Analysis
-
max time kernel
118s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 09:21
Static task
static1
Behavioral task
behavioral1
Sample
ad02957f57989db23295419fe6b9c770N.exe
Resource
win7-20240708-en
General
-
Target
ad02957f57989db23295419fe6b9c770N.exe
-
Size
88KB
-
MD5
ad02957f57989db23295419fe6b9c770
-
SHA1
feefc096fa3412dc50efeb837ad1cab250c874d4
-
SHA256
aecf8e34f39dfd4ddfeba4380f3a1c11d765b8151d777e8faf8e4931f2a02937
-
SHA512
63d2d140f8ce0abf61828ee2e91981cfd5d171888284f298a4edb07c7378c04b0105bfaa83c0c97c903ff43cbe032de212b0049f904f69ab975362c8ecc12ebf
-
SSDEEP
1536:/s2OpUqBA6pkuTHQ0cIrf+7LYsF03RYSYhM9l8yDI15XygDSC:/ImRWTTpc627LXFm6+9l8nygDSC
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2968-0-0x0000000000400000-0x0000000000468000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 2744 Systempicnq.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 Systempicnq.exe -
Loads dropped DLL 2 IoCs
pid Process 2968 ad02957f57989db23295419fe6b9c770N.exe 2968 ad02957f57989db23295419fe6b9c770N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad02957f57989db23295419fe6b9c770N.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
pid Process 2968 ad02957f57989db23295419fe6b9c770N.exe 2968 ad02957f57989db23295419fe6b9c770N.exe 2968 ad02957f57989db23295419fe6b9c770N.exe 2968 ad02957f57989db23295419fe6b9c770N.exe 2968 ad02957f57989db23295419fe6b9c770N.exe 2968 ad02957f57989db23295419fe6b9c770N.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe 2744 Systempicnq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2744 2968 ad02957f57989db23295419fe6b9c770N.exe 32 PID 2968 wrote to memory of 2744 2968 ad02957f57989db23295419fe6b9c770N.exe 32 PID 2968 wrote to memory of 2744 2968 ad02957f57989db23295419fe6b9c770N.exe 32 PID 2968 wrote to memory of 2744 2968 ad02957f57989db23295419fe6b9c770N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad02957f57989db23295419fe6b9c770N.exe"C:\Users\Admin\AppData\Local\Temp\ad02957f57989db23295419fe6b9c770N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Systempicnq.exe"C:\Users\Admin\AppData\Local\Temp\Systempicnq.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD502f5cdd8c48684840e7d6c3122b20c57
SHA1f1027f3f3d51ef388a966bb6adf39757f4a9cf65
SHA25633f75a1ce6fb057d693e2a66a25c347c3ca94192fa76359a390fc26956f42f86
SHA512c8a774a2e2b92acc10bdd76daab7ef1143e44323273c0686fa3d76ce8c6a9efe2e280bba08ebf009f61a1060b18fa7d6c7cb08e7f29031874fa176b71906b7b7
-
Filesize
71B
MD59beeb3846d6b5b216a8db105ee3a0dc4
SHA1fa58206bbe79482a7e7a78ef49d52884e04a8ba9
SHA2561ea6f1c273563d8e34f8646dcf9e43b9b4af77f12c5e25e50a476eaec1ccd3e3
SHA5129ba0310f4314517dfd57ab29e925b724ffb2ebed59d9d9e8a15d7cc5cf00e08490f04317a85ec3a2b6390eb9e29c535fde6640dfd1afa7f9cbcf0a5cd18f7426