Analysis
-
max time kernel
84s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
14db31bf8824ab0598ef5f5c7740acd0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14db31bf8824ab0598ef5f5c7740acd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
14db31bf8824ab0598ef5f5c7740acd0N.exe
-
Size
214KB
-
MD5
14db31bf8824ab0598ef5f5c7740acd0
-
SHA1
dc3bbe6309db41f113f007951db6d1bccdfe9771
-
SHA256
44e11b2ac702d4d70b50c3a05879e129040d25e8f8d7fa93e68cbdd02fde962b
-
SHA512
110e26a3c5f5def321d65df6e89783971944963e6d7639b0733f7517f08f075020df46944864b9261a52b72d6819dfcaf6ffa4a6361a43e6a092d7987a0239b6
-
SSDEEP
3072:DWG4Z89vhW8fKBLQ8e2CvOP6ubRzjMc5UK+:4ZQvhWUcQv2qd6lj+
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 1 IoCs
pid Process 2668 blblckc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\blblckc.exe 14db31bf8824ab0598ef5f5c7740acd0N.exe File created C:\PROGRA~3\Mozilla\dvhufib.dll blblckc.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14db31bf8824ab0598ef5f5c7740acd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blblckc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3052 14db31bf8824ab0598ef5f5c7740acd0N.exe 2668 blblckc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2668 2812 taskeng.exe 32 PID 2812 wrote to memory of 2668 2812 taskeng.exe 32 PID 2812 wrote to memory of 2668 2812 taskeng.exe 32 PID 2812 wrote to memory of 2668 2812 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\14db31bf8824ab0598ef5f5c7740acd0N.exe"C:\Users\Admin\AppData\Local\Temp\14db31bf8824ab0598ef5f5c7740acd0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3052
-
C:\Windows\system32\taskeng.exetaskeng.exe {FF21F6C3-A6BE-463F-8BFE-02612A4D6459} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\PROGRA~3\Mozilla\blblckc.exeC:\PROGRA~3\Mozilla\blblckc.exe -iljnpcl2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5d1e24fdfdcc27a0371a91be6c2a4836e
SHA1dc007b507b9d68d0787f7876540d7964247cf77b
SHA2561fdbedbee96c6148eefd8aa3119329f667b07bbd36d159e73e0a315e4edefed4
SHA5123d0311ea168a3972829f5a1e2370ad46eac24d895884f55de983cd2a9cce2135ebc9b9b8ff7d390c64ffeb908fcbc2bdfba2c446e34d358576aa7bb8fa9fd432