Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 05:30
Behavioral task
behavioral1
Sample
b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe
Resource
win7-20240903-en
General
-
Target
b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe
-
Size
74KB
-
MD5
4dabb4f6ccd9b9ff37fb5a3f4997cd77
-
SHA1
0c37a59250c1b084b4fbceefca943b9121b0bbb7
-
SHA256
b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549
-
SHA512
edf51ab50ad338e5247ec717bcf74f21ad44dc3de52fa6bfb131d2cb7e5bbfddddd1807e52df62dfe16c4902687331c0e82b53ee391386d9e361a8ed838eb879
-
SSDEEP
1536:IyfIcT9U1tPrgQvhLopacl1TsQk0NJP/PAjgas/3VUN0YWZPnouy8/:VfIS2vhLoz5sQkqgjg1YWZfout/
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/4024-14-0x0000000000400000-0x000000000046F000-memory.dmp family_blackmoon behavioral2/memory/3116-16-0x0000000000400000-0x000000000046F000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe -
Deletes itself 1 IoCs
pid Process 3116 Syslemqxasp.exe -
Executes dropped EXE 1 IoCs
pid Process 3116 Syslemqxasp.exe -
resource yara_rule behavioral2/memory/4024-0-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/files/0x0007000000023caf-9.dat upx behavioral2/memory/4024-14-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/3116-16-0x0000000000400000-0x000000000046F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemqxasp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe 3116 Syslemqxasp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3116 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 91 PID 4024 wrote to memory of 3116 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 91 PID 4024 wrote to memory of 3116 4024 b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe"C:\Users\Admin\AppData\Local\Temp\b64a70b7ff4819623e9c3ccdce4d83e50e289cab2a5dd99ee27306f961f4c549.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Syslemqxasp.exe"C:\Users\Admin\AppData\Local\Temp\Syslemqxasp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD50ea67fc6416ad70eaf87945c2e5a74d4
SHA19d75de69c672aef90bd711b4f7300c62362d5528
SHA256cb818843d1eb42906d55a993d25e3215e8ca1d39b49d4b4be7e887bd28b71c93
SHA512bde6b796e255e6a04693b26f1af841fde368941d702c21ca836bba599e7d5689af43d80475a1b4670068aef734332efc2bfe8219e9ff77d780f5801820d18d6d
-
Filesize
102B
MD5013acbf92b8d33966c365b0c4cd1b6d7
SHA11ef1cb5be3987171a04ea1a5d7c63c3f39e23d88
SHA256159a2bc19794421b0505892e1ca79656bcb253ccd02496baf5eb81feaabf1d11
SHA5126257a0d36f197b8eda27ab3f41dc34746426da1a683a9c2bd4d73994618b623d8a1227babb13f45df411f249f6377dce4b0ae5733d0f2b1904bfb87cb17fb614