Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
286s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 06:23
Behavioral task
behavioral1
Sample
96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe
Resource
win7-20240903-en
General
-
Target
96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe
-
Size
452KB
-
MD5
07c286fc278d5b87fa2510cbc50691dd
-
SHA1
b4c0166d681b26a44bfd4f18c8a1519d8707f6de
-
SHA256
96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605
-
SHA512
d9b3ad65bb1748657b3d361eb64cd573865c95c70982552155a6a410f57b37a8038ebfe6a6366ad6a764ac9916c5bc1f6719985639569fed974de552f2546117
-
SSDEEP
6144:/vPBvEQR6H3Udg2FuHRfepwqHpA7b2+yO2COKCZJ:/vpv/R6H3U25fehHpAW+yOBOKCZJ
Malware Config
Extracted
qqpass
-
user_agent
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/2084-0-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral2/files/0x000c00000000072d-12.dat family_blackmoon behavioral2/memory/2084-43-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral2/memory/4584-55-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon -
Qqpass family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 elxplorervytqe.exe -
resource yara_rule behavioral2/memory/2084-0-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/files/0x000c00000000072d-12.dat upx behavioral2/memory/2084-43-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4584-55-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elxplorervytqe.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2084 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 2084 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 2084 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 2084 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 2084 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 2084 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe 4584 elxplorervytqe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2084 wrote to memory of 4584 2084 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 91 PID 2084 wrote to memory of 4584 2084 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 91 PID 2084 wrote to memory of 4584 2084 96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe"C:\Users\Admin\AppData\Local\Temp\96445ae765d1c9ef741b1987aab10b316fe12d11d7579ec237a0bb221df6f605.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\elxplorervytqe.exe"C:\Users\Admin\AppData\Local\Temp\elxplorervytqe.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD506fc833a87febe383cd21746e166e15c
SHA1f2eae5c6fd6ece617f51fd8c86e31a248ea745c4
SHA256a645f2fa6a9dbb807bbbdaf8c25c89293e58d4122a29da03bf0c3c23527ce0e0
SHA512f840cf09ebd7fd1f1b28bf3a94edc4124226e5faedc240c7cc49da60084d11035f464ed75ef316007ac53b9836ff87656a79cdb63dcd3773ca8819072913cfc9
-
Filesize
102B
MD5a00c1612477ac64985dba634ca7a0983
SHA1a1b2da105e5bfa7af71920ded086a76478cb7eb6
SHA2566954d5460e8772a0fbcbb5465b7c252f796c3001e8c708d0dcf32e56d0cbe5f9
SHA51202e158f03b3e3aba4798141ba8beeed2d11458730e4da2e09a03f1d4692b6d24c417a4515e3c7f30a2925dafe9adfdb1bc8859be1268d0ea5a1a6e059bd38cec