Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 12:47
Behavioral task
behavioral1
Sample
d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe
Resource
win7-20240319-en
General
-
Target
d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe
-
Size
396KB
-
MD5
ec221c0b18e1e431bda3c714a45db18f
-
SHA1
96b694c61f696110bdf5441ca63a0456382505ec
-
SHA256
d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca
-
SHA512
f4909e34dfcc2a105e39b544f6d98925b57baef30979bc99cb308efda3c537ec460af0fa6271ca97cfd146754524e152300ba2fe3dd52b40b1269f13d4d5bf0c
-
SSDEEP
6144:7vbuWQu/cuaS2l8iE0B55FrJJJekPdb5J22u:7vqWQub2lrE0B55FpekPdb/22u
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000019415-11.dat family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 2816 Syslemxpukt.exe -
Loads dropped DLL 2 IoCs
pid Process 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Syslemxpukt.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Syslemxpukt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe 2816 Syslemxpukt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2816 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 29 PID 1932 wrote to memory of 2816 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 29 PID 1932 wrote to memory of 2816 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 29 PID 1932 wrote to memory of 2816 1932 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe"C:\Users\Admin\AppData\Local\Temp\d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Syslemxpukt.exe"C:\Users\Admin\AppData\Local\Temp\Syslemxpukt.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5839d60ac2ddfbe4359d66138e569e641
SHA1cce83cab7e712b96ab4541d31a40ee2e5e4c3200
SHA2561a6d6aba1c7c3baf07693e27253cc887e131edc60bcb6e3b53273c2aa3fc24bf
SHA512bdd8c6adb0414950283be1bb14ce862cf3f3b34c9769b57f676c12640f517599de05ec74875ce45b316a67fc212c719a2e1c573ab0b4c9f3c10c8f8e8cadce99
-
Filesize
102B
MD540c9ef1275e833f97137c1cec6acd13a
SHA12fa374bd947cf7ef12c957f2507a28b48ed9c199
SHA25641608f820d8a4c64439ceecfcd17aa8b54b69b790e75f8994c89981aaf597c81
SHA51283f18b69516aca15d5e8b7d8db883e142b3335c896780a3c085c75382fe964ed64d66afaf422d6eff5a34241bfc4a1dddd54e5efa5eb65fdc83d718a9909116b