Analysis
-
max time kernel
118s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 04:32
Behavioral task
behavioral1
Sample
5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe
Resource
win7-20240903-en
General
-
Target
5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe
-
Size
366KB
-
MD5
b2791d470ef60f08a129fcfc6c03d610
-
SHA1
1055e343bf6ec8daf26d8727401b99a39eeb0e37
-
SHA256
5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19
-
SHA512
60ba9d5c7b248ddcd024a89fb22adbdf43bc3c96570323e8e20171475ce9b585bbbba70995cca2a41a37fd713ad6889d8194d0a08fd1ddb0c4db70bbda45a63b
-
SSDEEP
6144:BSfSHl+gv5gY1F53Aul/Egv4+E6qnwEGvIkJ7G9P1t:B2SHl+gv5gY1b5Eo4+EsEEIkJ7G9P1t
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x00070000000174b4-7.dat family_blackmoon -
Deletes itself 1 IoCs
pid Process 2584 Syslemmclue.exe -
Executes dropped EXE 1 IoCs
pid Process 2584 Syslemmclue.exe -
Loads dropped DLL 2 IoCs
pid Process 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe 2584 Syslemmclue.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2584 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 31 PID 3048 wrote to memory of 2584 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 31 PID 3048 wrote to memory of 2584 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 31 PID 3048 wrote to memory of 2584 3048 5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe"C:\Users\Admin\AppData\Local\Temp\5588ff784ba3a7cb1098ee43b264c1827f8dcdeb6112f7506020787a567ceb19N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Syslemmclue.exe"C:\Users\Admin\AppData\Local\Temp\Syslemmclue.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103B
MD5f50998ea60d43818881a0cdc3644e64f
SHA13d369feeb21d5f5ac68cfaba8463107909fa0021
SHA2563f09dae953213f704b7503c7350fe9f00cc17020c9bdbb0b06a06a8619d3a86f
SHA5121d6f3ecbd58a867f398ba446472cf0923c3ee45b43e93b5a00d91cf96ac86fa9effd4e17203b4fdd4430554cd17a9e554dccdeaf1aa752085b7d34abe9c271c1
-
Filesize
366KB
MD5eb1b8361c5e3654be20d8b8ee54cd79c
SHA1824b148fad1f1f2e70f098cb0ad75cf4a0d742cf
SHA2563c2767dbf1e5404ace2fde34b7890e0b431811d72323c7a19b3c19d18c5dd8a5
SHA512faa452d2df80a2746b5721f5211c4701dd136f2a32711ad514d78bf4d9d9d468ead2c8b82d0063cd1aeae35f4d77e5cc70d522c52f466052dd7f35e76061ae5b