Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 03:04
Behavioral task
behavioral1
Sample
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe
Resource
win7-20240903-en
General
-
Target
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe
-
Size
81KB
-
MD5
72a1dc2d1f7f7e2e9a7d68bfdc43f4e5
-
SHA1
81047f2fb16b7285ca7ba17d4bf87a074516b7b8
-
SHA256
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6
-
SHA512
cbcd8d07110adfc1f46529e8200a70da07cb9f5b478b27dc4bc469a2cea392c536c3b645b1bbdb16f5b4560c1b27b092fab21f9a5871056eaf1b7102b9fe59af
-
SSDEEP
1536:+VtjAKqURk0Ex/tIWLSYGc5cmFF+TTdGka2dQe5GrpXLau:CN1qURFY/RLSO5cmFY9GMdKGu
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/2216-7-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon behavioral1/memory/2216-15-0x0000000003680000-0x00000000036EB000-memory.dmp family_blackmoon behavioral1/memory/2832-20-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 2832 Systemdzula.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 Systemdzula.exe -
Loads dropped DLL 2 IoCs
pid Process 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe -
resource yara_rule behavioral1/memory/2216-0-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2216-7-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/files/0x00070000000190e0-9.dat upx behavioral1/memory/2216-15-0x0000000003680000-0x00000000036EB000-memory.dmp upx behavioral1/memory/2832-20-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe 2832 Systemdzula.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2832 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 32 PID 2216 wrote to memory of 2832 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 32 PID 2216 wrote to memory of 2832 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 32 PID 2216 wrote to memory of 2832 2216 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe"C:\Users\Admin\AppData\Local\Temp\89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Systemdzula.exe"C:\Users\Admin\AppData\Local\Temp\Systemdzula.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD53fcf4d9c1640d8b3e085c22f3dcc8aa3
SHA145bc06cfeb30915c339c96d78f1ba32242bcd842
SHA2569fba6bc01ddfba828c1237ede1f519f944090e54236cd1cd0554ca72f0f2a366
SHA51211ab8bd49db03a31e9550278d24adf405447afe81e35d4bc0f5745890acb1ed8318bb7e9a8491ccc5ca42d1fb8db8e241cde9fe8230302ec1a7f5016b79dfaab
-
Filesize
81KB
MD5ade660d4cbd4cb160ae4ac07fce5ca17
SHA18dfa7af54e68db67dffa6d617482df71dacac80a
SHA2564f7087c3daca2da524388f8eabe770b0bf81f20659abce97875013589ab65a73
SHA512ae470ae8c7017dc3443687e2c223ebaa8dd72fde513f80e1911cce521f98e6b84ede2e7d89894a80b1858d91c07098c3a30e8cc94214e37b6205ffe020eb5182