfa7af71920ded086a76478cb7eb6
SHA2566954d5460e8772a0fbcbb5465b7c252f796c3001e8c708d0dcf32e56d0cbe5f9
SHA51202e158f03b3e3aba4798141ba8beeed2d11458730e4da2e09a03f1d4692b6d24c417a4515e3c7f30a2925dafe9adfdb1bc8859be1268d0ea5a1a6e059bd38cec