Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 02:18
Behavioral task
behavioral1
Sample
98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe
Resource
win7-20241010-en
General
-
Target
98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe
-
Size
74KB
-
MD5
f2af8847b5640678ce7ec6a255eea4e2
-
SHA1
2fdef85efb0caaa68c1efd60162cbb876d54169e
-
SHA256
98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45
-
SHA512
3186599c50efa0bff4052d6e667afa6704de3d093f7f450b734f288447b1e2975e01f314bac30600a70fed8497d7d2b18bc9bb70867b4661c1df5d3a3de01c0d
-
SSDEEP
1536:IyfIcT9U1tPrgQvhLopacl1TsQk0NJP/PAjgas/3VUN0YWZPnouy8z:VfIS2vhLoz5sQkqgjg1YWZfoutz
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/4864-14-0x0000000000400000-0x000000000046F000-memory.dmp family_blackmoon behavioral2/memory/1996-16-0x0000000000400000-0x000000000046F000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe -
Deletes itself 1 IoCs
pid Process 1996 Syslemiobpd.exe -
Executes dropped EXE 1 IoCs
pid Process 1996 Syslemiobpd.exe -
resource yara_rule behavioral2/memory/4864-0-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/files/0x000b000000023b89-9.dat upx behavioral2/memory/4864-14-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/1996-16-0x0000000000400000-0x000000000046F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemiobpd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe 1996 Syslemiobpd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 1996 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 84 PID 4864 wrote to memory of 1996 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 84 PID 4864 wrote to memory of 1996 4864 98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe"C:\Users\Admin\AppData\Local\Temp\98a64d5f76742d4758ee779dfea493e503d5c0cebac9f69adbf448ebe1464e45.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\Syslemiobpd.exe"C:\Users\Admin\AppData\Local\Temp\Syslemiobpd.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5ffe576b5ca0fb08f14dc1d376e8f1ba3
SHA19e43fe6bbcec5c54492ab19532b666d107cc01ba
SHA25641a23aee2600a5914c357b13d2fd37d5cb249521adaeb8d26c1dac94e47433c1
SHA5121ad106570765f644f532dcb589160b792aafe8541338dcab9bdc21d61b5711c3f0295a4ee7c29eb59d97b0574ba38c92944d3224a5fb45a57b1693b10cd1cba2
-
Filesize
102B
MD591f943d31f3a1793759a6e00c959c988
SHA1d9c5a1b94c85ef6f38e216814586de55849c298f
SHA2560617ef87c6efe92ba4d54e49c5d1701e031b8c21089d9af472847004f6934eb4
SHA5127ea6777e2cfc71aac177fe57141d1465f716ec629d8d01acd18061630716d7b54926ec7bb65fcc5c268e16c037a9fdde599f0ccd111689b25699abbf2fd39f3d