Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 12:52
Behavioral task
behavioral1
Sample
904e45514b79e3c4857730d2a346b0ec.exe
Resource
win7-20231215-en
General
-
Target
904e45514b79e3c4857730d2a346b0ec.exe
-
Size
426KB
-
MD5
904e45514b79e3c4857730d2a346b0ec
-
SHA1
719ed039c2aa312ae6bace4ff858201faeff0a12
-
SHA256
f5069e7dd6ca814dd6f31c17a50611ec8629ec5f70b000def405d3e497c1a178
-
SHA512
7c3626b5151803a8c4fcc09f60fa85e5593ea679f05fc12b589f4bc005c1adc33e60543ef5b70f19140190f8c20b88dbd82a93e7b3e90f25286220e3aec757fe
-
SSDEEP
6144:kvk3Q5ibjnNuuXckaL7pbRBkce97awj7L7orT/b:kvMQ5ibjnwka3pbRC19Gwj7orT/b
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral2/memory/2924-0-0x0000000000400000-0x000000000046D000-memory.dmp family_blackmoon behavioral2/files/0x0008000000023155-9.dat family_blackmoon behavioral2/memory/2924-13-0x0000000000400000-0x000000000046D000-memory.dmp family_blackmoon behavioral2/memory/4648-15-0x0000000000400000-0x000000000046D000-memory.dmp family_blackmoon behavioral2/memory/4648-17-0x0000000000400000-0x000000000046D000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 904e45514b79e3c4857730d2a346b0ec.exe -
Deletes itself 1 IoCs
pid Process 4648 Systemvoacy.exe -
Executes dropped EXE 1 IoCs
pid Process 4648 Systemvoacy.exe -
resource yara_rule behavioral2/memory/2924-0-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/files/0x0008000000023155-9.dat upx behavioral2/memory/2924-13-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/4648-15-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/4648-17-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 2924 904e45514b79e3c4857730d2a346b0ec.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe 4648 Systemvoacy.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2924 wrote to memory of 4648 2924 904e45514b79e3c4857730d2a346b0ec.exe 92 PID 2924 wrote to memory of 4648 2924 904e45514b79e3c4857730d2a346b0ec.exe 92 PID 2924 wrote to memory of 4648 2924 904e45514b79e3c4857730d2a346b0ec.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\904e45514b79e3c4857730d2a346b0ec.exe"C:\Users\Admin\AppData\Local\Temp\904e45514b79e3c4857730d2a346b0ec.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Systemvoacy.exe"C:\Users\Admin\AppData\Local\Temp\Systemvoacy.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426KB
MD5757b7d9ed0dfd747a7b8406bd96084b8
SHA1dfac266608dda4c88dc4cbd2348992ecce1d8e71
SHA256a195ed88df99bc6c782d8c8ac26ec1ffa3779cb0d9a2368afa8fd8149944010a
SHA512aded98d91139bcf007b9687680c56ac713ce192a71ae910d47c40b333fa84a42a5a13b6026ff84105c4b7ec567ea7f22b082682fc918f6832a0e66e196a8bb2b
-
Filesize
70B
MD54315730a2b380d1f163f86f455af61c4
SHA188ce32a6bada9fdcffb9b91ff307c9b351555c74
SHA25617fde2662b38ca5f002de108e83829499c9398979be34a9dce5bbf9faa3232a4
SHA512fc697e3a247d6af663f6554875adeb410ad069d591d04372daf9dea9e38b1c77fce439b7ffe144eaa27d19c2675126c02cdf85d884a2c656c6ae0be402752f5b