Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 03:12
Behavioral task
behavioral1
Sample
58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe
Resource
win7-20241010-en
General
-
Target
58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe
-
Size
408KB
-
MD5
1d9e4bc56c15d5a5e4c8649a1c5dbf19
-
SHA1
d49a7dccc32e95b83bf8e32261c305e67a82f668
-
SHA256
58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e
-
SHA512
9ca27f6eb510f51fe58ba6bbb74ed44a057841bed1a21af1e2b993686029c1b17f15a38616c38fd63871c34aba25afcff11ee77167ad0ec863c9a5617e8834fd
-
SSDEEP
6144:K5/YZ58drqrhGcbLhmvjSN6jZhixVK/B/zIydenCG:K5/Q58drihGiLhmGNiZsx0B/zIkenCG
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 7 IoCs
resource yara_rule behavioral1/memory/2484-0-0x0000000000400000-0x0000000000469000-memory.dmp family_blackmoon behavioral1/memory/2484-27-0x0000000000400000-0x0000000000469000-memory.dmp family_blackmoon behavioral1/files/0x000500000001949d-44.dat family_blackmoon behavioral1/memory/2704-43-0x0000000000400000-0x0000000000469000-memory.dmp family_blackmoon behavioral1/memory/2484-40-0x0000000004080000-0x00000000040E9000-memory.dmp family_blackmoon behavioral1/memory/2484-58-0x0000000000400000-0x0000000000469000-memory.dmp family_blackmoon behavioral1/memory/2704-66-0x0000000000400000-0x0000000000469000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 2704 Sysceamakyul.exe -
Loads dropped DLL 2 IoCs
pid Process 2484 58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe 2484 58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe -
resource yara_rule behavioral1/memory/2484-0-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2484-27-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/files/0x000500000001949d-44.dat upx behavioral1/memory/2704-43-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2484-58-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2704-66-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysceamakyul.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe 2704 Sysceamakyul.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2704 2484 58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe 31 PID 2484 wrote to memory of 2704 2484 58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe 31 PID 2484 wrote to memory of 2704 2484 58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe 31 PID 2484 wrote to memory of 2704 2484 58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe"C:\Users\Admin\AppData\Local\Temp\58073c2455e4ddc230a68309ecb830991596572ce76afc715b229c75ed37a10e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Sysceamakyul.exe"C:\Users\Admin\AppData\Local\Temp\Sysceamakyul.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475
Filesize1KB
MD53aff13f0f493f6f5aa948bc6c4c596f5
SHA1ec06ad3561d5603b15e26280513ed5a0604630af
SHA256aa4fe3439351d9f7df0804b9eabfb001ba08e9cbd32de78d0159f9941f4826c8
SHA512d4f18751b3da048884c5334c48a777202582627ef05208247f08eef6639a4b94b266ecbab89235b1184579b24a525c090062cd690f84f332d15ab1402eaa8886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C
Filesize471B
MD59caf7a3f2e9656525e95e3b84282ccef
SHA14a1f2a4ab3c0618811a4ea98256247710449a105
SHA2562b775f163168fb6fb5ed11f9f105471ae96b0c9a01bad98e28ddc9b74371fa97
SHA512dcf4979e058e8481a2bd25210e601dc7f7dd6c19adbffebb4217bf95909c34a84988cbc9fe648a5381428b7609a01baad8c7e920dfda7835e663d658a73d773e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_A0B760D8ABF6F649D185B46E3E114CC2
Filesize471B
MD5b5f07da0c85c2974f7f4aacf4e7e8ed3
SHA147f94874fc9cfcb224c382058d51ac083f3f56a1
SHA256aa39f84f77a8c354dfc742914351fa5eaffc591e5f98615265ddc001125f0e2f
SHA5121971cf9f25e81d126606ab33ed9a27857cee2a47396654bb8f0c9d780fbb209742ec87c45e6efb37d3095afa67e50ac23e2ae7066a417945f92da43807b31143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CF14D1855652602540DFCFECD21854DB_54BE0F4A529F65D13ED30F3AD0874E58
Filesize1KB
MD55b5533ddecafdf4ef445a2b3f739729d
SHA13990e39b3605b20fa7aed18d1175f9f2d6790fa0
SHA2568526258f10c3e3af4db5388c1123826ff70d9cd83e32f6f2e04804a7337e28f8
SHA512f4864eec33285b06445c0640f62a0261231a7cb4e9241ee00d81f0f8bbfc7040ab000d23fe0472ec17506e03c98911545bfac44fd45eb6d05d15ed176a5c7daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475
Filesize500B
MD50e78171126c065705b0c9fe80696670b
SHA1729918facb34add15276eadaefe1f6a2f82374b0
SHA256b12639e047ac338e92f57380c41f3b80dc7db36f081697e31f0fe251ba1299b9
SHA51259650fde3b4517357da5618e9abf94fcc5c19ae90e2fa6c6531bf83b3f000c50fd3ff29b75167a9803c08ec7734ed6d629e4b5ae1b91eafd1246028f54af6653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C
Filesize398B
MD55837f4dd07abfd5d4c714f4f1bdb8103
SHA1fc570c3d12a8ce9add88d4fff02c224d3d9b51f2
SHA2562d2a5c2d5185a82646baedd03f116722d37eed53f0bf47f301a474a9893b17d3
SHA5122ac233794118d083255509c86109196938d4aba4e291e1c679d582b25cc2d19d913c853babba783fb157791f44c6c926f807c926ef11510f3603fcb4f04cfb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_A0B760D8ABF6F649D185B46E3E114CC2
Filesize410B
MD5ec4ad61113c03d383ef7cd738d3591a1
SHA1444a8468bbe9b15e927b26bb5ceaed9a8baf1155
SHA2567745f210c9c541575cdc73d67a8c3b5f6b83761fc4cffebf7f636e6747001e5d
SHA51260e900e4c5d629d0afafd649d3eafd0d24340adb07a339cad607426950a8f9e69407909b578296672a75592c011b25a5e903deaefb669304ba6d7e82c0a5ed18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CF14D1855652602540DFCFECD21854DB_54BE0F4A529F65D13ED30F3AD0874E58
Filesize536B
MD5af47ac9dc14744732be530615ac6db17
SHA12493a19c6843ea12fc9caa052b26bb4748aeeddc
SHA2567de1f28f69edc205ca5cdf36316eee8188ed27ad057aa09fe8bb16910226671b
SHA512abceac6e86d15495dffc1e904b9534e09461c110e2ad99c396f7e684859119825c757d0f10eddabf62b5f9f909dbfff2335ce82fb70f2cf08464cdfb8b3ff6aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
408KB
MD53138a2a1d4eb284e029254f5cf976537
SHA158865942dfa1b3897d566037a89a23abd7dfeed5
SHA2561fa2a34e0cdb246848ed29601efafb450ff495c0527af5c798443919d962d8ce
SHA5127c9d3ae51e5e1642456a59024592592844f2dd59d95c855f85632dc68612a15ab86f061f1755598005410b72a41c2ffd2c69a6b1c28a76e477a69bba624accf9
-
Filesize
102B
MD5e7a9fb06912b813ced3a5267c0cb0aa7
SHA1901ceb47a6c80271faebc4f356f725d5b80f2d36
SHA256ef8bc7fe2cac4fc2a798977b1c4e5e88c09023c1e23f37b85c126a32a238b96f
SHA512957cae831856084a46dd7a24dc560ffd996f5393bbf8eab86f3ee81f2aebbbcb640be76a437d86c8e6dd6d4d26979861228a8df69b14d539ab1108434a53457b