Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 14:19
Behavioral task
behavioral1
Sample
4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe
Resource
win7-20241010-en
General
-
Target
4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe
-
Size
432KB
-
MD5
fd837a167e87583de1ee768c05b38d00
-
SHA1
09f71bece78297554f02558987617096cbf4d740
-
SHA256
4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352
-
SHA512
385f53e1099cb4d566d83bd727701402b48ab2860baaa5c4efcfdbcaea6dc2caf27535751757ac2a0bf460ef3fd9ed7c5048e0d3bd25ce1c586bba7da93e1009
-
SSDEEP
3072:TVmHpJqu0Vh6jw/fmZmRMpVuWwP5tOcQfgdVqYHKjoS1HwZCFjTPG1UFNE2XCKUB:TcHpJfHElepVuWwP5YcQfg8J+ojCKC+2
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023c8b-8.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe -
Deletes itself 1 IoCs
pid Process 2700 Systemdlrxf.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 Systemdlrxf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemdlrxf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe 2700 Systemdlrxf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2700 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 86 PID 2820 wrote to memory of 2700 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 86 PID 2820 wrote to memory of 2700 2820 4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe"C:\Users\Admin\AppData\Local\Temp\4d5e0007256dcb70b25d2f57583d575c321eaa2be5cf2120e3beff3e1be51352N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Systemdlrxf.exe"C:\Users\Admin\AppData\Local\Temp\Systemdlrxf.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD5dc0e9e8c43b4d13af6bce2eec1fa0002
SHA1ed5471f628704af3a1be1aca4b0d549427078d91
SHA2563ad876705e0dc0b6863089f5df35612a901b995914eda5f9afbfe73c4f21a8e6
SHA5128ae1a68eb5cf34f64be29078ff1dc8010ead68becf104aebad7d596128953a5443d991a9437c24aa257b9db1e92d6e015a31f858e1b730383690ba56aa45a79a
-
Filesize
103B
MD51ab23fc56c238197bf10665111c26bac
SHA13b07cc4a542782851517fd2211b28cfd2a47c49d
SHA2565501b43a64120080e294e3492084f0a6858e00855e80278c6793e5e471415be7
SHA51283b57d49f6752554461ea2113228c4b10e307cafab95893abf3c405abe85d5be811295b346f91c2798f395a5790cdf975139aa14f199bb966694dde224c08bf7