Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 01:56
Behavioral task
behavioral1
Sample
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe
Resource
win7-20240729-en
General
-
Target
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe
-
Size
475KB
-
MD5
1f0754128f1fd32781886c3d9e7dc138
-
SHA1
91170c5fd52ea3b5aa77c4b746d0781b3b195a6d
-
SHA256
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa
-
SHA512
38ec7ead85e45b82c02420da71f0bed58fc199f658f9b2fb7f0a164f5a26dc4ed9e5de7084e7380a3dcc9bfd3be214fbebb3cfb2a316b1d37cee1acbd4116afa
-
SSDEEP
12288:EfqiJSvtZDd4YQp7T8BPZ0T9XG1rVBbtpIwaDoS8:GqiWfvQpX8T0h2r/b/IDK
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4312-1-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral2/memory/4312-0-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4312-1-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3368 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4772 4312 WerFault.exe e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.execmd.exesc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exepid process 4312 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.execmd.exedescription pid process target process PID 4312 wrote to memory of 3748 4312 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe cmd.exe PID 4312 wrote to memory of 3748 4312 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe cmd.exe PID 4312 wrote to memory of 3748 4312 e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe cmd.exe PID 3748 wrote to memory of 3368 3748 cmd.exe sc.exe PID 3748 wrote to memory of 3368 3748 cmd.exe sc.exe PID 3748 wrote to memory of 3368 3748 cmd.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe"C:\Users\Admin\AppData\Local\Temp\e5bcef72212f77a5390675d5fc24433af0e682db535969894f967a409eefb8aa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\cmd.execmd /c sc config "UxSms" start= demand2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\sc.exesc config "UxSms" start= demand3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 5562⤵
- Program crash
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4312 -ip 43121⤵PID:3076