Resubmissions
22-12-2024 05:16
241222-fygbdsvnft 1022-12-2024 05:11
241222-fvgsravpen 1022-12-2024 05:11
241222-fvapfavmfw 1022-12-2024 05:10
241222-ft1t8svmet 1022-12-2024 05:08
241222-fsntaavnhr 1022-12-2024 05:05
241222-fq43gsvndj 1022-12-2024 04:38
241222-e9fzbstnbs 10Analysis
-
max time kernel
32s -
max time network
35s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22-12-2024 04:38
Behavioral task
behavioral1
Sample
tfd.zip
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
tfd.zip
Resource
win11-20241023-en
General
-
Target
tfd.zip
-
Size
6.6MB
-
MD5
44da30588e79926aa259c03796820e6d
-
SHA1
37bc83fe0487e8c1f7f309983af78a3b3dab24f2
-
SHA256
fcf54eaf0f05dae2521ce9a53b67a0ac8a72c98f9f8b25a9258fbe1261f0be5e
-
SHA512
1ff5a5e9f840fdf7713375c9294149f5265d1b09645eb00c2cc2d1ed07847a7bc990cc3aca8aaaf4205f9415153f9563be630268d28335a85bd1808cba3d8e0d
-
SSDEEP
98304:Nkm/OuBU0P2VJEgdGuTzUlD4JWX++gLCrK6UjqHiL7y3qF+Ok+K6QppKOU:KmWXXEgEuTzcOpuGDqCK3q0Xkt
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x0028000000046145-5.dat family_blackmoon -
Blocklisted process makes network request 3 IoCs
flow pid Process 26 4920 rundll32.exe 28 4920 rundll32.exe 30 4920 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4920 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4920 rundll32.exe 4920 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4920 rundll32.exe 4920 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1548 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1548 7zFM.exe Token: 35 1548 7zFM.exe Token: SeSecurityPrivilege 1548 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1548 7zFM.exe 1548 7zFM.exe 1548 7zFM.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2432 2664 cmd.exe 95 PID 2664 wrote to memory of 2432 2664 cmd.exe 95 PID 2432 wrote to memory of 4920 2432 rundll32.exe 96 PID 2432 wrote to memory of 4920 2432 rundll32.exe 96 PID 2432 wrote to memory of 4920 2432 rundll32.exe 96
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\tfd.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1548
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\tfbd\run me as admin.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\Desktop\tfbd\GF.DATA,Win102⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\Desktop\tfbd\GF.DATA,Win103⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.9MB
MD5c6e29164ff238c1f3a538722c7ab9871
SHA18e3c981e9dcd9d71c2128811652b4a62acd2622b
SHA2564848cd7fd555e5551d94a1b8df19d19a9cf65727c0d8badbe2457516ee19ead7
SHA512f9e736d37d83ad38255e22ec282ca6d137471a640981f5bcd039d04ddd3151e4036920d3d182230d1f442f8410ebdc4dc8ef95f7264450a517c4fa9ad3308a31
-
Filesize
111B
MD532ebd1b51e027f5eb86c7cd3bf98f661
SHA19f94f463b0c60e73cb6d9a221feb86da05bf5582
SHA25649941008e16ca6b79cc4949da034da2696d7f78d6664b74afcd11902eb76c3c9
SHA5124540c9d9ea0e58e889d29d50cb22bb4e0d5c401475127c529d9abacf9ea0c3a9aa8b22ca1b13fd6da98f0452b8e7d22111b59bc520b57601e3d6e606c0d48b35