Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 21:30
Behavioral task
behavioral1
Sample
a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe
Resource
win7-20241023-en
General
-
Target
a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe
-
Size
3.8MB
-
MD5
787a9834382da76353da50d1f3457a20
-
SHA1
efac79372ddce4fd32330755c832bc350a9474f3
-
SHA256
a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafed
-
SHA512
f08f7b4424740b74bdde00a4ff963e02a8c65ddfaee03dcb0c18737fa79fcc5a388024c6df956cbd18033b4dac99a79aed7c0588adafb65e72467d12adf058b1
-
SSDEEP
49152:SGCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98jm:X6XLq/qPPslzKx/dJg1ErmNL
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/3988-0-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/files/0x000a000000023bff-4.dat family_blackmoon behavioral2/memory/3988-5-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3932-6-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 1 IoCs
pid Process 3932 bnbhbn.exe -
resource yara_rule behavioral2/memory/3988-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/files/0x000a000000023bff-4.dat upx behavioral2/memory/3988-5-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3932-6-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3564 3932 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbhbn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3932 3988 a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe 82 PID 3988 wrote to memory of 3932 3988 a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe 82 PID 3988 wrote to memory of 3932 3988 a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe"C:\Users\Admin\AppData\Local\Temp\a18764e20c4eb44612d0f9bbca1850cc77080e963accc79b2332fda9d28cafedN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
\??\c:\bnbhbn.exec:\bnbhbn.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 2243⤵
- Program crash
PID:3564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3932 -ip 39321⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD560c9a090ac4c721c5b5957b1f28702a4
SHA12a6be33b0d603fddde5ece4e4e6c8f8f80e666e4
SHA256209823ee20969938659332f4c91e5d720911bfaf9c8120151ecce0d378a414fa
SHA512b94f859a3f07bef9a357115cb8c88e7a4ff9dfe8e3b0f9dc0bc4dba9b3a9816eb2f70d062ab3a12f7f45b7f08d17ad678a5887b2df7b11bdecd5c4540344894f