Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 21:30
Behavioral task
behavioral1
Sample
a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe
Resource
win7-20241023-en
General
-
Target
a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe
-
Size
3.8MB
-
MD5
787a9834382da76353da50d1f3457a20
-
SHA1
efac79372ddce4fd32330755c832bc350a9474f3
-
SHA256
a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafed
-
SHA512
f08f7b4424740b74bdde00a4ff963e02a8c65ddfaee03dcb0c18737fa79fcc5a388024c6df956cbd18033b4dac99a79aed7c0588adafb65e72467d12adf058b1
-
SSDEEP
49152:SGCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98jm:X6XLq/qPPslzKx/dJg1ErmNL
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral1/memory/2628-1-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/memory/2628-7-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/memory/1704-8-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/files/0x0007000000012118-6.dat family_blackmoon -
Njrat family
-
Executes dropped EXE 1 IoCs
pid Process 1704 s4680.exe -
resource yara_rule behavioral1/memory/2628-1-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2628-7-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/1704-8-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/files/0x0007000000012118-6.dat upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2608 1704 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s4680.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2628 wrote to memory of 1704 2628 a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe 30 PID 2628 wrote to memory of 1704 2628 a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe 30 PID 2628 wrote to memory of 1704 2628 a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe 30 PID 2628 wrote to memory of 1704 2628 a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe 30 PID 1704 wrote to memory of 2608 1704 s4680.exe 31 PID 1704 wrote to memory of 2608 1704 s4680.exe 31 PID 1704 wrote to memory of 2608 1704 s4680.exe 31 PID 1704 wrote to memory of 2608 1704 s4680.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe"C:\Users\Admin\AppData\Local\Temp\a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\s4680.exec:\s4680.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 363⤵
- Program crash
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5434873904c1c49777b6f6f20f4a8c092
SHA1f56489b4d64f0cce0e83e3b852704525bf28fc54
SHA2560eeb13b3ffdd57ee4a13de4ab40d39eadd9ba94c5f4ac3d4c4ec1962ec4449b3
SHA512263b6c0d51109368fc5fc5bc060923971968beef9ec96762e1eae9869fdcfb2530ac242cf1cd971cd1fd1e86ad57d4d1e9aec91055751caee4d418b2daee45d6