Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 03:04
Behavioral task
behavioral1
Sample
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe
Resource
win7-20240903-en
General
-
Target
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe
-
Size
81KB
-
MD5
72a1dc2d1f7f7e2e9a7d68bfdc43f4e5
-
SHA1
81047f2fb16b7285ca7ba17d4bf87a074516b7b8
-
SHA256
89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6
-
SHA512
cbcd8d07110adfc1f46529e8200a70da07cb9f5b478b27dc4bc469a2cea392c536c3b645b1bbdb16f5b4560c1b27b092fab21f9a5871056eaf1b7102b9fe59af
-
SSDEEP
1536:+VtjAKqURk0Ex/tIWLSYGc5cmFF+TTdGka2dQe5GrpXLau:CN1qURFY/RLSO5cmFY9GMdKGu
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/412-14-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon behavioral2/memory/776-17-0x0000000000400000-0x000000000046B000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe -
Deletes itself 1 IoCs
pid Process 776 Systemacumn.exe -
Executes dropped EXE 1 IoCs
pid Process 776 Systemacumn.exe -
resource yara_rule behavioral2/memory/412-0-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/files/0x0007000000023c97-9.dat upx behavioral2/memory/412-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/776-17-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemacumn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe 776 Systemacumn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 776 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 84 PID 412 wrote to memory of 776 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 84 PID 412 wrote to memory of 776 412 89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe"C:\Users\Admin\AppData\Local\Temp\89221a2df9b01e597601935e7358c70810fb352b4c0f3f1760657ca4b27c2ca6.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Systemacumn.exe"C:\Users\Admin\AppData\Local\Temp\Systemacumn.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5e85867d6584801c1e7773a09a953e686
SHA19cd2d26d360d437fd83eced9aa1fee52aedd921c
SHA256f6a1cc77a5b6b64e14c7f8abaf90ef8eef2775cf2233b5153ed421c4868da7d3
SHA512bd6cd92955a71f5acad6cf98f1865db644c22e780a998262bd287564aad48c1e3c75ea97e42f0b879afe39ee2731cd8bb7941b3038326e464c752e27185c0f2c
-
Filesize
102B
MD53fcf4d9c1640d8b3e085c22f3dcc8aa3
SHA145bc06cfeb30915c339c96d78f1ba32242bcd842
SHA2569fba6bc01ddfba828c1237ede1f519f944090e54236cd1cd0554ca72f0f2a366
SHA51211ab8bd49db03a31e9550278d24adf405447afe81e35d4bc0f5745890acb1ed8318bb7e9a8491ccc5ca42d1fb8db8e241cde9fe8230302ec1a7f5016b79dfaab