Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 17:18
Static task
static1
General
-
Target
c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe
-
Size
9.2MB
-
MD5
d5c582bc6b5df6a26042b51e4a1a49b4
-
SHA1
df14de77934e91fe8b2d88366eb9cffa92e16f63
-
SHA256
c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa
-
SHA512
3b8027314d0b4bfdae8313101caeaf54d53b8ecf255e9cacdb5a48c31b7e9a71831dc547dac8b0772c05bb4902df2116a7fa1283d08c4c61daac05e46e246916
-
SSDEEP
196608:qQkV+lOBzFnXiMDa1x36Ir7yhs2VFMbEXE6psFkVX0+2qTV2tLUkran:q/+E3SMDWx36gV2VOEXEbFkG+2yV2W2E
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x000700000002413a-21.dat family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 1908 UaZ4EuK.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 UaZ4EuK.exe 1908 UaZ4EuK.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UaZ4EuK.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 844 c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe 844 c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe 4988 c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe 4988 c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1908 UaZ4EuK.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 844 wrote to memory of 4988 844 c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe 88 PID 844 wrote to memory of 4988 844 c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe 88 PID 4988 wrote to memory of 1908 4988 c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe 108 PID 4988 wrote to memory of 1908 4988 c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe 108 PID 4988 wrote to memory of 1908 4988 c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe"C:\Users\Admin\AppData\Local\Temp\c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exeC:\Users\Admin\AppData\Local\Temp\c987fb55599273ea6a9a1c213d9bcb431f32f4b645bdcc3c079f6f35005d00fa.exe 410238025E02570271026702700271025E02430266026F026B026C025E0243027202720246026302760263025E0250026D0263026F026B026C0265025E027102600261026C0274026A027B027002680261026A027A025E024E026A0251023A0232025D0250026C027502710231027102430248024E023B025E025702630258023602470277024902--aa`2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Roaming\sbcnvhyrjchx\LhS80_Rnws3sAJL9\UaZ4EuK.exe"C:\Users\Admin\AppData\Roaming\sbcnvhyrjchx\LhS80_Rnws3sAJL9\UaZ4EuK.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.4MB
MD58af477438e5479a3a6a5475ddca93587
SHA1bdab9cacdbd0ed4bb38329f03f6549723094758f
SHA2565feea43c9aac17639428030969c6f49e920a94ddcf9147abe14788b5ad85cf30
SHA512ca5ea584a092b98b3e02e87ea462a5dd9fc312a2a76d2d8c1cff1fd3f1cd0e710068ffb25c9f00003c66674b6b255fa272779937e72cbd523ee091c174404fea
-
Filesize
837B
MD5ad335bdca51d331c4d8945eb0c544c7b
SHA16f63f79c748dcf860452fd0b800e4f5dcba647b2
SHA25610a45c119feccf50bccafa7c149851fd385bc4e501981221ce4ae61563cbd1ec
SHA5127356b8e1c52dd55872ae63ee91448235c29c0103b4d03f99be79a075ec1b9d075a9983353449e7401bdde874b0a860371923da75d2887cbfc0117c14f8ce3381
-
Filesize
279KB
MD542843e876a756582005ce00af2d72666
SHA1d6c83ef842182461259ac89d94d2618adad53950
SHA2564e9d1adea997c859f7b7bde241c15b7997e08035f4955cf4c64b7d661fa5b346
SHA512ff847e615a0148bea594e2f614fec643b78ba67a94069ab8078cfbd3ca63ffa6b9d2810b6f6a7fcd82bc480aed3a2c4217b58c9b5307b27eec5607d7573a1034
-
Filesize
532KB
MD560579755495513c293b5bb8c5ff9d83f
SHA16c4895aa7148d3394921830977aa6f67af2954cb
SHA256018c2cb427c57517cd857d0d0b8ae92756761ab574493766b94f48ebea323254
SHA512d327dc0ad9a6f0cee2d3526a677d6beaa7b401d98c6fdfc98ed42aa5c8a772e800d24362e3260107a9fa17901885419893a208debd33524ae9a069c3fe1c300b