Analysis
-
max time kernel
170s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 20:03
Behavioral task
behavioral1
Sample
e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe
Resource
win7-20240221-en
General
-
Target
e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe
-
Size
366KB
-
MD5
a0307df6eb0b3cce819ad6a5894c08ee
-
SHA1
13725598a9d292256bc6321bf8abeb2220e479c7
-
SHA256
e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428
-
SHA512
ba9a10f71653d4a5365db9168a4e2939d10b4e6ec9ef4fd908a288561d20297c819b1bdb4b673113099b07c522fe8d0637a91a160034bdd392e2f666e8bd6a3a
-
SSDEEP
6144:BSfSHl+gv5gY1F53Aul/Egv4+E6qnwEGvIkJ7G9P1p:B2SHl+gv5gY1b5Eo4+EsEEIkJ7G9P1p
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x00020000000228bf-8.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe -
Deletes itself 1 IoCs
pid Process 4012 Syslemkpide.exe -
Executes dropped EXE 1 IoCs
pid Process 4012 Syslemkpide.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe 4012 Syslemkpide.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1756 wrote to memory of 4012 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 93 PID 1756 wrote to memory of 4012 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 93 PID 1756 wrote to memory of 4012 1756 e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe"C:\Users\Admin\AppData\Local\Temp\e76f9b6958fca510d682943b4234893a0e4a8d81d75c8c30aac38e5a916f1428.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Syslemkpide.exe"C:\Users\Admin\AppData\Local\Temp\Syslemkpide.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366KB
MD50a316597b56cfddc45f3a8568c8da0ca
SHA14a38f4b9e6b39dfd2efc5687f12da804ef1f4934
SHA256956100ec032fe6477f26beb4054d6068d5a11b5351ff961c131bd7c57dda51c6
SHA51289bd1f8c045dbe0eaad23e7d4eccf069e86c5cb391f2984e38a1378061e57640bf043f243804b8c8a9f016d78b4031900bb2f5231d4628ca5fa1a1212b55d535
-
Filesize
102B
MD51226e6a47fdbfd78df76bdd45cb0564c
SHA18a08de365b4413c6d7882bfd8a3775d26d367712
SHA2562280de56f43d6a590c031f896069615a7aec2a7f749bc20b323eb67a253da6d3
SHA512bd620b7b953abc34714ee711d6b77cac9c81dd195884cb8e37937822cd2884a0775bf7413c92f17784e7f1e500f18951f95e7918f5a6fecfee546a2d34a4f029