Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 19:41
Behavioral task
behavioral1
Sample
c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe
Resource
win7-20240903-en
General
-
Target
c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe
-
Size
366KB
-
MD5
0f73949e4672de28ad6b4533ef2eab13
-
SHA1
65a0a911e2a95e858f29964e5fe4c5c20f8db837
-
SHA256
c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220
-
SHA512
c5fd0d373bd342da7eb284c4acb2210a69657b7f2082778d0c23f2a0bf849f9d7fe6ca5d06325f3db5a7967f7993aab8c1000b6ac3e4ee661052c9dd20f25eb6
-
SSDEEP
6144:BSfSHl+gv5gY1F53Aul/Egv4+E6qnwEGvIkJ7G9P1P:B2SHl+gv5gY1b5Eo4+EsEEIkJ7G9P1P
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000016cf0-7.dat family_blackmoon -
Deletes itself 1 IoCs
pid Process 2612 Syslemaqtee.exe -
Executes dropped EXE 1 IoCs
pid Process 2612 Syslemaqtee.exe -
Loads dropped DLL 2 IoCs
pid Process 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe 2612 Syslemaqtee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2612 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 31 PID 2220 wrote to memory of 2612 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 31 PID 2220 wrote to memory of 2612 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 31 PID 2220 wrote to memory of 2612 2220 c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe"C:\Users\Admin\AppData\Local\Temp\c5c4b07d1316494714e311d3fdaf92402ad98c3d9ddb4852082c3357248f7220.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Syslemaqtee.exe"C:\Users\Admin\AppData\Local\Temp\Syslemaqtee.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5acf91eb69a8244f33bc3c5fe7cc6945b
SHA1b09d5ca0bb0a7d7999cae84159ce472611b38470
SHA256e0cbdc3f3c572f83305aed7c64b0eaf74b257f79e5bb6c51caa6e081cf31854a
SHA51200f48c074fcc276ddc376d866f3614f81e2a1624c970875c16c9a4469985b8c69100272215eb5e5ce46fb008daf0f88e065fd03ca4a9be615f62d8677ab82aac
-
Filesize
366KB
MD5b3fed7eb7844f40ef1febe02fa2583da
SHA1bd841955a08a7363edd44dce6dc9cb511afeaf1f
SHA256a782340859beb2298b1caae42af5b5e9dc64aa9ab416b895f2868785e9c99f18
SHA512bafde556fc9b1e2748190e8dc4c91e29edd733235e666150fb715619ac793f725732ad63a1eed746fea0ce6150efbe38999e71cb2a2c7ee9e79fa38ac83d82cd