Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 02:25
Behavioral task
behavioral1
Sample
c8b6485ac16fe166abc99a14f01d1ff671826e2f0c500990a9ad7a75c4bc6287.exe
Resource
win7-20240903-en
General
-
Target
c8b6485ac16fe166abc99a14f01d1ff671826e2f0c500990a9ad7a75c4bc6287.exe
-
Size
3.8MB
-
MD5
e60cfc2e304799b448985433439dc95c
-
SHA1
08ccfabaeb6e4a732c78f188c21337188ef4039e
-
SHA256
c8b6485ac16fe166abc99a14f01d1ff671826e2f0c500990a9ad7a75c4bc6287
-
SHA512
cc2d5071f71aa04092f5968a68680d3b17f584bb8f9a7d0c58fdcf4797d136b5e267adc01abdcc1bc6db933f5e38a1dda1aa02f8d6aa56670d3cc1a12589c82f
-
SSDEEP
49152:3sCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98K:Q6XLq/qPPslzKx/dJg1ErmN3
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral1/memory/3056-0-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/memory/2060-8-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral1/files/0x00080000000120f9-7.dat family_blackmoon behavioral1/memory/3056-6-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 1 IoCs
pid Process 2060 nhnbnn.exe -
resource yara_rule behavioral1/memory/3056-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2060-8-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/files/0x00080000000120f9-7.dat upx behavioral1/memory/3056-6-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2348 2060 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8b6485ac16fe166abc99a14f01d1ff671826e2f0c500990a9ad7a75c4bc6287.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnbnn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2060 3056 c8b6485ac16fe166abc99a14f01d1ff671826e2f0c500990a9ad7a75c4bc6287.exe 30 PID 3056 wrote to memory of 2060 3056 c8b6485ac16fe166abc99a14f01d1ff671826e2f0c500990a9ad7a75c4bc6287.exe 30 PID 3056 wrote to memory of 2060 3056 c8b6485ac16fe166abc99a14f01d1ff671826e2f0c500990a9ad7a75c4bc6287.exe 30 PID 3056 wrote to memory of 2060 3056 c8b6485ac16fe166abc99a14f01d1ff671826e2f0c500990a9ad7a75c4bc6287.exe 30 PID 2060 wrote to memory of 2348 2060 nhnbnn.exe 31 PID 2060 wrote to memory of 2348 2060 nhnbnn.exe 31 PID 2060 wrote to memory of 2348 2060 nhnbnn.exe 31 PID 2060 wrote to memory of 2348 2060 nhnbnn.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8b6485ac16fe166abc99a14f01d1ff671826e2f0c500990a9ad7a75c4bc6287.exe"C:\Users\Admin\AppData\Local\Temp\c8b6485ac16fe166abc99a14f01d1ff671826e2f0c500990a9ad7a75c4bc6287.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\nhnbnn.exec:\nhnbnn.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 363⤵
- Program crash
PID:2348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5754d87b089e5337723a16dffd20fa48e
SHA194f908b2841ec748df6d6a7c0a79d3e38a64a650
SHA25681dfe153c578885e63933584cfac1cd8f613313594acc3a65668d29b5efaae56
SHA512cc6b18368f85e311302399940d2a87a83236d9649d9287e49b59eaa213cf45288bea9bdbeb2675afcbdef3c67abeaf03cc1fc6f166e6a5c7c2fb7edd1641911c