Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 03:18
Behavioral task
behavioral1
Sample
b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe
Resource
win7-20241023-en
General
-
Target
b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe
-
Size
2.1MB
-
MD5
16ab871e0952598f3f1568904a63554b
-
SHA1
3bc709c6dd7b18ffeabc2fb7921f9282949b13fa
-
SHA256
b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a
-
SHA512
25d73140935d08dc33fbcc534867a23ac5229be2db2f50c935185d65ab5d4aa436df142d36878661acb9d67671b6069ba1930fb0b8ed71826e558c99688cef32
-
SSDEEP
24576:3qzIIUgC8d36kLBXlnB8j7v5Ta+hLLQ20JmXSeWwa1oWJQjk0svTS/PPsbb1hwRM:3sCOfN6X5tLLQTg20ITS/PPs/1kM
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1272-1-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/files/0x00450000000120f4-5.dat family_blackmoon behavioral1/memory/620-9-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/memory/1272-7-0x0000000000220000-0x0000000000248000-memory.dmp family_blackmoon behavioral1/memory/1272-6-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
Processes:
ppdvp.exepid Process 620 ppdvp.exe -
Processes:
resource yara_rule behavioral1/memory/1272-1-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/files/0x00450000000120f4-5.dat upx behavioral1/memory/620-9-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/1272-7-0x0000000000220000-0x0000000000248000-memory.dmp upx behavioral1/memory/1272-6-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2340 620 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exeppdvp.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdvp.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exeppdvp.exedescription pid Process procid_target PID 1272 wrote to memory of 620 1272 b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe 30 PID 1272 wrote to memory of 620 1272 b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe 30 PID 1272 wrote to memory of 620 1272 b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe 30 PID 1272 wrote to memory of 620 1272 b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe 30 PID 620 wrote to memory of 2340 620 ppdvp.exe 31 PID 620 wrote to memory of 2340 620 ppdvp.exe 31 PID 620 wrote to memory of 2340 620 ppdvp.exe 31 PID 620 wrote to memory of 2340 620 ppdvp.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe"C:\Users\Admin\AppData\Local\Temp\b9ed559f917208221afe782e989cb378de8cef22a83338753a3fd949f354803a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
\??\c:\ppdvp.exec:\ppdvp.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 363⤵
- Program crash
PID:2340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5c1eb46c545b2e3ad99b2a204a7d51543
SHA12c15db31b8c401ce85b52160f1126938f011ce1d
SHA2560fd789f5c474a492fccd8584cae4cd363b99f30b3a3ce2ce64563b4f692988b0
SHA5125deee054949c7ed72e78eee3eea81e985ca9072782aa2aeb41ed10a86fb111b32cc870b406618420feb72fc6ac0425591fb9571bc69ad7d01ff6d5ebad9bd9b8