Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
10d8bcf7e4090a921c0abf5879e22da0N.exe
Resource
win7-20240708-en
General
-
Target
10d8bcf7e4090a921c0abf5879e22da0N.exe
-
Size
192KB
-
MD5
10d8bcf7e4090a921c0abf5879e22da0
-
SHA1
594904a707bc4979e9ab0dff6b5f448f36c8dfb2
-
SHA256
12df6d028773d3b6c5feec03f7a5eea62117121c4896df1504ff0d0377570446
-
SHA512
8c77f43bd5b4a7812b584d728e1b9d428a413d69259a31c641c81b7daee7208878bccfd808d74f53bad192c9e5981865a3eac46d2fdd0907c345c14528371e8f
-
SSDEEP
1536:/s2OpUqBA6pkuTHQ0cIrf+7LYsF03RYSYhM9l8yDI15XygDiuuuuuH:/ImRWTTpc627LXFm6+9l8nygDiuuuuuH
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1376-0-0x0000000000400000-0x0000000000468000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
10d8bcf7e4090a921c0abf5879e22da0N.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 10d8bcf7e4090a921c0abf5879e22da0N.exe -
Deletes itself 1 IoCs
Processes:
Systemtpbqo.exepid process 2388 Systemtpbqo.exe -
Executes dropped EXE 1 IoCs
Processes:
Systemtpbqo.exepid process 2388 Systemtpbqo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
10d8bcf7e4090a921c0abf5879e22da0N.exeSystemtpbqo.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10d8bcf7e4090a921c0abf5879e22da0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemtpbqo.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
10d8bcf7e4090a921c0abf5879e22da0N.exeSystemtpbqo.exepid process 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe 2388 Systemtpbqo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
10d8bcf7e4090a921c0abf5879e22da0N.exedescription pid process target process PID 1376 wrote to memory of 2388 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe Systemtpbqo.exe PID 1376 wrote to memory of 2388 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe Systemtpbqo.exe PID 1376 wrote to memory of 2388 1376 10d8bcf7e4090a921c0abf5879e22da0N.exe Systemtpbqo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10d8bcf7e4090a921c0abf5879e22da0N.exe"C:\Users\Admin\AppData\Local\Temp\10d8bcf7e4090a921c0abf5879e22da0N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\Systemtpbqo.exe"C:\Users\Admin\AppData\Local\Temp\Systemtpbqo.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5676176383693f16a713132be7e0291f6
SHA1a4daeee600297bc0aadb083c025c4956439a9d3e
SHA2569c9c6ee23ef4e9cdddd850ff5dc2f602c609342a0278e651cf73e4d59f9cdf3c
SHA5121873f89aac3f1da82127e093f25fd5220702462f0e98c104c8fb8c06ce3bd8fcbc547bd94c26609a1e58f2e0ab2672ea9f52b6927c9e311598cb204306d1eea6
-
Filesize
71B
MD57133bea92f9a736dc16c48298cc6346e
SHA16c87a5e640285cd6f39675054ac6c7b43c6bc49c
SHA256376777878b3224d9572128a272ffc084e62980194429cc67b3404cea19b6768b
SHA512603b8bbc4972f1bcc3aa575b36119abdb8eda480a593b1e58b00547192a803a56d1cbb069886973be33f4b112a5c983428049accd41b146f86e8c9efc5f8b1c6