Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 00:57
Behavioral task
behavioral1
Sample
7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe
Resource
win7-20240704-en
General
-
Target
7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe
-
Size
443KB
-
MD5
b1db800bb3ad5885ce6abdb7a41153c1
-
SHA1
50e0d36c311343fa511956697962a1b13416e777
-
SHA256
7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03
-
SHA512
a3fd3cfdaed748e102e8d70fff7cf9916cb266917ae655782bc1f17df81ea3001b398b349990b2d06846a5267f1045d4013c8b235318d15409b3296eb43ba02c
-
SSDEEP
6144:GfweR7gpANB0sv2YYuwfDoOPV1x0GwYpkxeRhLTQfoSeV:Y1R7gpAwsuvDNP/xyqkxeTLTQfoSeV
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral1/memory/2604-0-0x0000000000400000-0x0000000000471000-memory.dmp family_blackmoon behavioral1/memory/2604-7-0x0000000000400000-0x0000000000471000-memory.dmp family_blackmoon behavioral1/files/0x000e000000018660-9.dat family_blackmoon behavioral1/memory/2672-18-0x0000000000400000-0x0000000000471000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 2672 Syslemxqujr.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 Syslemxqujr.exe -
Loads dropped DLL 2 IoCs
pid Process 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe -
resource yara_rule behavioral1/memory/2604-0-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/2604-7-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/files/0x000e000000018660-9.dat upx behavioral1/memory/2672-18-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe 2672 Syslemxqujr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2672 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 32 PID 2604 wrote to memory of 2672 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 32 PID 2604 wrote to memory of 2672 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 32 PID 2604 wrote to memory of 2672 2604 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe"C:\Users\Admin\AppData\Local\Temp\7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Syslemxqujr.exe"C:\Users\Admin\AppData\Local\Temp\Syslemxqujr.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5b2e6f1e2834863a4805ef7a5ea8f967d
SHA16f7d30dee5040be26c0c1bdfeb8fe15acdab23dd
SHA256bdf7ec2f4f08b0e5c019bf6c549309e2e3cc0a8808584f73425c25568cf508e8
SHA51242fdb12a4d87d060498a011e58a7baa84e32e72e8319c7ac4b28ded829b221ac8f00dfe7a5312e9dda2265695249aa491d17b81dc33a3020f8cd2d6c2cf47450
-
Filesize
443KB
MD515fd8b6b49bc79235d90477671388225
SHA174dd24e90a97a8468eb5f94744a1dfa278484527
SHA25645a5dff24b54a572e4a95b2a704bc7e2bed16e42ab6d1326799946ab04803ed7
SHA512b28f330ac772f13334f12f44d10d030aae4deedaaccb524f426b8f0b4df6650c31dff27869de1cbbca90024cd18ddea2b1ee2c6dbaf2d1c1ba8c9c879bf7a73a