Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 23:39
Behavioral task
behavioral1
Sample
a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exe
Resource
win7-20240903-en
General
-
Target
a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exe
-
Size
3.8MB
-
MD5
606b97ece0952eaa2da4cffa96e1fab0
-
SHA1
12054550a8c1fc0bd9458d82abc2a0d93286fd5e
-
SHA256
a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fc
-
SHA512
13c271574f6c647eb9065b2ab20290aa60fb76f61b0c12162ffecf9eb784e6c65d48d6d2a573c8de981b27dd692ee8ce5c8e5d072b6c8d76501bad7f3ca43b01
-
SSDEEP
49152:IsCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98F:76XLq/qPPslzKx/dJg1ErmNC
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1868-0-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/memory/2068-8-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/files/0x0007000000012117-7.dat family_blackmoon behavioral1/memory/1868-6-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 1 IoCs
Processes:
nbbbtt.exepid Process 2068 nbbbtt.exe -
Processes:
resource yara_rule behavioral1/memory/1868-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2068-8-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/files/0x0007000000012117-7.dat upx behavioral1/memory/1868-6-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2828 2068 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exenbbbtt.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbbtt.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exenbbbtt.exedescription pid Process procid_target PID 1868 wrote to memory of 2068 1868 a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exe 30 PID 1868 wrote to memory of 2068 1868 a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exe 30 PID 1868 wrote to memory of 2068 1868 a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exe 30 PID 1868 wrote to memory of 2068 1868 a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exe 30 PID 2068 wrote to memory of 2828 2068 nbbbtt.exe 31 PID 2068 wrote to memory of 2828 2068 nbbbtt.exe 31 PID 2068 wrote to memory of 2828 2068 nbbbtt.exe 31 PID 2068 wrote to memory of 2828 2068 nbbbtt.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exe"C:\Users\Admin\AppData\Local\Temp\a3779fc0e5cc0845faab56b3bd00bcc4dfbc289ba8f645d4d4fc4ae6834248fcN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
\??\c:\nbbbtt.exec:\nbbbtt.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 363⤵
- Program crash
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD53a3341c9a3ac8d6ce41648b7dd0a0833
SHA1e85b61054617efacef18d81690039ad9836d2252
SHA25637f9f19626205d00a93afe6442f238b04a21681fab19933e3168af970c4f110e
SHA5129d3f22741c372cd1775973248c045c10f90448dd3263ba7d8b139c67b74bbc6c7861a85ef0d165c4692cbb042d98e2ac36139c1a635e188dca78296aa6e9c771