Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 13:00
Behavioral task
behavioral1
Sample
5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe
Resource
win7-20240903-en
General
-
Target
5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe
-
Size
11.9MB
-
MD5
801a8fec70015ced87b9e82dfb79264d
-
SHA1
6897292ab341b94bd3bbb76aead5f6f702ffffa0
-
SHA256
5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00
-
SHA512
ae9a2fccb65f8454a73b79e16d262bd41f81992b8f4f80a4ef4ac3ab84fe06edd50e80dcabe9c4ab1bb55468cfbdfd49bd3db878fa530e00326893abcd93a452
-
SSDEEP
196608:rmwek+8viTi+Of0ppLw660/60jWvYZYqP/wdPgCG96OAdcHjRXZeQgNMeEGxDS8:rmfSvv0pi0SVvYZYqP/stI6JmEQ7GFS8
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral1/memory/2368-2-0x0000000000400000-0x0000000001D6E000-memory.dmp family_blackmoon behavioral1/memory/2368-1-0x0000000000400000-0x0000000001D6E000-memory.dmp family_blackmoon behavioral1/memory/2368-3-0x0000000000400000-0x0000000001D6E000-memory.dmp family_blackmoon behavioral1/memory/2368-12-0x0000000000400000-0x0000000001D6E000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2916 WMIC.exe Token: SeSecurityPrivilege 2916 WMIC.exe Token: SeTakeOwnershipPrivilege 2916 WMIC.exe Token: SeLoadDriverPrivilege 2916 WMIC.exe Token: SeSystemProfilePrivilege 2916 WMIC.exe Token: SeSystemtimePrivilege 2916 WMIC.exe Token: SeProfSingleProcessPrivilege 2916 WMIC.exe Token: SeIncBasePriorityPrivilege 2916 WMIC.exe Token: SeCreatePagefilePrivilege 2916 WMIC.exe Token: SeBackupPrivilege 2916 WMIC.exe Token: SeRestorePrivilege 2916 WMIC.exe Token: SeShutdownPrivilege 2916 WMIC.exe Token: SeDebugPrivilege 2916 WMIC.exe Token: SeSystemEnvironmentPrivilege 2916 WMIC.exe Token: SeRemoteShutdownPrivilege 2916 WMIC.exe Token: SeUndockPrivilege 2916 WMIC.exe Token: SeManageVolumePrivilege 2916 WMIC.exe Token: 33 2916 WMIC.exe Token: 34 2916 WMIC.exe Token: 35 2916 WMIC.exe Token: SeIncreaseQuotaPrivilege 2916 WMIC.exe Token: SeSecurityPrivilege 2916 WMIC.exe Token: SeTakeOwnershipPrivilege 2916 WMIC.exe Token: SeLoadDriverPrivilege 2916 WMIC.exe Token: SeSystemProfilePrivilege 2916 WMIC.exe Token: SeSystemtimePrivilege 2916 WMIC.exe Token: SeProfSingleProcessPrivilege 2916 WMIC.exe Token: SeIncBasePriorityPrivilege 2916 WMIC.exe Token: SeCreatePagefilePrivilege 2916 WMIC.exe Token: SeBackupPrivilege 2916 WMIC.exe Token: SeRestorePrivilege 2916 WMIC.exe Token: SeShutdownPrivilege 2916 WMIC.exe Token: SeDebugPrivilege 2916 WMIC.exe Token: SeSystemEnvironmentPrivilege 2916 WMIC.exe Token: SeRemoteShutdownPrivilege 2916 WMIC.exe Token: SeUndockPrivilege 2916 WMIC.exe Token: SeManageVolumePrivilege 2916 WMIC.exe Token: 33 2916 WMIC.exe Token: 34 2916 WMIC.exe Token: 35 2916 WMIC.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2336 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe 30 PID 2368 wrote to memory of 2336 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe 30 PID 2368 wrote to memory of 2336 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe 30 PID 2368 wrote to memory of 2336 2368 5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe 30 PID 2336 wrote to memory of 2916 2336 cmd.exe 32 PID 2336 wrote to memory of 2916 2336 cmd.exe 32 PID 2336 wrote to memory of 2916 2336 cmd.exe 32 PID 2336 wrote to memory of 2916 2336 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe"C:\Users\Admin\AppData\Local\Temp\5d28ab0fc6e53e235fc784f83e6689bcb8e6416b652fc6939cc7e3c3a9229d00.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c wmic OS Get DataExecutionPrevention_SupportPolicy>"C:\cmd_dep.txt"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic OS Get DataExecutionPrevention_SupportPolicy3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD52986710bef827476b9eb344a98c1ef75
SHA1be0fa9c426a07af85a7c3e471af5f6a9c1f020da
SHA2565a1bb571dc286002b186cc2139ff0eddfbfbaad4fcaea3b8c987544d8f577768
SHA512d7ab88def47721d4e50c096f85297945cc010cad295bb6fcc1613e500a19cccfdd7b04c502f27c7f70dd2ef7093239f5bbbaa28e55817001d0e0f9c0e213300c