Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 03:31
Behavioral task
behavioral1
Sample
3d36a42d6b55ca23c32c8d2afb37bda0951d78896d49bb06e379c1a8b0e45a14.exe
Resource
win7-20240903-en
General
-
Target
3d36a42d6b55ca23c32c8d2afb37bda0951d78896d49bb06e379c1a8b0e45a14.exe
-
Size
145KB
-
MD5
c6817ccf7b244af805baf639ffd761ea
-
SHA1
663aa66cc934da02d753011a00ad7d9efe36ce31
-
SHA256
3d36a42d6b55ca23c32c8d2afb37bda0951d78896d49bb06e379c1a8b0e45a14
-
SHA512
6c2957b93b1e23daa8fb8fb9628977bee63828cd9eccac6f54f95120515e1b9dda5e0d531af61db9580ecbcf515ae722c60e1af125baf5cdbfb0e594a6034baf
-
SSDEEP
3072:P33q938UFzUzlArNOBU9CSeToGichbLZVRwTooutq:fiXzUzm9CxTTbLZfwTooSq
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023444-4.dat family_blackmoon behavioral2/files/0x00090000000233e4-6.dat family_blackmoon behavioral2/memory/3336-10-0x0000000000400000-0x000000000048A000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 4236 ¸´Öƹ¤¾ß.exe -
Loads dropped DLL 1 IoCs
pid Process 4236 ¸´Öƹ¤¾ß.exe -
resource yara_rule behavioral2/memory/3336-0-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral2/memory/3336-10-0x0000000000400000-0x000000000048A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d36a42d6b55ca23c32c8d2afb37bda0951d78896d49bb06e379c1a8b0e45a14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ¸´Öƹ¤¾ß.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4236 ¸´Öƹ¤¾ß.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4236 ¸´Öƹ¤¾ß.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3336 3d36a42d6b55ca23c32c8d2afb37bda0951d78896d49bb06e379c1a8b0e45a14.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3336 wrote to memory of 4236 3336 3d36a42d6b55ca23c32c8d2afb37bda0951d78896d49bb06e379c1a8b0e45a14.exe 85 PID 3336 wrote to memory of 4236 3336 3d36a42d6b55ca23c32c8d2afb37bda0951d78896d49bb06e379c1a8b0e45a14.exe 85 PID 3336 wrote to memory of 4236 3336 3d36a42d6b55ca23c32c8d2afb37bda0951d78896d49bb06e379c1a8b0e45a14.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d36a42d6b55ca23c32c8d2afb37bda0951d78896d49bb06e379c1a8b0e45a14.exe"C:\Users\Admin\AppData\Local\Temp\3d36a42d6b55ca23c32c8d2afb37bda0951d78896d49bb06e379c1a8b0e45a14.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\¸´Öƹ¤¾ß.exeC:\Users\Admin\AppData\Local\Temp\\¸´Öƹ¤¾ß.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5d2b1bd41ca66d66b71b026fdfff3c8c4
SHA16c0cd93d1644caeea1050d566ade210817ba0f1a
SHA256f568fb6afe3b220bace98c8a07c2c01eb2ed32980ffc356e855c7b305fe813ed
SHA5122a54c20850bd976fb40e614cc4621b28d3bc73a41297505c440bcdaf80d81eab598f1242dcb133ce83779ff2dec379ebeddcc662d142c44014dad7068d4acf1d
-
Filesize
244KB
MD57a42b67d994485420217e5986ea11a92
SHA1c3bb1fb71312a54457e75b5bd6a94dc501f381d9
SHA256cc1cd7a803385e3f89772e6c988bc72326eed35fd00a02cf95fb5f3365366324
SHA512a1ad5e8ece4ee18fcdda94e498d19a67342dbe71b52a2cb60606239530570e13fee8493bf3e4126075cc485a0179ad050241315244a512925848fc8eef35b9c4