Analysis
-
max time kernel
111s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe
Resource
win7-20241010-en
General
-
Target
74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe
-
Size
44KB
-
MD5
a65996395f7618cb6b99fee5f7f15d40
-
SHA1
cb5d3f86f16ac97a11e2af5dd6161b9c506ce8c9
-
SHA256
74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402
-
SHA512
3b4c3c3047c83c28094d8dda9f32cc7e1f0283d3a4c07f4da7d688af8349842eb504ac1c499bca9cf6254dffc7dd6a0c096d498d73f56098f261a2ac1e61f084
-
SSDEEP
768:KmZ70XUP0K2I5f6VJiPy6jBZTCRoMUHIYhlDkYi0sDaF8QCFSXbyt/CSF7p97D9:Kf2V2IOSXQoMUHFhSYr+DQLytpFJ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2152-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1232-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 2152 blvdl.exe -
Executes dropped EXE 1 IoCs
pid Process 2152 blvdl.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\friendl.dll blvdl.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2152 1232 74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe 30 PID 1232 wrote to memory of 2152 1232 74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe 30 PID 1232 wrote to memory of 2152 1232 74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe 30 PID 1232 wrote to memory of 2152 1232 74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe"C:\Users\Admin\AppData\Local\Temp\74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
\??\c:\blvdl.exec:\blvdl.exe2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5a4f8ee211c64eef96c7b909fe2ff2d87
SHA1cc0c919c85b4d6d9d0b2d7eeb4d9d4a14c51b40c
SHA256e82f88ce5f5db12393d825e31f6a3d109bef844570de6adf1b7a0a78ae9d6b35
SHA5129638b4a31b445e9f4c16c3d5b5947fa85d5fd51e36ad025761698385ca4fad54bd7f52c6c4a26fde59f5cf9a19feac63286344b5af8bf3a8f1776f7f51fea20f
-
Filesize
103B
MD503f9ff8f681da516eaa255120a97a699
SHA1c248ab7a5906dffba2d9304409aa262f83f164e0
SHA2568cbd28c822e7f08ea7344482d17dd97f91f160fca48e333076c323802b18c201
SHA512eca273c8c61bc35841b4a9a0c75f6776f5dbc3c294e7b8d824b9ff2b993367ef202c0a9ad5d5f8ff1f6742ccf25954f8e6d20e8b0fbe865e32cf260f758d011e