Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 14:49
Behavioral task
behavioral1
Sample
57c8953f1c2a0bb52182fda6eb105c90N.exe
Resource
win7-20240704-en
General
-
Target
57c8953f1c2a0bb52182fda6eb105c90N.exe
-
Size
437KB
-
MD5
57c8953f1c2a0bb52182fda6eb105c90
-
SHA1
6282433b51f8f49526a2eafa85df594148301f74
-
SHA256
ba5414506b0b347beb9ebef6bcdc6c7a82f2dfe6a718d364be0c27675f50e362
-
SHA512
5d17044a6159d9e51dd008c7c6704b4f160229267c1009a812907d8329e8efeaab5c590331ef979634eb7b722d4709417e433a800a5f9ec23157298482ef4929
-
SSDEEP
3072:q0mx45LFnq9qDAuSbAXVkQUQ9oPfz0c0uxNUIqTkHoYCDfxj4/0/yjUuMx8kj:q0m2FqgDAuSbAXKfz0c0sUIJHk40/yWX
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x00050000000186b7-7.dat family_blackmoon -
Deletes itself 1 IoCs
pid Process 2860 Syslemkgmpu.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 Syslemkgmpu.exe -
Loads dropped DLL 2 IoCs
pid Process 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57c8953f1c2a0bb52182fda6eb105c90N.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe 2860 Syslemkgmpu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2860 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 31 PID 2848 wrote to memory of 2860 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 31 PID 2848 wrote to memory of 2860 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 31 PID 2848 wrote to memory of 2860 2848 57c8953f1c2a0bb52182fda6eb105c90N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\57c8953f1c2a0bb52182fda6eb105c90N.exe"C:\Users\Admin\AppData\Local\Temp\57c8953f1c2a0bb52182fda6eb105c90N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Syslemkgmpu.exe"C:\Users\Admin\AppData\Local\Temp\Syslemkgmpu.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71B
MD5b770767195c15d18fd437838813d7eb7
SHA1456d3773738fef34f069cb6977153a0d8ef25594
SHA256abf1d854a256e83f0263ee82fdabf080c681dc6417b6a8fdb998d58d3953040b
SHA51250f4dd6790f0132e142ae4b576d70a2accc1fafba429a12182fe47544f6bf148316ed69ab22c71badc51548ef1c523aacb0802e5549da3f61397de479770eb95
-
Filesize
437KB
MD56ec34cc4fbc9a1c64a56ccc941136943
SHA186c982054cd908a493ad0a98a8b5bbb4d18a2233
SHA256797336619087fd838953fdd10cfa40ae054125c12b7b62133a1376a71bb2328b
SHA512613488b861bfc688096d7036d84109c27bb0426aa17e0c2536a2a12bdede5bae16944edfa13eddb8cc1fd7b4129875f425f2d3bf73eb721a56dd32dfd1116ec3