Analysis
-
max time kernel
92s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 16:30
Behavioral task
behavioral1
Sample
552f2ef9e25bf909ae321e78cb67edd809a529f5a81021f68e47e8d4923fa752.exe
Resource
win7-20240729-en
General
-
Target
552f2ef9e25bf909ae321e78cb67edd809a529f5a81021f68e47e8d4923fa752.exe
-
Size
2.3MB
-
MD5
bc055ee1a3e93a1f1cadb666d073aa39
-
SHA1
3a0d99190c69380ce01a088d7b8850debe4cf0f8
-
SHA256
552f2ef9e25bf909ae321e78cb67edd809a529f5a81021f68e47e8d4923fa752
-
SHA512
e77c8e75f9b1bce8136ebdb1807915f81c37d80f03e29b55cde6ee3c1755484b312254f86264ccc7dac54e65d68e4a7a4987b615af1b0f9fd2c986d6c3a36988
-
SSDEEP
24576:3qzIIUgC8d36kLBXlnB8j7v5Ta+hLLQ20JmXSeWwa1oWJQjk0svTS/PPsbb1hwRn:3sCOfN6X5tLLQTg20ITS/PPs/1kS4eW
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/3296-0-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/files/0x0009000000023c6b-3.dat family_blackmoon behavioral2/memory/3152-4-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3296-6-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 1 IoCs
pid Process 3152 vppjp.exe -
resource yara_rule behavioral2/memory/3296-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/files/0x0009000000023c6b-3.dat upx behavioral2/memory/3152-4-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3296-6-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2352 3152 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 552f2ef9e25bf909ae321e78cb67edd809a529f5a81021f68e47e8d4923fa752.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3296 wrote to memory of 3152 3296 552f2ef9e25bf909ae321e78cb67edd809a529f5a81021f68e47e8d4923fa752.exe 82 PID 3296 wrote to memory of 3152 3296 552f2ef9e25bf909ae321e78cb67edd809a529f5a81021f68e47e8d4923fa752.exe 82 PID 3296 wrote to memory of 3152 3296 552f2ef9e25bf909ae321e78cb67edd809a529f5a81021f68e47e8d4923fa752.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\552f2ef9e25bf909ae321e78cb67edd809a529f5a81021f68e47e8d4923fa752.exe"C:\Users\Admin\AppData\Local\Temp\552f2ef9e25bf909ae321e78cb67edd809a529f5a81021f68e47e8d4923fa752.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
\??\c:\vppjp.exec:\vppjp.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 2243⤵
- Program crash
PID:2352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3152 -ip 31521⤵PID:1000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD57ced0aac3fce863613a63ebaa1215d89
SHA19ea1dc553e92d569e12f3dd3582813891c913b1e
SHA25652d7a19dddd97fe4b6241bc837ad087459ec3c2543777face4f6a4634b9d1c5f
SHA5126e8fd72fa3591226480ac763721a93ef18610c0d3e65a7ba00c9ec8bc739b0a796d457e612faa6352020ca9a6a27b68ab20d7753e28569aea9530e0b898999bd