Analysis
-
max time kernel
110s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe
Resource
win7-20240903-en
General
-
Target
1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe
-
Size
2.5MB
-
MD5
5856881ca6bdd5e4a56eff0d1597d090
-
SHA1
e6a7e815cc245ac19890edd37178131dd2b54bab
-
SHA256
1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447
-
SHA512
be1b3de6b4a8302e664b66da5c3fe2983bfbb4bd670b6c0e75ea7b94c5cb89aedc366f424de00afa317bd90e8c505f6a8d7719c6ec1fd27936a79f295648e0ee
-
SSDEEP
49152:BW/GnbmcbpjkRlvztfKyLRmFpPOAq1aPo6dVkZigSZvHc4vsTT:BVScbpjkRlvZflLRWPnq1adkZYZfc4v
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/memory/3212-1-0x0000000002550000-0x0000000002573000-memory.dmp family_blackmoon behavioral2/memory/3212-3-0x0000000002550000-0x0000000002573000-memory.dmp family_blackmoon behavioral2/memory/3212-51-0x0000000002550000-0x0000000002573000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/3212-1-0x0000000002550000-0x0000000002573000-memory.dmp upx behavioral2/memory/3212-3-0x0000000002550000-0x0000000002573000-memory.dmp upx behavioral2/memory/3212-51-0x0000000002550000-0x0000000002573000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3212 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe 3212 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3212 wrote to memory of 4896 3212 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe 82 PID 3212 wrote to memory of 4896 3212 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe 82 PID 3212 wrote to memory of 4896 3212 1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe 82 PID 4896 wrote to memory of 4536 4896 cmd.exe 84 PID 4896 wrote to memory of 4536 4896 cmd.exe 84 PID 4896 wrote to memory of 4536 4896 cmd.exe 84 PID 4536 wrote to memory of 2232 4536 cmd.exe 85 PID 4536 wrote to memory of 2232 4536 cmd.exe 85 PID 4536 wrote to memory of 2232 4536 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe"C:\Users\Admin\AppData\Local\Temp\1c8fae5fecf50d31259d66fb4694a46175705c42b399e302dd570adc31ead447N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\cmd.exe/c cmd.exe /c SCHTASKS /Delete /TN "Update_Core" /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\cmd.execmd.exe /c SCHTASKS /Delete /TN "Update_Core" /F3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Delete /TN "Update_Core" /F4⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
-