Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/09/2022, 10:58
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
107KB
-
MD5
5b2dbd6f2668a6d4a304007a7554806c
-
SHA1
cb40d7f273af19a4474dbe0a96bddb68a8e535df
-
SHA256
a299fe9f7c5902b0faa026ef0c9aa59292dfe3fa9983e1abd801472cb2d3e26d
-
SHA512
8226086ac4e1f6a3c40d3b8f69d88d78262696a51101eb94aec3b82f6abb35e633da640dc8826ab2753009bf12d40f51a0e48ccc32f738d69c0e5b0124b72281
-
SSDEEP
1536:swSFvo7h95drZApq4nVNlobB+3aA4XrPZlfyo63EnOGkE+Z7XbT7mNhcbAsgFnxM:b93Inri+KAo/xOZ1X7bbAsE
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/1408-55-0x0000000000400000-0x0000000000463000-memory.dmp family_blackmoon behavioral1/memory/1408-69-0x0000000000400000-0x0000000000463000-memory.dmp family_blackmoon -
Executes dropped EXE 2 IoCs
pid Process 1072 z.exe 2028 z.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\b\ImagePath = "\\??\\C:\\Windows\\temp\\b.sys" z.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\f\ImagePath = "\\??\\C:\\Windows\\temp\\f.sys" z.exe -
resource yara_rule behavioral1/memory/1408-55-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1408-69-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1620 cmd.exe -
Kills process with taskkill 4 IoCs
pid Process 1652 taskkill.exe 516 taskkill.exe 904 taskkill.exe 1644 taskkill.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1072 z.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 904 taskkill.exe Token: SeDebugPrivilege 1644 taskkill.exe Token: SeDebugPrivilege 1652 taskkill.exe Token: SeDebugPrivilege 516 taskkill.exe Token: SeLoadDriverPrivilege 1072 z.exe Token: SeLoadDriverPrivilege 2028 z.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1408 tmp.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1380 1408 tmp.exe 26 PID 1408 wrote to memory of 1380 1408 tmp.exe 26 PID 1408 wrote to memory of 1380 1408 tmp.exe 26 PID 1408 wrote to memory of 1380 1408 tmp.exe 26 PID 1380 wrote to memory of 904 1380 cmd.exe 28 PID 1380 wrote to memory of 904 1380 cmd.exe 28 PID 1380 wrote to memory of 904 1380 cmd.exe 28 PID 1380 wrote to memory of 904 1380 cmd.exe 28 PID 1380 wrote to memory of 1644 1380 cmd.exe 30 PID 1380 wrote to memory of 1644 1380 cmd.exe 30 PID 1380 wrote to memory of 1644 1380 cmd.exe 30 PID 1380 wrote to memory of 1644 1380 cmd.exe 30 PID 1380 wrote to memory of 1652 1380 cmd.exe 32 PID 1380 wrote to memory of 1652 1380 cmd.exe 32 PID 1380 wrote to memory of 1652 1380 cmd.exe 32 PID 1380 wrote to memory of 1652 1380 cmd.exe 32 PID 1408 wrote to memory of 1620 1408 tmp.exe 33 PID 1408 wrote to memory of 1620 1408 tmp.exe 33 PID 1408 wrote to memory of 1620 1408 tmp.exe 33 PID 1408 wrote to memory of 1620 1408 tmp.exe 33 PID 1620 wrote to memory of 1072 1620 cmd.exe 36 PID 1620 wrote to memory of 1072 1620 cmd.exe 36 PID 1620 wrote to memory of 1072 1620 cmd.exe 36 PID 1620 wrote to memory of 1072 1620 cmd.exe 36 PID 1380 wrote to memory of 516 1380 cmd.exe 37 PID 1380 wrote to memory of 516 1380 cmd.exe 37 PID 1380 wrote to memory of 516 1380 cmd.exe 37 PID 1380 wrote to memory of 516 1380 cmd.exe 37 PID 1408 wrote to memory of 268 1408 tmp.exe 39 PID 1408 wrote to memory of 268 1408 tmp.exe 39 PID 1408 wrote to memory of 268 1408 tmp.exe 39 PID 1408 wrote to memory of 268 1408 tmp.exe 39 PID 268 wrote to memory of 2028 268 cmd.exe 41 PID 268 wrote to memory of 2028 268 cmd.exe 41 PID 268 wrote to memory of 2028 268 cmd.exe 41 PID 268 wrote to memory of 2028 268 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM WmiPrvSE.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM WmiPrvSE.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM WmiPrvSE.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM WmiPrvSE.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c z.exe f.sys b.sys2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\temp\z.exez.exe f.sys b.sys3⤵
- Executes dropped EXE
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c z.exe b.sys2⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\temp\z.exez.exe b.sys3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD55a553b1c9a9dd4a03331d9b33951adad
SHA1c26e3652ef52539924d873631295a0bd74f4791f
SHA2569dd7c4d245afd85ca1fbaf786d629e1a941616c6f6fb8cb55300d3fa5cacdb79
SHA512f02709fb20e4646e8b7342983d3ba9428f824cde84d9223d55be300d74e8a2d60388ee603eb25e52f92a412e0467d6cc9ff603f3b506afb1fb286e391d82a567
-
Filesize
19KB
MD55a553b1c9a9dd4a03331d9b33951adad
SHA1c26e3652ef52539924d873631295a0bd74f4791f
SHA2569dd7c4d245afd85ca1fbaf786d629e1a941616c6f6fb8cb55300d3fa5cacdb79
SHA512f02709fb20e4646e8b7342983d3ba9428f824cde84d9223d55be300d74e8a2d60388ee603eb25e52f92a412e0467d6cc9ff603f3b506afb1fb286e391d82a567
-
Filesize
19KB
MD55a553b1c9a9dd4a03331d9b33951adad
SHA1c26e3652ef52539924d873631295a0bd74f4791f
SHA2569dd7c4d245afd85ca1fbaf786d629e1a941616c6f6fb8cb55300d3fa5cacdb79
SHA512f02709fb20e4646e8b7342983d3ba9428f824cde84d9223d55be300d74e8a2d60388ee603eb25e52f92a412e0467d6cc9ff603f3b506afb1fb286e391d82a567