Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 02:56
Behavioral task
behavioral1
Sample
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe
Resource
win7-20240903-en
General
-
Target
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe
-
Size
81KB
-
MD5
72a1dc2d1f7f7e2e9a7d68bfdc43f4e5
-
SHA1
81047f2fb16b7285ca7ba17d4bf87a074516b7b8
-
SHA256
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6
-
SHA512
cbcd8d07110adfc1f46529e8200a70da07cb9f5b478b27dc4bc469a2cea392c536c3b645b1bbdb16f5b4560c1b27b092fab21f9a5871056eaf1b7102b9fe59af
-
SSDEEP
1536:+VtjAKqURk0Ex/tIWLSYGc5cmFF+TTdGka2dQe5GrpXLau:CN1qURFY/RLSO5cmFY9GMdKGu
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/3620-14-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon behavioral2/memory/3580-16-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe -
Deletes itself 1 IoCs
pid Process 3580 Systemgsdpv.exe -
Executes dropped EXE 1 IoCs
pid Process 3580 Systemgsdpv.exe -
resource yara_rule behavioral2/memory/3620-0-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/files/0x000800000001e104-9.dat upx behavioral2/memory/3620-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3580-16-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemgsdpv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe 3580 Systemgsdpv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3620 wrote to memory of 3580 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 84 PID 3620 wrote to memory of 3580 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 84 PID 3620 wrote to memory of 3580 3620 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe"C:\Users\Admin\AppData\Local\Temp\89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\Systemgsdpv.exe"C:\Users\Admin\AppData\Local\Temp\Systemgsdpv.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5ae6233cae1afb016e290a7af9ae0a7fe
SHA1485cfe94d79eedc239d458ffe71db456ceb64ff4
SHA25613db09256e5932b60ed8030f1a9a0e289113c2e1d4d116c0a47433ca8cde7e02
SHA51294149f5f7ee10f6c15ced1e6913da4ba4f148ed370a47936af16593b3b66eb9fd364804836768b8fe338ea51a52fd34b33a0e5a0a4bef17072de621131f5a2f5
-
Filesize
102B
MD53fcf4d9c1640d8b3e085c22f3dcc8aa3
SHA145bc06cfeb30915c339c96d78f1ba32242bcd842
SHA2569fba6bc01ddfba828c1237ede1f519f944090e54236cd1cd0554ca72f0f2a366
SHA51211ab8bd49db03a31e9550278d24adf405447afe81e35d4bc0f5745890acb1ed8318bb7e9a8491ccc5ca42d1fb8db8e241cde9fe8230302ec1a7f5016b79dfaab