Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 17:55
Behavioral task
behavioral1
Sample
e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe
Resource
win7-20240903-en
General
-
Target
e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe
-
Size
435KB
-
MD5
11e8719f01a46414f67943c01db46a3f
-
SHA1
473c59f47093ab698f4cd1bc19a145b645ab4c39
-
SHA256
e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af
-
SHA512
2e675f86bb21de3e6cee805bed7d22afaf1ab9d2cff8bff901228c957bbdffd7ac6ecb3f70938f8280e81f2fe995871f13a811b6757551951990fc01e90474ef
-
SSDEEP
3072:q0mx45LFnq9qDAuSbAXVkQUQ9oPfz0c0uxNUIqTkHoYCDfxj4/w/yjUuMx8kI:q0m2FqgDAuSbAXKfz0c0sUIJHk4w/yWs
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x00050000000230d8-8.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe -
Deletes itself 1 IoCs
pid Process 2572 Syslemnijbd.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 Syslemnijbd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemnijbd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe 2572 Syslemnijbd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3972 wrote to memory of 2572 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 94 PID 3972 wrote to memory of 2572 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 94 PID 3972 wrote to memory of 2572 3972 e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe"C:\Users\Admin\AppData\Local\Temp\e32f01fcc3f945658bd9eb098fb7cfeba3397f4f593f076231f576af3861a4af.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\Syslemnijbd.exe"C:\Users\Admin\AppData\Local\Temp\Syslemnijbd.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD50a9984cf6d5ecaed4c22cf084bc4bbf3
SHA105059d869f9037bbd61bee2bb7c5c5d6b4b035b5
SHA256d89e16335ab2eeb22c62e4a92f6244bbb4c53916483679938fa5da7039e52143
SHA5126cba0f1bd6de1f3ff4468d4f0e2eb17a0e8d3ce9e4292eb434c73ed6c6df15d6d492defb6aae58ad2d71946f68a2374ca1e9306f52d9cf3f7d0f8f7e1b47ce79
-
Filesize
102B
MD5891ff07d165d433947b229ba4450a41e
SHA1a1be2cafd2abd9ffe14cefa49218e673563adfaa
SHA256c3983087838b5fb908fc73452375635309e859ad28e67f12732861b78dd132fc
SHA512a87a7bb4f9758c9d8ac7dfe944aa218113919a0e2510541696acd75111764c30150c1a92f52fcfdc2199ad6ef87dd66f99086d6723845fde18287c3c07c32803