Analysis
-
max time kernel
111s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 23:45
Behavioral task
behavioral1
Sample
a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe
Resource
win10v2004-20220812-en
General
-
Target
a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe
-
Size
176KB
-
MD5
76e0e62f1569576b71d76d83ce4a8aa0
-
SHA1
13d2ef143ebf3df93344948f59d061589e843e49
-
SHA256
a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885
-
SHA512
8394a7ea5714ff40206930796fc35957293b46fb0a03915accb11b6df757a5e1350dfff1ead094cdc1a0ef508f2b61772e7c6d71197eb54cb6ef038956ea07fd
-
SSDEEP
768:xH/nnbwsrpEFEuo2GP+faFwv2+8ajKGNGa/DrX0s42nDhej1H:xfMomU2O+faFwjHDDbHnFkH
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/2028-55-0x0000000000400000-0x000000000042C000-memory.dmp family_blackmoon behavioral1/memory/2028-57-0x0000000000400000-0x000000000042C000-memory.dmp family_blackmoon -
Deletes itself 1 IoCs
pid Process 1268 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\YouPin = "C:\\Windows\\system32\\YouPin.exe" a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\YouPin.exe a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe File opened for modification C:\Windows\SysWOW64\YouPin.exe a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a000000000200000000001066000000010000200000009f6d56d3d791e40227e89a82adadb6456355ad9e9b1941f8f63d1a821d45ddf1000000000e8000000002000020000000678d285cb54c2d10b0f72b39599b04567829942f5a0c8f462dd3db5b205e6c81900000002aa9a7d38d62597969a1abb3c535785b01d58ec1bfa39242afd7e34986587859eca85411ba8cfb0e04ba2c18cf48b62585087822eddc49014ac21516add25963a57c664529f7714d5f944d9675d94f92789301aa455a5136dde8a7fb16cd9ee5e232141fad4661bebd19b04e91708c046e72f2912ecab00630152df7846e2e01892a30e110fe9618f832a80d4efa0ad040000000b0306a0a25c1dd0ca3c5b5791e6e3531eb27a021a351bf916e6abccab1b7c38eed0732ee5b48b62cebfd6b6275dc255ece47c1134deeaf05ca6cebf5d4bb321e IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372336750" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F70D3F1-4A1B-11ED-AD72-5E7A81A7298C} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a1ae6928ded801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000afeeb61bdd9bfb73b3736dcb932bf46be9ceedae5e0362f3da6af53725175d64000000000e80000000020000200000009a7514db6df7dbd6eb1a6f190247620d478abcfd959616034e81bb4e0a2b91482000000030b3ecc3bccb63cc51ba7fad2e19656daac9a44ccd6a5b983b64ddf5f14a715840000000a6fedf8f363018bbafd47f00d87676f87fe1f876cca7e38776c0f7c3744a2e0f331f9f68c4ed0afb583590b26d7f70bb32b45ad0181f6044b73eb812e92062e4 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1932 PING.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1168 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1168 IEXPLORE.EXE 1168 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE 1756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1168 2028 a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe 26 PID 2028 wrote to memory of 1168 2028 a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe 26 PID 2028 wrote to memory of 1168 2028 a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe 26 PID 2028 wrote to memory of 1168 2028 a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe 26 PID 1168 wrote to memory of 1756 1168 IEXPLORE.EXE 28 PID 1168 wrote to memory of 1756 1168 IEXPLORE.EXE 28 PID 1168 wrote to memory of 1756 1168 IEXPLORE.EXE 28 PID 1168 wrote to memory of 1756 1168 IEXPLORE.EXE 28 PID 2028 wrote to memory of 1268 2028 a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe 30 PID 2028 wrote to memory of 1268 2028 a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe 30 PID 2028 wrote to memory of 1268 2028 a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe 30 PID 2028 wrote to memory of 1268 2028 a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe 30 PID 1268 wrote to memory of 1932 1268 cmd.exe 32 PID 1268 wrote to memory of 1932 1268 cmd.exe 32 PID 1268 wrote to memory of 1932 1268 cmd.exe 32 PID 1268 wrote to memory of 1932 1268 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe"C:\Users\Admin\AppData\Local\Temp\a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://xz.sweetsstory.com/xz.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1168 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3&del "C:\Users\Admin\AppData\Local\Temp\a8b6afcf4b23a235bf9bc0d4bde33a68ead19fbafce3694b3c8ab602c40d5885.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:1932
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603B
MD54e0545abdee465ac5e15b9843f3bd1a3
SHA12e21bb3178dc811d233e482d7430ff4573440ee2
SHA256b7ae0e77162e76cbceb591e4c5cf64cec9b6920829543f46436fd2b922188379
SHA512fb820fe76768a45f6d3197a142daa9150a70f955365d56045670f0c742fb25bc7d72252cd85f2eb9470bab80aa0238c2387365bcee13cb8e8464ea8afc58cbb0