Analysis
-
max time kernel
111s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe
Resource
win7-20241010-en
General
-
Target
74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe
-
Size
44KB
-
MD5
a65996395f7618cb6b99fee5f7f15d40
-
SHA1
cb5d3f86f16ac97a11e2af5dd6161b9c506ce8c9
-
SHA256
74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402
-
SHA512
3b4c3c3047c83c28094d8dda9f32cc7e1f0283d3a4c07f4da7d688af8349842eb504ac1c499bca9cf6254dffc7dd6a0c096d498d73f56098f261a2ac1e61f084
-
SSDEEP
768:KmZ70XUP0K2I5f6VJiPy6jBZTCRoMUHIYhlDkYi0sDaF8QCFSXbyt/CSF7p97D9:Kf2V2IOSXQoMUHFhSYr+DQLytpFJ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/3996-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3284-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 3284 3frrffr.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\friendl.dll 3frrffr.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3frrffr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3996 wrote to memory of 3284 3996 74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe 82 PID 3996 wrote to memory of 3284 3996 74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe 82 PID 3996 wrote to memory of 3284 3996 74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe"C:\Users\Admin\AppData\Local\Temp\74e8af39b47e12ad206eec4b8d497546fa3eebf9b0fecd0db573143b5bf44402N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
\??\c:\3frrffr.exec:\3frrffr.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD59fda155ab53b811dfe8305809321c976
SHA1f996011c05d327957f0778afb8edf898460dc223
SHA2563859219ef0d88a203a457d21590d5673dd7bb5937d6cc97d519bed6f7b3534dd
SHA512720e1a20b412884f9705c4a9e0e59b795d8eca00c0b3806b1478188219461469f0c08f913afd1bf97ef614ebb95e75136e04d90ce481805abafc98d3c253b448
-
Filesize
103B
MD503f9ff8f681da516eaa255120a97a699
SHA1c248ab7a5906dffba2d9304409aa262f83f164e0
SHA2568cbd28c822e7f08ea7344482d17dd97f91f160fca48e333076c323802b18c201
SHA512eca273c8c61bc35841b4a9a0c75f6776f5dbc3c294e7b8d824b9ff2b993367ef202c0a9ad5d5f8ff1f6742ccf25954f8e6d20e8b0fbe865e32cf260f758d011e