Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
submitted
25-07-2022 08:25
Behavioral task
behavioral1
Sample
b7f74c02e8e4dc10eb8f11d0e107310e.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
b7f74c02e8e4dc10eb8f11d0e107310e.exe
Resource
win10v2004-20220721-en
General
-
Target
b7f74c02e8e4dc10eb8f11d0e107310e.exe
-
Size
1MB
-
MD5
b7f74c02e8e4dc10eb8f11d0e107310e
-
SHA1
d7efa03c14830997e55c78365ee15bd8c1c01971
-
SHA256
3ac761271417ecf9e5e8e6152f3c9bbcaf8863286da6933f5fc4c7a2462a31e9
-
SHA512
d64d3224075ca55efe055dca5f9fcb658b4541db94db1908a05924827b1d6d290e5f0bab83477a13fc29292793e32e420d6183155076235f8ebc26363b2e5c44
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2116-136-0x0000000000400000-0x0000000000611000-memory.dmp family_blackmoon behavioral2/files/0x000c000000022ec0-138.dat family_blackmoon behavioral2/files/0x000c000000022ec0-139.dat family_blackmoon behavioral2/memory/2116-142-0x0000000000400000-0x0000000000611000-memory.dmp family_blackmoon -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
b7f74c02e8e4dc10eb8f11d0e107310e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SQL Server Reporting Services (MSSQLSERVSER)\Parameters\ServiceDll = "C:\\ProgramData\\Microsoft\\Windows\\GameExplorer\\Remote.hlp" b7f74c02e8e4dc10eb8f11d0e107310e.exe -
Processes:
resource yara_rule behavioral2/memory/4108-130-0x0000000000400000-0x00000000005CA000-memory.dmp upx behavioral2/memory/2116-132-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/4108-134-0x0000000000400000-0x00000000005CA000-memory.dmp upx behavioral2/memory/2116-135-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/2116-136-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/4396-141-0x0000000001BF0000-0x0000000001BFB000-memory.dmp upx behavioral2/memory/2116-142-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/4396-145-0x0000000001BF0000-0x0000000001BFB000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 4396 svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
b7f74c02e8e4dc10eb8f11d0e107310e.exedescription ioc process File created C:\Windows\SysWOW64\Delete00.bat b7f74c02e8e4dc10eb8f11d0e107310e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b7f74c02e8e4dc10eb8f11d0e107310e.exedescription pid process target process PID 4108 set thread context of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe b7f74c02e8e4dc10eb8f11d0e107310e.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4492 sc.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
b7f74c02e8e4dc10eb8f11d0e107310e.exesvchost.exepid process 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b7f74c02e8e4dc10eb8f11d0e107310e.exesvchost.exedescription pid process Token: SeDebugPrivilege 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe Token: SeDebugPrivilege 4396 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
b7f74c02e8e4dc10eb8f11d0e107310e.exeb7f74c02e8e4dc10eb8f11d0e107310e.execmd.exedescription pid process target process PID 4108 wrote to memory of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe b7f74c02e8e4dc10eb8f11d0e107310e.exe PID 4108 wrote to memory of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe b7f74c02e8e4dc10eb8f11d0e107310e.exe PID 4108 wrote to memory of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe b7f74c02e8e4dc10eb8f11d0e107310e.exe PID 4108 wrote to memory of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe b7f74c02e8e4dc10eb8f11d0e107310e.exe PID 4108 wrote to memory of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe b7f74c02e8e4dc10eb8f11d0e107310e.exe PID 2116 wrote to memory of 4492 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe sc.exe PID 2116 wrote to memory of 4492 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe sc.exe PID 2116 wrote to memory of 4492 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe sc.exe PID 2116 wrote to memory of 2184 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe cmd.exe PID 2116 wrote to memory of 2184 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe cmd.exe PID 2116 wrote to memory of 2184 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe cmd.exe PID 2184 wrote to memory of 4368 2184 cmd.exe PING.EXE PID 2184 wrote to memory of 4368 2184 cmd.exe PING.EXE PID 2184 wrote to memory of 4368 2184 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7f74c02e8e4dc10eb8f11d0e107310e.exe"C:\Users\Admin\AppData\Local\Temp\b7f74c02e8e4dc10eb8f11d0e107310e.exe"Suspicious use of SetThreadContextSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b7f74c02e8e4dc10eb8f11d0e107310e.exeSets DLL path for service in the registryDrops file in System32 directorySuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc failure SQL Server Reporting Services (MSSQLSERVSER) reset= 86400 actions= restart/1000Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\\Delete00.batSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1Runs ping.exe
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcsLoads dropped DLLSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Modify Registry
1Discovery
Remote System Discovery
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Registry Run Keys / Startup Folder
1Privilege Escalation
Replay Monitor
Downloads
-
C:\ProgramData\Microsoft\Windows\GameExplorer\Remote.hlpFilesize
936KB
MD52148ed98f723563683990f569d23bf43
SHA125cfad1a06933f65f7d110a81d7adbfa83c19005
SHA256b53132d5c59e5e62e23a9cb65fa9c09aa8403f625d76877c4e8fd60a331be56a
SHA5128ac4b829802e3238fcdf6629b09417dfb48b04d18880a230a387b3673c724a8281c795c83e7a088c12ef676b9fd054b70f90aebca34a1217fc7376aeb9f13dfa
-
C:\Windows\SysWOW64\Delete00.batFilesize
133B
MD5fe72e026fa4c2520aa971558762d04c9
SHA18efaf78444b8d155d7174a5500f3980b4c53c0ff
SHA256e0d8793794aafd2f6619820c93f9f9a8f7c59c0187339d4c4330c9c67a8efbaf
SHA51221384f6f4826b306ec1b760161faec85a643b660418438773bba9deb18a668ee4e6e6edeb75137a290df06e4c3619bc03dfc98fb0099ad00200340a34378c7cd
-
\??\c:\programdata\microsoft\windows\gameexplorer\remote.hlpFilesize
936KB
MD52148ed98f723563683990f569d23bf43
SHA125cfad1a06933f65f7d110a81d7adbfa83c19005
SHA256b53132d5c59e5e62e23a9cb65fa9c09aa8403f625d76877c4e8fd60a331be56a
SHA5128ac4b829802e3238fcdf6629b09417dfb48b04d18880a230a387b3673c724a8281c795c83e7a088c12ef676b9fd054b70f90aebca34a1217fc7376aeb9f13dfa
-
memory/2116-131-0x0000000000000000-mapping.dmp
-
memory/2116-132-0x0000000000400000-0x0000000000611000-memory.dmpFilesize
2MB
-
memory/2116-135-0x0000000000400000-0x0000000000611000-memory.dmpFilesize
2MB
-
memory/2116-136-0x0000000000400000-0x0000000000611000-memory.dmpFilesize
2MB
-
memory/2116-142-0x0000000000400000-0x0000000000611000-memory.dmpFilesize
2MB
-
memory/2184-140-0x0000000000000000-mapping.dmp
-
memory/4108-134-0x0000000000400000-0x00000000005CA000-memory.dmpFilesize
1MB
-
memory/4108-130-0x0000000000400000-0x00000000005CA000-memory.dmpFilesize
1MB
-
memory/4368-144-0x0000000000000000-mapping.dmp
-
memory/4396-141-0x0000000001BF0000-0x0000000001BFB000-memory.dmpFilesize
44KB
-
memory/4396-145-0x0000000001BF0000-0x0000000001BFB000-memory.dmpFilesize
44KB
-
memory/4492-137-0x0000000000000000-mapping.dmp