Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 12:47
Behavioral task
behavioral1
Sample
d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe
Resource
win7-20240319-en
General
-
Target
d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe
-
Size
396KB
-
MD5
ec221c0b18e1e431bda3c714a45db18f
-
SHA1
96b694c61f696110bdf5441ca63a0456382505ec
-
SHA256
d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca
-
SHA512
f4909e34dfcc2a105e39b544f6d98925b57baef30979bc99cb308efda3c537ec460af0fa6271ca97cfd146754524e152300ba2fe3dd52b40b1269f13d4d5bf0c
-
SSDEEP
6144:7vbuWQu/cuaS2l8iE0B55FrJJJekPdb5J22u:7vqWQub2lrE0B55FpekPdb/22u
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002340a-11.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe -
Executes dropped EXE 1 IoCs
pid Process 756 Syslemmpgqo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe 756 Syslemmpgqo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 756 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 89 PID 3248 wrote to memory of 756 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 89 PID 3248 wrote to memory of 756 3248 d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe"C:\Users\Admin\AppData\Local\Temp\d037678d81708397aa4e82d68d810503b8b04223a1470eea406b7b7b73aca3ca.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Syslemmpgqo.exe"C:\Users\Admin\AppData\Local\Temp\Syslemmpgqo.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5839d60ac2ddfbe4359d66138e569e641
SHA1cce83cab7e712b96ab4541d31a40ee2e5e4c3200
SHA2561a6d6aba1c7c3baf07693e27253cc887e131edc60bcb6e3b53273c2aa3fc24bf
SHA512bdd8c6adb0414950283be1bb14ce862cf3f3b34c9769b57f676c12640f517599de05ec74875ce45b316a67fc212c719a2e1c573ab0b4c9f3c10c8f8e8cadce99
-
Filesize
102B
MD540c9ef1275e833f97137c1cec6acd13a
SHA12fa374bd947cf7ef12c957f2507a28b48ed9c199
SHA25641608f820d8a4c64439ceecfcd17aa8b54b69b790e75f8994c89981aaf597c81
SHA51283f18b69516aca15d5e8b7d8db883e142b3335c896780a3c085c75382fe964ed64d66afaf422d6eff5a34241bfc4a1dddd54e5efa5eb65fdc83d718a9909116b