Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-08-2024 07:38
Behavioral task
behavioral1
Sample
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe
Resource
win10v2004-20240802-en
General
-
Target
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe
-
Size
475KB
-
MD5
1f0754128f1fd32781886c3d9e7dc138
-
SHA1
91170c5fd52ea3b5aa77c4b746d0781b3b195a6d
-
SHA256
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa
-
SHA512
38ec7ead85e45b82c02420da71f0bed58fc199f658f9b2fb7f0a164f5a26dc4ed9e5de7084e7380a3dcc9bfd3be214fbebb3cfb2a316b1d37cee1acbd4116afa
-
SSDEEP
12288:EfqiJSvtZDd4YQp7T8BPZ0T9XG1rVBbtpIwaDoS8:GqiWfvQpX8T0h2r/b/IDK
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5436-1-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral2/memory/5436-0-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/5436-1-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4260 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 820 5436 WerFault.exe e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
sc.exee5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exepid process 5436 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.execmd.exedescription pid process target process PID 5436 wrote to memory of 3036 5436 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe cmd.exe PID 5436 wrote to memory of 3036 5436 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe cmd.exe PID 5436 wrote to memory of 3036 5436 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe cmd.exe PID 3036 wrote to memory of 4260 3036 cmd.exe sc.exe PID 3036 wrote to memory of 4260 3036 cmd.exe sc.exe PID 3036 wrote to memory of 4260 3036 cmd.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe"C:\Users\Admin\AppData\Local\Temp\e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5436 -
C:\Windows\SysWOW64\cmd.execmd /c sc config "UxSms" start= demand2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\sc.exesc config "UxSms" start= demand3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5436 -s 5682⤵
- Program crash
PID:820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5436 -ip 54361⤵PID:5188