Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 00:57
Behavioral task
behavioral1
Sample
7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe
Resource
win7-20240704-en
General
-
Target
7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe
-
Size
443KB
-
MD5
b1db800bb3ad5885ce6abdb7a41153c1
-
SHA1
50e0d36c311343fa511956697962a1b13416e777
-
SHA256
7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03
-
SHA512
a3fd3cfdaed748e102e8d70fff7cf9916cb266917ae655782bc1f17df81ea3001b398b349990b2d06846a5267f1045d4013c8b235318d15409b3296eb43ba02c
-
SSDEEP
6144:GfweR7gpANB0sv2YYuwfDoOPV1x0GwYpkxeRhLTQfoSeV:Y1R7gpAwsuvDNP/xyqkxeTLTQfoSeV
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/728-0-0x0000000000400000-0x0000000000471000-memory.dmp family_blackmoon behavioral2/files/0x0002000000022f9b-9.dat family_blackmoon behavioral2/memory/728-14-0x0000000000400000-0x0000000000471000-memory.dmp family_blackmoon behavioral2/memory/4700-16-0x0000000000400000-0x0000000000471000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe -
Deletes itself 1 IoCs
pid Process 4700 Syslemvggec.exe -
Executes dropped EXE 1 IoCs
pid Process 4700 Syslemvggec.exe -
resource yara_rule behavioral2/memory/728-0-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/files/0x0002000000022f9b-9.dat upx behavioral2/memory/728-14-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4700-16-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemvggec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe 4700 Syslemvggec.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 728 wrote to memory of 4700 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 90 PID 728 wrote to memory of 4700 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 90 PID 728 wrote to memory of 4700 728 7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe"C:\Users\Admin\AppData\Local\Temp\7a8d5dc583ec98d3944ccf35d7fb4848b57e3dcce5317b6df410e19812534e03.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Users\Admin\AppData\Local\Temp\Syslemvggec.exe"C:\Users\Admin\AppData\Local\Temp\Syslemvggec.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443KB
MD5482c55893d68d7cf0681c6cf9c48a34c
SHA1d473bf31cf2bf92aebe49533f7c461595b791a5f
SHA2562790a0fc9c1e455c1e2ebf8bafe95336e3d461dfffbe9e56fdfcf41d80b205ed
SHA512875762ddc5697dfe3e665d7270e13114d0a0daa70c97bf60e3cd636a2e48998b7cf982f52c2b662f9e392852ded8535f50219b9b8f03732d202bea351e9ec95b
-
Filesize
102B
MD5b2e6f1e2834863a4805ef7a5ea8f967d
SHA16f7d30dee5040be26c0c1bdfeb8fe15acdab23dd
SHA256bdf7ec2f4f08b0e5c019bf6c549309e2e3cc0a8808584f73425c25568cf508e8
SHA51242fdb12a4d87d060498a011e58a7baa84e32e72e8319c7ac4b28ded829b221ac8f00dfe7a5312e9dda2265695249aa491d17b81dc33a3020f8cd2d6c2cf47450