Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe
Resource
win7-20240903-en
General
-
Target
1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe
-
Size
2.5MB
-
MD5
5856881ca6bdd5e4a56eff0d1597d090
-
SHA1
e6a7e815cc245ac19890edd37178131dd2b54bab
-
SHA256
1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447
-
SHA512
be1b3de6b4a8302e664b66da5c3fe2983bfbb4bd670b6c0e75ea7b94c5cb89aedc366f424de00afa317bd90e8c505f6a8d7719c6ec1fd27936a79f295648e0ee
-
SSDEEP
49152:BW/GnbmcbpjkRlvztfKyLRmFpPOAq1aPo6dVkZigSZvHc4vsTT:BVScbpjkRlvZflLRWPnq1adkZYZfc4v
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/1628-2-0x00000000006C0000-0x00000000006E3000-memory.dmp family_blackmoon behavioral1/memory/1628-0-0x00000000006C0000-0x00000000006E3000-memory.dmp family_blackmoon behavioral1/memory/1628-64-0x00000000006C0000-0x00000000006E3000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/1628-2-0x00000000006C0000-0x00000000006E3000-memory.dmp upx behavioral1/memory/1628-0-0x00000000006C0000-0x00000000006E3000-memory.dmp upx behavioral1/memory/1628-64-0x00000000006C0000-0x00000000006E3000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1628 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe 1628 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2828 1628 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe 30 PID 1628 wrote to memory of 2828 1628 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe 30 PID 1628 wrote to memory of 2828 1628 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe 30 PID 1628 wrote to memory of 2828 1628 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe 30 PID 2828 wrote to memory of 2768 2828 cmd.exe 32 PID 2828 wrote to memory of 2768 2828 cmd.exe 32 PID 2828 wrote to memory of 2768 2828 cmd.exe 32 PID 2828 wrote to memory of 2768 2828 cmd.exe 32 PID 2768 wrote to memory of 2736 2768 cmd.exe 33 PID 2768 wrote to memory of 2736 2768 cmd.exe 33 PID 2768 wrote to memory of 2736 2768 cmd.exe 33 PID 2768 wrote to memory of 2736 2768 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe"C:\Users\Admin\AppData\Local\Temp\1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exe/c cmd.exe /c SCHTASKS /Delete /TN "Update_Core" /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd.exe /c SCHTASKS /Delete /TN "Update_Core" /F3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Delete /TN "Update_Core" /F4⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-