Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exe
Resource
win7-20241023-en
General
-
Target
7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exe
-
Size
4.0MB
-
MD5
5020028bb304b5dfc8c9ddd49994a9e6
-
SHA1
2605f38546406f8f5dd5be0eff54cdd2692fc591
-
SHA256
7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f
-
SHA512
8cfc2e17a6d4daae803dc5e39abd746b592656994f9517c6a5dd9c1a25f3e22604befdf68704420c0b524444786e9c4972fe0330e394c881ba4a2e8056015a14
-
SSDEEP
98304:LsswRnIDrGYZflLRWPnq1adkZYZfc4vzP9Frm:MIDffVRH1fYZfc47PTS
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1344-1-0x0000000000F60000-0x0000000000F83000-memory.dmp family_blackmoon behavioral2/memory/1344-3-0x0000000000F60000-0x0000000000F83000-memory.dmp family_blackmoon behavioral2/memory/1344-5-0x0000000076D20000-0x0000000076E10000-memory.dmp family_blackmoon behavioral2/memory/1344-7-0x0000000000F60000-0x0000000000F83000-memory.dmp family_blackmoon -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exedescription ioc process File opened for modification \??\PhysicalDrive0 7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exe -
Processes:
resource yara_rule behavioral2/memory/1344-1-0x0000000000F60000-0x0000000000F83000-memory.dmp upx behavioral2/memory/1344-3-0x0000000000F60000-0x0000000000F83000-memory.dmp upx behavioral2/memory/1344-7-0x0000000000F60000-0x0000000000F83000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exepid process 1344 7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exe 1344 7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exe"C:\Users\Admin\AppData\Local\Temp\7e4e29b7d7027c21edae5f9cc8f0f614f952fef37cc6ea1cc9bf15f86473149f.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1344