Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe
Resource
win7-20240705-en
General
-
Target
2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe
-
Size
25.1MB
-
MD5
085bc5aa24694d01427da6f49f95ff3e
-
SHA1
2677bc5f6479f40671cdce21a0e78b5804f4553c
-
SHA256
c15363fa323f12d9e7a7be713d36c6cc34465ad46adb6f3453f46647efe3fa4c
-
SHA512
345baf4c75911f80721d609bce32d0c8206b3af5a00b7a42a6851b5337d66f2ddba7e56e41e23a8c264cf03d1d4e678d953bdba275139b9900e280e140cf2812
-
SSDEEP
786432:tFwibZA1wadDE9EkEmoX1MAOmgFH0fVPnxVSOyQcdl7QJsDeNLHxdn2FrmDeLkj:tFwibZApDHiIyX2SO2l7QvNLH3n2FweA
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023485-6.dat family_blackmoon behavioral2/memory/2524-19-0x0000000000AA0000-0x0000000000C86000-memory.dmp family_blackmoon behavioral2/memory/2524-34-0x0000000000AA0000-0x0000000000C86000-memory.dmp family_blackmoon behavioral2/memory/2524-39-0x0000000000AA0000-0x0000000000C86000-memory.dmp family_blackmoon -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023487-14.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe -
Deletes itself 1 IoCs
pid Process 2524 Tomcat.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WPS.lnk Tomcat.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 Tomcat.exe -
Loads dropped DLL 2 IoCs
pid Process 2524 Tomcat.exe 2524 Tomcat.exe -
resource yara_rule behavioral2/files/0x0007000000023487-14.dat upx behavioral2/memory/2524-21-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/2524-33-0x0000000003030000-0x0000000003048000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tomcat.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe 2524 Tomcat.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2524 Tomcat.exe Token: SeLockMemoryPrivilege 2524 Tomcat.exe Token: SeCreateGlobalPrivilege 2524 Tomcat.exe Token: SeBackupPrivilege 2524 Tomcat.exe Token: SeRestorePrivilege 2524 Tomcat.exe Token: SeShutdownPrivilege 2524 Tomcat.exe Token: SeCreateTokenPrivilege 2524 Tomcat.exe Token: SeTakeOwnershipPrivilege 2524 Tomcat.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2524 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 87 PID 2416 wrote to memory of 2524 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 87 PID 2416 wrote to memory of 2524 2416 2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-26_085bc5aa24694d01427da6f49f95ff3e_magniber_sakula.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\Documents\Tomcat.exe"C:\Users\Admin\Documents\Tomcat.exe"2⤵
- Deletes itself
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5051d69a619adca3472e8d7c9b0c0eb5c
SHA16cc795ac90e43e408919e19ba6f5633863560459
SHA256feefc12464985e2057a4cbd54117e9414f2e00a284106fa38b62d63052a1f7dd
SHA51250daa3344aa4d86cdd22cf5736eec993467e6574c5e341cd0fd95757c739e167b6e76c744b29ae302d08c88d469fea0767640a9257f54f9dec2c5fbb87c23b71
-
Filesize
27KB
MD5849e9f3e59daf750db838e885d58c6fa
SHA1733cb105153e4b83160a52bfa2ddd95d750fb806
SHA256f94949a6c121a525f661dd8abd917eb37a5cf582c89e3a258170a15d30cc0cc2
SHA5123feff6db5fc5ae371a4ec60ce13a383668a5accac537a0ae56b9b5b7318a2d5bdb4b79286a519cad3610cb6d1f335a11c09a4d3165c147a00d5a7880ea23e173
-
Filesize
1.7MB
MD5d25a10fa1f251f87a1700eb74a83c888
SHA16f8c01180845db8817a726cb9c356cbe92fcd4a6
SHA256e72f70f26b5e05530c28547e3d22801e36df6f601c737157d3ced5b1aa36a2d5
SHA512f27a17c6b74765e7451b4508f2cddda4baccf34633c9663a5f350d3afabb1a388a27a4160e1db9be1a8a1e188c9ccd52a967d1860f6012ed0cd2f6e56c88cffd
-
Filesize
212B
MD5b9b982b26614e29f7819aa01709ab988
SHA1491ae9658a53da0cf72ffee32c03e473cf28d45e
SHA256ba2ba95c8869aff0b8f9611f9d3aadd155ff52481546bf976409906621b9a607
SHA51238432685d01526e1e528346700f6a7b27c1e0fc01ab7a260b520fb6b698ba53181bc91fed8d5320b31534bd93c414276eb2e4abe7a557067bd6479af8099f72d