Analysis
-
max time kernel
111s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe
Resource
win7-20241023-en
General
-
Target
c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe
-
Size
44KB
-
MD5
a3275fd4af5efc528c157a45673c7721
-
SHA1
3c126c3094315876a87ac76e3256a619d4ab83fb
-
SHA256
c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b
-
SHA512
c7bdad4a2b83a14431da61e756e22997d8f7f61d49764b213a1c54db694d9e01caa105d078239ef5ed3b45c4e9fe2139dbacb01ecec34899900829bc7588164e
-
SSDEEP
768:KmZ70XUP0K2I5f6VJiPy6jBZTCRoMUHIYhlDkYi0sDaF8QCFSXbyt/CSF7p97Dl:Kf2V2IOSXQoMUHFhSYr+DQLytpFx
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/1788-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/960-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 960 xxllxrl.exe -
Executes dropped EXE 1 IoCs
pid Process 960 xxllxrl.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\friendl.dll xxllxrl.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxllxrl.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1788 wrote to memory of 960 1788 c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe 83 PID 1788 wrote to memory of 960 1788 c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe 83 PID 1788 wrote to memory of 960 1788 c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe"C:\Users\Admin\AppData\Local\Temp\c2d2fe410aa7215bdaa21ce7fcc30292a2051683de12afd447a6bf476d58354b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\xxllxrl.exec:\xxllxrl.exe2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD50d3e3afdc6a07116c7d37bf0e6a36cf3
SHA12f3e98dbf2db89d018f658df268010b5fcd10ef6
SHA256c9f41fb0ea8839b3415d45d8dadf3b2a286d80187a364a38ee1abcf468aa98a4
SHA512100ed7013f9ec04e0ff0c226a0d9a9a2fb3b5acf40e589d08b250584230604cc4cfcf8d8d1dff0a5eeb32266a92c6c1fcd23e0fc42057ff0356d5c9023f06206
-
Filesize
102B
MD5992b84b4c0c2f2b88ed9b49e1945c083
SHA145274cfc15098d3ed22fc1e9c5917896564c96f2
SHA25605132acde98a2cee1994733a3801da5e4dbe3e22c43b169586a1ed7544205ce3
SHA512a29f6c35049b875d125e32c60d8d1f03130a0e2e72c90ddd4c0bd0850e216ebe260b2ad52227df8bbda2f6b2492dc806eb2066775b082ccbf326ac9a0865a666