Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:16
Behavioral task
behavioral1
Sample
0036594a2b13d43bfcfbb67c7f13f76c.exe
Resource
win7-20231215-en
General
-
Target
0036594a2b13d43bfcfbb67c7f13f76c.exe
-
Size
80KB
-
MD5
0036594a2b13d43bfcfbb67c7f13f76c
-
SHA1
f24c31c407508c7f2e118d702595cfc33a6fd973
-
SHA256
b0830320a40f55729e48c0440a0aa7fd6e1d4c17825f3597d373f7063fcdd722
-
SHA512
34912b4943e7da89a6ca7637e337405493986e0a815e78c424ee75cc53aa3979b89741ff9b20d0ef10fa2fc0b2e400a2930ce0d57d17dc1dddeb19fa0c0b490d
-
SSDEEP
1536:+VtjAKqURk0Ex/tIWLSYGc5cmFF+TTdGka2dQe5GrpXLa/:CN1qURFY/RLSO5cmFY9GMdKG/
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/2052-7-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon behavioral1/memory/2684-17-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon behavioral1/memory/2684-21-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 2684 Systemzlgtl.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 Systemzlgtl.exe -
Loads dropped DLL 2 IoCs
pid Process 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe -
resource yara_rule behavioral1/memory/2052-0-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2052-7-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/files/0x000700000001529f-9.dat upx behavioral1/memory/2684-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2684-21-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe 2684 Systemzlgtl.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2684 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 29 PID 2052 wrote to memory of 2684 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 29 PID 2052 wrote to memory of 2684 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 29 PID 2052 wrote to memory of 2684 2052 0036594a2b13d43bfcfbb67c7f13f76c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0036594a2b13d43bfcfbb67c7f13f76c.exe"C:\Users\Admin\AppData\Local\Temp\0036594a2b13d43bfcfbb67c7f13f76c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Systemzlgtl.exe"C:\Users\Admin\AppData\Local\Temp\Systemzlgtl.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70B
MD516fefe70194e000d7f50a97a8a20c0a0
SHA176739235d70497a1840011bd46302675e937af46
SHA256921ae515b0636af038965a0e2315333e9e0d7d25602f7eab20b3c1a3a02f9c12
SHA512a06018f0d37cb15b1e22765c040608cc8de53c0665cfecd8628dd3e3aa1fad77af2412e3300f731e574875e5d8a52b08d616b5b927ea2df04375b5e36b147928
-
Filesize
80KB
MD5c34449e0881aea39ef3c959f48c12498
SHA12f685f7d88a8f9778a73163b951f4f4e288e073a
SHA256ffd351937ac6f501018740021790b15a4b3aabacd8497c0ba8e4ac74504bbf09
SHA5128fb3a204f07668a00dce1197e42e5ccaeb3931be63b0795f3e6c70dfae469040ee62c5b6fd2b2289270a3211f7e16b164bdf7afbd123eb6ad1e9843583caec0e