Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
10d8bcf7e4090a921c0abf5879e22da0N.exe
Resource
win7-20240708-en
General
-
Target
10d8bcf7e4090a921c0abf5879e22da0N.exe
-
Size
192KB
-
MD5
10d8bcf7e4090a921c0abf5879e22da0
-
SHA1
594904a707bc4979e9ab0dff6b5f448f36c8dfb2
-
SHA256
12df6d028773d3b6c5feec03f7a5eea62117121c4896df1504ff0d0377570446
-
SHA512
8c77f43bd5b4a7812b584d728e1b9d428a413d69259a31c641c81b7daee7208878bccfd808d74f53bad192c9e5981865a3eac46d2fdd0907c345c14528371e8f
-
SSDEEP
1536:/s2OpUqBA6pkuTHQ0cIrf+7LYsF03RYSYhM9l8yDI15XygDiuuuuuH:/ImRWTTpc627LXFm6+9l8nygDiuuuuuH
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2572-0-0x0000000000400000-0x0000000000468000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
Processes:
Systemmwaah.exepid process 2868 Systemmwaah.exe -
Executes dropped EXE 1 IoCs
Processes:
Systemmwaah.exepid process 2868 Systemmwaah.exe -
Loads dropped DLL 2 IoCs
Processes:
10d8bcf7e4090a921c0abf5879e22da0N.exepid process 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
10d8bcf7e4090a921c0abf5879e22da0N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10d8bcf7e4090a921c0abf5879e22da0N.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
Processes:
10d8bcf7e4090a921c0abf5879e22da0N.exeSystemmwaah.exepid process 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe 2868 Systemmwaah.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
10d8bcf7e4090a921c0abf5879e22da0N.exedescription pid process target process PID 2572 wrote to memory of 2868 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe Systemmwaah.exe PID 2572 wrote to memory of 2868 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe Systemmwaah.exe PID 2572 wrote to memory of 2868 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe Systemmwaah.exe PID 2572 wrote to memory of 2868 2572 10d8bcf7e4090a921c0abf5879e22da0N.exe Systemmwaah.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10d8bcf7e4090a921c0abf5879e22da0N.exe"C:\Users\Admin\AppData\Local\Temp\10d8bcf7e4090a921c0abf5879e22da0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\Systemmwaah.exe"C:\Users\Admin\AppData\Local\Temp\Systemmwaah.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71B
MD57133bea92f9a736dc16c48298cc6346e
SHA16c87a5e640285cd6f39675054ac6c7b43c6bc49c
SHA256376777878b3224d9572128a272ffc084e62980194429cc67b3404cea19b6768b
SHA512603b8bbc4972f1bcc3aa575b36119abdb8eda480a593b1e58b00547192a803a56d1cbb069886973be33f4b112a5c983428049accd41b146f86e8c9efc5f8b1c6
-
Filesize
192KB
MD581a35902e863515a3f3166f6cca2dd54
SHA1498badbe3bd9e73e0c7f938280c42e023c7a3c75
SHA256ec90d0dab34ed481b5cc93bc772af495ecae0f0d85b6ca82cc738c58589ad3af
SHA51240665479ebd72534392908123085daad1511b6351a33a04497f2625deab2025781bf280758c5ce576ef38adc03d8ccfc1ab66deea191ccf6d3748d3094d377cf