Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 02:56
Behavioral task
behavioral1
Sample
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe
Resource
win7-20240903-en
General
-
Target
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe
-
Size
81KB
-
MD5
72a1dc2d1f7f7e2e9a7d68bfdc43f4e5
-
SHA1
81047f2fb16b7285ca7ba17d4bf87a074516b7b8
-
SHA256
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6
-
SHA512
cbcd8d07110adfc1f46529e8200a70da07cb9f5b478b27dc4bc469a2cea392c536c3b645b1bbdb16f5b4560c1b27b092fab21f9a5871056eaf1b7102b9fe59af
-
SSDEEP
1536:+VtjAKqURk0Ex/tIWLSYGc5cmFF+TTdGka2dQe5GrpXLau:CN1qURFY/RLSO5cmFY9GMdKGu
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/3048-7-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon behavioral1/memory/1868-17-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon behavioral1/memory/1868-21-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 1868 Systemtzzhm.exe -
Executes dropped EXE 1 IoCs
pid Process 1868 Systemtzzhm.exe -
Loads dropped DLL 2 IoCs
pid Process 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe -
resource yara_rule behavioral1/memory/3048-0-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3048-7-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/files/0x000600000001926a-9.dat upx behavioral1/memory/1868-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1868-21-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe 1868 Systemtzzhm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1868 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 32 PID 3048 wrote to memory of 1868 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 32 PID 3048 wrote to memory of 1868 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 32 PID 3048 wrote to memory of 1868 3048 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe"C:\Users\Admin\AppData\Local\Temp\89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Systemtzzhm.exe"C:\Users\Admin\AppData\Local\Temp\Systemtzzhm.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD53fcf4d9c1640d8b3e085c22f3dcc8aa3
SHA145bc06cfeb30915c339c96d78f1ba32242bcd842
SHA2569fba6bc01ddfba828c1237ede1f519f944090e54236cd1cd0554ca72f0f2a366
SHA51211ab8bd49db03a31e9550278d24adf405447afe81e35d4bc0f5745890acb1ed8318bb7e9a8491ccc5ca42d1fb8db8e241cde9fe8230302ec1a7f5016b79dfaab
-
Filesize
81KB
MD55cfb8c5a5499e49ad099ddd7e9e24222
SHA1f4de12e8b2551320820cd03ee4c4bfd4e3aaf436
SHA256d7148dd2688703c346df3c33143e9a35aa24750ebf6d1175ea1bcf12768da386
SHA51238334331f4cb3d5f12043e0b08b32e54aa37c9b4057d10939684f5fabab2f5122eef9f9a2e45f91c1941658dda4bff78ca5787aaa47dc02370743d043dc99933