Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe
Resource
win7-20240903-en
General
-
Target
90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe
-
Size
3.2MB
-
MD5
0eb0ac26b56abb31ff158ce3a737c3e4
-
SHA1
9ce4bc99fd3a8d35dc2dc7670f7ab6ec4a3f7670
-
SHA256
90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496
-
SHA512
502be310e9b3ac8977e801d3f73b65944c1fbe5b3e7ad0c915a4775b56d3b6d088970727f97dd0d09c9a9c846dfda4c3e98594984588ecc5a1d6be949fb8ce90
-
SSDEEP
24576:f4HH9GBtJr9YH6i4bJhHhVF0x4MZ591k9qzsqoJ2/Y/61oBhNdbxlypfWdvFe+Jz:fix4K2q82gVVdFApfOFTipzdUJ
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/2248-11-0x0000000010000000-0x0000000010024000-memory.dmp family_blackmoon behavioral1/memory/2248-12-0x0000000010000000-0x0000000010024000-memory.dmp family_blackmoon behavioral1/memory/2248-18-0x0000000010000000-0x0000000010024000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 2712 admin.exe -
resource yara_rule behavioral1/memory/2248-2-0x0000000002370000-0x0000000002485000-memory.dmp upx behavioral1/files/0x000b000000012260-5.dat upx behavioral1/memory/2712-8-0x0000000000400000-0x0000000000515000-memory.dmp upx behavioral1/memory/2248-11-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral1/memory/2248-12-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral1/memory/2712-15-0x0000000000400000-0x0000000000515000-memory.dmp upx behavioral1/memory/2248-18-0x0000000010000000-0x0000000010024000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language admin.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 2712 admin.exe 2712 admin.exe 2712 admin.exe 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 2712 admin.exe 2712 admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2712 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 30 PID 2248 wrote to memory of 2712 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 30 PID 2248 wrote to memory of 2712 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 30 PID 2248 wrote to memory of 2712 2248 90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe"C:\Users\Admin\AppData\Local\Temp\90d59daa5f72eda799486388b9eb35671e780545576b47107d66fbca586f8496.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
\??\c:\admin.exec:\admin.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39B
MD5b62c2c31f63dd53fe3c0fa7177e2b776
SHA1075abbe98f6651ef133f78eb210dfd9b71629e48
SHA256c68886cc4c9d3cc75ab2d9d386b6834dcd7198d43b9179f62cb56e953e1740ab
SHA5127b9831672c0d0786ae61faf120dc6733b5e19e4141491b8bfa94c834e7024472c8231a056a30cd8dbcb109fb9b67cba733a34c86b2818d6b1090985cdf7cb060
-
Filesize
372KB
MD59ed304603b3c00d5168b76a0b61332f0
SHA150f57ac837f9a325058a73181a4d33e2a66b4f8d
SHA2561ce90640766c1c1bb7d18fc94f429b794811d11d1a0b627696ab07f9075f7114
SHA512b96358c2c8950454c5ef17438ecd02525d116447af6ecefa9cdaaddd7b18634c46b23252d3d26f3c46c50df470ed9a405f652c53798e0d6a39c28f6a112d5af4