Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe
Resource
win7-20241023-en
General
-
Target
c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe
-
Size
44KB
-
MD5
a3275fd4af5efc528c157a45673c7721
-
SHA1
3c126c3094315876a87ac76e3256a619d4ab83fb
-
SHA256
c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b
-
SHA512
c7bdad4a2b83a14431da61e756e22997d8f7f61d49764b213a1c54db694d9e01caa105d078239ef5ed3b45c4e9fe2139dbacb01ecec34899900829bc7588164e
-
SSDEEP
768:KmZ70XUP0K2I5f6VJiPy6jBZTCRoMUHIYhlDkYi0sDaF8QCFSXbyt/CSF7p97Dl:Kf2V2IOSXQoMUHFhSYr+DQLytpFx
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2396-8-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1644-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 1644 c800666.exe -
Executes dropped EXE 1 IoCs
pid Process 1644 c800666.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\friendl.dll c800666.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1644 2396 c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe 30 PID 2396 wrote to memory of 1644 2396 c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe 30 PID 2396 wrote to memory of 1644 2396 c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe 30 PID 2396 wrote to memory of 1644 2396 c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe"C:\Users\Admin\AppData\Local\Temp\c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\c800666.exec:\c800666.exe2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD583e39b9f16f8b8fa86d194123cc14def
SHA11b890b3c6ac0cd1fece5022ee7b77f83f2b576f4
SHA2569d43f3eb3ba80b255c29ae12f7895516afacdc24052e1df25a9bb797cec6be63
SHA5124142632f2f96a7a617fe9442c01311d2aa74c7d83052eda8ec6caa36dfd2a6dbaf18114381ae494d8df798ce951ec8c41365950cbe38a9125fee0726be21e1cf
-
Filesize
102B
MD5992b84b4c0c2f2b88ed9b49e1945c083
SHA145274cfc15098d3ed22fc1e9c5917896564c96f2
SHA25605132acde98a2cee1994733a3801da5e4dbe3e22c43b169586a1ed7544205ce3
SHA512a29f6c35049b875d125e32c60d8d1f03130a0e2e72c90ddd4c0bd0850e216ebe260b2ad52227df8bbda2f6b2492dc806eb2066775b082ccbf326ac9a0865a666