Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 15:37
Behavioral task
behavioral1
Sample
d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe
Resource
win7-20241023-en
General
-
Target
d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe
-
Size
74KB
-
MD5
bcd4c107a4e12b065004c4ce99857bae
-
SHA1
6431fb3a13bf0338f84586ae2f1f4e559704e283
-
SHA256
d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d
-
SHA512
39f69d0adc9f902791377e2ff697b41ebb8fee9493004f62ea1c491d139b1afbd24912e3a9f3cb2d24af6b2eb6c6862382f9961dbdaa32a9dc1d448c63d2745d
-
SSDEEP
1536:IyfIcT9U1tPrgQvhLopacl1TsQk0NJP/PAjgas/3VUN0YWZPnouy8L1:VfIS2vhLoz5sQkqgjg1YWZfoutJ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/1192-14-0x0000000000400000-0x000000000046F000-memory.dmp family_blackmoon behavioral2/memory/4384-16-0x0000000000400000-0x000000000046F000-memory.dmp family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe -
Deletes itself 1 IoCs
pid Process 4384 Syslemyhcxb.exe -
Executes dropped EXE 1 IoCs
pid Process 4384 Syslemyhcxb.exe -
resource yara_rule behavioral2/memory/1192-0-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/files/0x000a000000023b44-9.dat upx behavioral2/memory/1192-14-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4384-16-0x0000000000400000-0x000000000046F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syslemyhcxb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe 4384 Syslemyhcxb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1192 wrote to memory of 4384 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 84 PID 1192 wrote to memory of 4384 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 84 PID 1192 wrote to memory of 4384 1192 d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe"C:\Users\Admin\AppData\Local\Temp\d8a962c01aefdd2a93c440cafe57b0ddcbd95208f13fd8015a1648aa99c8e74d.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Syslemyhcxb.exe"C:\Users\Admin\AppData\Local\Temp\Syslemyhcxb.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD589ab0cb43193cc3400fd0c8b93c48b49
SHA10c71ede464f5f8cd5b7a0aafdda87e3d3977b681
SHA256c949e8d57d96597413ec85b7ed17ad0c27bcdbbce00633191680a95c3fc9011e
SHA512378b665773e7d0978b7001f1249157aa49be5b1d6fbf5d6c76d3b79d99bdb596da89151a6f29708cb47c6b1e4742f03f40e88b8614e139dbbce00294416166e9
-
Filesize
102B
MD5bc1a09b32c052e6b3498150233ff5cfe
SHA15a111e3bb1a66a07acbae2ef19fd67f80f834531
SHA256a15f6dd76844ec33b59a1d69643912fb578f9cbf2ac65a981f274a050339e50f
SHA512205366823044abd3153d054dd5f37bd32b5c27c0467aec37dcbd0eff84e8d4285fa7765dc106ccc07528689704894ab69f15d89e9d7af7ebdac087c8590e0fa6