Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 14:19
Behavioral task
behavioral1
Sample
4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe
Resource
win7-20241010-en
General
-
Target
4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe
-
Size
432KB
-
MD5
fd837a167e87583de1ee768c05b38d00
-
SHA1
09f71bece78297554f02558987617096cbf4d740
-
SHA256
4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352
-
SHA512
385f53e1099cb4d566d83bd727701402b48ab2860baaa5c4efcfdbcaea6dc2caf27535751757ac2a0bf460ef3fd9ed7c5048e0d3bd25ce1c586bba7da93e1009
-
SSDEEP
3072:TVmHpJqu0Vh6jw/fmZmRMpVuWwP5tOcQfgdVqYHKjoS1HwZCFjTPG1UFNE2XCKUB:TcHpJfHElepVuWwP5YcQfg8J+ojCKC+2
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016c23-7.dat family_blackmoon -
Deletes itself 1 IoCs
pid Process 2796 Systemknvuj.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 Systemknvuj.exe -
Loads dropped DLL 2 IoCs
pid Process 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe 2796 Systemknvuj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2796 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 30 PID 2344 wrote to memory of 2796 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 30 PID 2344 wrote to memory of 2796 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 30 PID 2344 wrote to memory of 2796 2344 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe"C:\Users\Admin\AppData\Local\Temp\4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Systemknvuj.exe"C:\Users\Admin\AppData\Local\Temp\Systemknvuj.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103B
MD51ab23fc56c238197bf10665111c26bac
SHA13b07cc4a542782851517fd2211b28cfd2a47c49d
SHA2565501b43a64120080e294e3492084f0a6858e00855e80278c6793e5e471415be7
SHA51283b57d49f6752554461ea2113228c4b10e307cafab95893abf3c405abe85d5be811295b346f91c2798f395a5790cdf975139aa14f199bb966694dde224c08bf7
-
Filesize
432KB
MD5c8d23aca94a50c521a2f5468b40de208
SHA172766dde3cd6b4e3dd652feaa41b042e7a97b506
SHA2563719e6c6e86a2058d7428d0aec07f1bb4ab3f92e1f30428e04adc7857be1c763
SHA512fe9e013614fc81dd4dc027a968acb95f42fd01d87af20b9bfb4ad8b84d342df15a6469fda5776d83c6292a2f61b1f93f214e7eac115487e3c662a3aeccf2b5bc