Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
submitted
25-07-2022 08:25
Behavioral task
behavioral1
Sample
b7f74c02e8e4dc10eb8f11d0e107310e.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
b7f74c02e8e4dc10eb8f11d0e107310e.exe
Resource
win10v2004-20220721-en
General
-
Target
b7f74c02e8e4dc10eb8f11d0e107310e.exe
-
Size
1.2MB
-
MD5
b7f74c02e8e4dc10eb8f11d0e107310e
-
SHA1
d7efa03c14830997e55c78365ee15bd8c1c01971
-
SHA256
3ac761271417ecf9e5e8e6152f3c9bbcaf8863286da6933f5fc4c7a2462a31e9
-
SHA512
d64d3224075ca55efe055dca5f9fcb658b4541db94db1908a05924827b1d6d290e5f0bab83477a13fc29292793e32e420d6183155076235f8ebc26363b2e5c44
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/2116-136-0x0000000000400000-0x0000000000611000-memory.dmp family_blackmoon behavioral2/files/0x000c000000022ec0-138.dat family_blackmoon behavioral2/files/0x000c000000022ec0-139.dat family_blackmoon behavioral2/memory/2116-142-0x0000000000400000-0x0000000000611000-memory.dmp family_blackmoon -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SQL Server Reporting Services (MSSQLSERVSER)\Parameters\ServiceDll = "C:\\ProgramData\\Microsoft\\Windows\\GameExplorer\\Remote.hlp" b7f74c02e8e4dc10eb8f11d0e107310e.exe -
resource yara_rule behavioral2/memory/4108-130-0x0000000000400000-0x00000000005CA000-memory.dmp upx behavioral2/memory/2116-132-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/4108-134-0x0000000000400000-0x00000000005CA000-memory.dmp upx behavioral2/memory/2116-135-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/2116-136-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/4396-141-0x0000000001BF0000-0x0000000001BFB000-memory.dmp upx behavioral2/memory/2116-142-0x0000000000400000-0x0000000000611000-memory.dmp upx behavioral2/memory/4396-145-0x0000000001BF0000-0x0000000001BFB000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 4396 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Delete00.bat b7f74c02e8e4dc10eb8f11d0e107310e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4108 set thread context of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe 81 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4492 sc.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4368 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe 4396 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe Token: SeDebugPrivilege 4396 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4108 wrote to memory of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe 81 PID 4108 wrote to memory of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe 81 PID 4108 wrote to memory of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe 81 PID 4108 wrote to memory of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe 81 PID 4108 wrote to memory of 2116 4108 b7f74c02e8e4dc10eb8f11d0e107310e.exe 81 PID 2116 wrote to memory of 4492 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe 83 PID 2116 wrote to memory of 4492 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe 83 PID 2116 wrote to memory of 4492 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe 83 PID 2116 wrote to memory of 2184 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe 85 PID 2116 wrote to memory of 2184 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe 85 PID 2116 wrote to memory of 2184 2116 b7f74c02e8e4dc10eb8f11d0e107310e.exe 85 PID 2184 wrote to memory of 4368 2184 cmd.exe 87 PID 2184 wrote to memory of 4368 2184 cmd.exe 87 PID 2184 wrote to memory of 4368 2184 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7f74c02e8e4dc10eb8f11d0e107310e.exe"C:\Users\Admin\AppData\Local\Temp\b7f74c02e8e4dc10eb8f11d0e107310e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\b7f74c02e8e4dc10eb8f11d0e107310e.exe
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\sc.exesc failure SQL Server Reporting Services (MSSQLSERVSER) reset= 86400 actions= restart/10003⤵
- Launches sc.exe
PID:4492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\\Delete00.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:4368
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936KB
MD52148ed98f723563683990f569d23bf43
SHA125cfad1a06933f65f7d110a81d7adbfa83c19005
SHA256b53132d5c59e5e62e23a9cb65fa9c09aa8403f625d76877c4e8fd60a331be56a
SHA5128ac4b829802e3238fcdf6629b09417dfb48b04d18880a230a387b3673c724a8281c795c83e7a088c12ef676b9fd054b70f90aebca34a1217fc7376aeb9f13dfa
-
Filesize
133B
MD5fe72e026fa4c2520aa971558762d04c9
SHA18efaf78444b8d155d7174a5500f3980b4c53c0ff
SHA256e0d8793794aafd2f6619820c93f9f9a8f7c59c0187339d4c4330c9c67a8efbaf
SHA51221384f6f4826b306ec1b760161faec85a643b660418438773bba9deb18a668ee4e6e6edeb75137a290df06e4c3619bc03dfc98fb0099ad00200340a34378c7cd
-
Filesize
936KB
MD52148ed98f723563683990f569d23bf43
SHA125cfad1a06933f65f7d110a81d7adbfa83c19005
SHA256b53132d5c59e5e62e23a9cb65fa9c09aa8403f625d76877c4e8fd60a331be56a
SHA5128ac4b829802e3238fcdf6629b09417dfb48b04d18880a230a387b3673c724a8281c795c83e7a088c12ef676b9fd054b70f90aebca34a1217fc7376aeb9f13dfa