Analysis
-
max time kernel
87s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 05:23
Behavioral task
behavioral1
Sample
171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exe
Resource
win7-20241023-en
General
-
Target
171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exe
-
Size
3.8MB
-
MD5
d0591eb5d21b597c73da19e3894571c0
-
SHA1
3bd9c30e8f12cb797ca3e5246bb811f63bd8df60
-
SHA256
171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5
-
SHA512
6eaf26cc213439d14450ffce46a37fee0ef0b21cdf7902bae5be8c903d10cbf685e8e3f19d992951abca90b0373efdae4967c666030b262251048fd9c81856e1
-
SSDEEP
49152:3sCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98ij:Q6XLq/qPPslzKx/dJg1ErmNd
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2316-0-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/memory/2172-10-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/files/0x000d000000012281-8.dat family_blackmoon behavioral1/memory/2316-9-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 1 IoCs
Processes:
2266284.exepid Process 2172 2266284.exe -
Processes:
resource yara_rule behavioral1/memory/2316-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2172-10-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/files/0x000d000000012281-8.dat upx behavioral1/memory/2316-9-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2788 2172 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2266284.exe171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2266284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exe2266284.exedescription pid Process procid_target PID 2316 wrote to memory of 2172 2316 171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exe 31 PID 2316 wrote to memory of 2172 2316 171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exe 31 PID 2316 wrote to memory of 2172 2316 171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exe 31 PID 2316 wrote to memory of 2172 2316 171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exe 31 PID 2172 wrote to memory of 2788 2172 2266284.exe 32 PID 2172 wrote to memory of 2788 2172 2266284.exe 32 PID 2172 wrote to memory of 2788 2172 2266284.exe 32 PID 2172 wrote to memory of 2788 2172 2266284.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exe"C:\Users\Admin\AppData\Local\Temp\171f86d7a6ecd09bef74f29d53d9d06a778248849c8517b370d9d42b9b9987f5N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\2266284.exec:\2266284.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 363⤵
- Program crash
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5e8822d2803aabd1dcc3cb2ba4fe0d1c4
SHA17267da9edf93df1fa86b7d32924c93ddd07fb1a2
SHA25674b7c3067c740549737191944441187f985aabc90061222258248424597473f8
SHA512686a7c5022e51f707e904c9890efd88c3df700b10e88a19cb9e4cdbfee8b193e6389aa759879416152434a85c40b736c5e38ed8086aa5229e54e58927b06f95f