Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 17:55
Behavioral task
behavioral1
Sample
e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe
Resource
win7-20240903-en
General
-
Target
e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe
-
Size
435KB
-
MD5
11e8719f01a46414f67943c01db46a3f
-
SHA1
473c59f47093ab698f4cd1bc19a145b645ab4c39
-
SHA256
e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af
-
SHA512
2e675f86bb21de3e6cee805bed7d22afaf1ab9d2cff8bff901228c957bbdffd7ac6ecb3f70938f8280e81f2fe995871f13a811b6757551951990fc01e90474ef
-
SSDEEP
3072:q0mx45LFnq9qDAuSbAXVkQUQ9oPfz0c0uxNUIqTkHoYCDfxj4/w/yjUuMx8kI:q0m2FqgDAuSbAXKfz0c0sUIJHk4w/yWs
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x00090000000191f3-7.dat family_blackmoon -
Deletes itself 1 IoCs
pid Process 3056 Syslemyvjub.exe -
Executes dropped EXE 1 IoCs
pid Process 3056 Syslemyvjub.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe 3056 Syslemyvjub.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3056 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 32 PID 1976 wrote to memory of 3056 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 32 PID 1976 wrote to memory of 3056 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 32 PID 1976 wrote to memory of 3056 1976 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe"C:\Users\Admin\AppData\Local\Temp\e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Syslemyvjub.exe"C:\Users\Admin\AppData\Local\Temp\Syslemyvjub.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5891ff07d165d433947b229ba4450a41e
SHA1a1be2cafd2abd9ffe14cefa49218e673563adfaa
SHA256c3983087838b5fb908fc73452375635309e859ad28e67f12732861b78dd132fc
SHA512a87a7bb4f9758c9d8ac7dfe944aa218113919a0e2510541696acd75111764c30150c1a92f52fcfdc2199ad6ef87dd66f99086d6723845fde18287c3c07c32803
-
Filesize
435KB
MD526ced17ba63463913ab60cf52b8d902b
SHA1a357ba78e80318856fe9d481976963bada20716f
SHA256d43a8b1d5d2cda9539f6eef12202a21fbf2b75aebe19a962284680b589f73fa3
SHA512784c3383dfa12865c0a7903f3253d4afaf0b779f70bbc2c8aab7182ab16aea3854b619c7067fdb86302a3d6fd96b89e02c6b71ae303312144885e1a8ce90b358