Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2024 07:38
Behavioral task
behavioral1
Sample
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe
Resource
win10v2004-20240802-en
General
-
Target
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe
-
Size
475KB
-
MD5
1f0754128f1fd32781886c3d9e7dc138
-
SHA1
91170c5fd52ea3b5aa77c4b746d0781b3b195a6d
-
SHA256
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa
-
SHA512
38ec7ead85e45b82c02420da71f0bed58fc199f658f9b2fb7f0a164f5a26dc4ed9e5de7084e7380a3dcc9bfd3be214fbebb3cfb2a316b1d37cee1acbd4116afa
-
SSDEEP
12288:EfqiJSvtZDd4YQp7T8BPZ0T9XG1rVBbtpIwaDoS8:GqiWfvQpX8T0h2r/b/IDK
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2224-1-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral1/memory/2224-0-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2224-1-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2296 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4284 2224 WerFault.exe e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.execmd.exesc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exepid process 2224 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.execmd.exedescription pid process target process PID 2224 wrote to memory of 4596 2224 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe cmd.exe PID 2224 wrote to memory of 4596 2224 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe cmd.exe PID 2224 wrote to memory of 4596 2224 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe cmd.exe PID 4596 wrote to memory of 2296 4596 cmd.exe sc.exe PID 4596 wrote to memory of 2296 4596 cmd.exe sc.exe PID 4596 wrote to memory of 2296 4596 cmd.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe"C:\Users\Admin\AppData\Local\Temp\e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c sc config "UxSms" start= demand2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\sc.exesc config "UxSms" start= demand3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 5402⤵
- Program crash
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2224 -ip 22241⤵PID:5068