Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 14:49
Behavioral task
behavioral1
Sample
57c8953f1c2a0bb52182fda6eb105c90N.exe
Resource
win7-20240704-en
General
-
Target
57c8953f1c2a0bb52182fda6eb105c90N.exe
-
Size
437KB
-
MD5
57c8953f1c2a0bb52182fda6eb105c90
-
SHA1
6282433b51f8f49526a2eafa85df594148301f74
-
SHA256
ba5414506b0b347beb9ebef6bcdc6c7a82f2dfe6a718d364be0c27675f50e362
-
SHA512
5d17044a6159d9e51dd008c7c6704b4f160229267c1009a812907d8329e8efeaab5c590331ef979634eb7b722d4709417e433a800a5f9ec23157298482ef4929
-
SSDEEP
3072:q0mx45LFnq9qDAuSbAXVkQUQ9oPfz0c0uxNUIqTkHoYCDfxj4/0/yjUuMx8kj:q0m2FqgDAuSbAXKfz0c0sUIJHk40/yWX
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x000500000001e389-8.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 57c8953f1c2a0bb52182fda6eb105c90N.exe -
Deletes itself 1 IoCs
pid Process 1736 Syslemazdya.exe -
Executes dropped EXE 1 IoCs
pid Process 1736 Syslemazdya.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57c8953f1c2a0bb52182fda6eb105c90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemazdya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe 1736 Syslemazdya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 320 wrote to memory of 1736 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 92 PID 320 wrote to memory of 1736 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 92 PID 320 wrote to memory of 1736 320 57c8953f1c2a0bb52182fda6eb105c90N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\57c8953f1c2a0bb52182fda6eb105c90N.exe"C:\Users\Admin\AppData\Local\Temp\57c8953f1c2a0bb52182fda6eb105c90N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\Syslemazdya.exe"C:\Users\Admin\AppData\Local\Temp\Syslemazdya.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
437KB
MD551fcfef34f3731a7a3ed09b35d29da06
SHA10d9d0057e202a7c77e55966e0a7465a3479a1e36
SHA2569f75b5e4c39502df3f0ce79928d7dbe8eebb674392dea3e44305c871e6553f34
SHA512e57661e0e80312a787d6a60ccfa3977bec78733ee67fbe0b887e0d1f74687328116e85a5d6570e5688b255586d188e57af196b89f5a071153c3df68f85657876
-
Filesize
71B
MD5b770767195c15d18fd437838813d7eb7
SHA1456d3773738fef34f069cb6977153a0d8ef25594
SHA256abf1d854a256e83f0263ee82fdabf080c681dc6417b6a8fdb998d58d3953040b
SHA51250f4dd6790f0132e142ae4b576d70a2accc1fafba429a12182fe47544f6bf148316ed69ab22c71badc51548ef1c523aacb0802e5549da3f61397de479770eb95