Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 09:58
Behavioral task
behavioral1
Sample
06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe
Resource
win7-20240708-en
General
-
Target
06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe
-
Size
366KB
-
MD5
82b4372b1c0d11728fc000a363773b95
-
SHA1
f1d2a0c83ede14e63026210e6556b3f1da7f86a8
-
SHA256
06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58
-
SHA512
6ed6f3b0e22bdcd89a8bd8ebecfea9abfe2e3a96b9d25c7f59d0e7ef4f0b286659a643bdb9a274698b0b38d4a0926b2771df66504b2ab168f0874b61fec45d96
-
SSDEEP
6144:BSfSHl+gv5gY1F53Aul/Egv4+E6qnwEGvIkJ7G9P1k:B2SHl+gv5gY1b5Eo4+EsEEIkJ7G9P1k
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023bc6-8.dat family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe -
Deletes itself 1 IoCs
pid Process 968 Syslemsrgtd.exe -
Executes dropped EXE 1 IoCs
pid Process 968 Syslemsrgtd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemsrgtd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe 968 Syslemsrgtd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 968 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 84 PID 1572 wrote to memory of 968 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 84 PID 1572 wrote to memory of 968 1572 06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe"C:\Users\Admin\AppData\Local\Temp\06256cc16fda60f7b732a445840034d0cee4d96d29499cc3928206cda0ee1b58.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Syslemsrgtd.exe"C:\Users\Admin\AppData\Local\Temp\Syslemsrgtd.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366KB
MD5a405553cc216ba40393749afa795c4a4
SHA11c20dee1c0e265b3d2b8e7840230100b3354f86e
SHA2566e6cad069f1e3841679cc19df033c178d094a43e052a9dd1917a956c3d8830b7
SHA512f0c6fa459fa2d4886babaadc2e1d8d0c0deaf8752fc4cca265c5fb73423e2f6894a4fd0461683235db39f3f6aced3ab8db389b490950cef854b06c565357579f
-
Filesize
102B
MD5c22be0bc85d1191c184530d179d06565
SHA17f85787d41c3b89d736b6f982062258f540e257e
SHA256a3f1d3a63e3114bb1eac2ae24bbcdbc8ba77c910454ffbfad976357828cc50f5
SHA512a169a63b7c7303b6c9e25ec3a3faf600bd7ebfad511acc0f42faa3a993e5d7888ce56ba079fd3ef652f6e0f82e12efd4d57f14ac365c32eec6d4ffcb8dd14c7f