Analysis
-
max time kernel
127s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:46
Static task
static1
Behavioral task
behavioral1
Sample
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Resource
win10v2004-20221111-en
General
-
Target
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
-
Size
426KB
-
MD5
07f06f07be8fed6d6d3549194b3e5686
-
SHA1
3af21ce20da77519adb2e75e4115805b58b906d0
-
SHA256
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef
-
SHA512
d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb
-
SSDEEP
12288:82pPo5DWEbs+LjK0VneEFhPlTSzZV4hQt:8225iEbsGeEhrKt
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/664-81-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/680-82-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/664-83-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon -
Executes dropped EXE 4 IoCs
Processes:
6c735d.tmpedd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe6c7936.exesyotom.exepid process 1736 6c735d.tmp 844 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 680 6c7936.exe 664 syotom.exe -
Deletes itself 1 IoCs
Processes:
6c735d.tmppid process 1736 6c735d.tmp -
Loads dropped DLL 8 IoCs
Processes:
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe6c735d.tmpedd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exepid process 944 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 944 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 1736 6c735d.tmp 844 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 844 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 844 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 1736 6c735d.tmp 1736 6c735d.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6c7936.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 6c7936.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\syotom = "C:\\Windows\\syotom.exe" 6c7936.exe -
Drops file in Windows directory 2 IoCs
Processes:
6c7936.exedescription ioc process File created C:\Windows\syotom.exe 6c7936.exe File opened for modification C:\Windows\syotom.exe 6c7936.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exepid process 844 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exepid process 844 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 844 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe6c735d.tmp6c7936.exedescription pid process target process PID 944 wrote to memory of 1736 944 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 6c735d.tmp PID 944 wrote to memory of 1736 944 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 6c735d.tmp PID 944 wrote to memory of 1736 944 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 6c735d.tmp PID 944 wrote to memory of 1736 944 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 6c735d.tmp PID 1736 wrote to memory of 844 1736 6c735d.tmp edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe PID 1736 wrote to memory of 844 1736 6c735d.tmp edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe PID 1736 wrote to memory of 844 1736 6c735d.tmp edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe PID 1736 wrote to memory of 844 1736 6c735d.tmp edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe PID 1736 wrote to memory of 844 1736 6c735d.tmp edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe PID 1736 wrote to memory of 844 1736 6c735d.tmp edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe PID 1736 wrote to memory of 844 1736 6c735d.tmp edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe PID 1736 wrote to memory of 680 1736 6c735d.tmp 6c7936.exe PID 1736 wrote to memory of 680 1736 6c735d.tmp 6c7936.exe PID 1736 wrote to memory of 680 1736 6c735d.tmp 6c7936.exe PID 1736 wrote to memory of 680 1736 6c735d.tmp 6c7936.exe PID 680 wrote to memory of 664 680 6c7936.exe syotom.exe PID 680 wrote to memory of 664 680 6c7936.exe syotom.exe PID 680 wrote to memory of 664 680 6c7936.exe syotom.exe PID 680 wrote to memory of 664 680 6c7936.exe syotom.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\6c735d.tmp>C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Users\Admin\AppData\Local\Temp\6c7936.exe"C:\Users\Admin\AppData\Local\Temp\\6c7936.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\syotom.exeC:\Windows\syotom.exe4⤵
- Executes dropped EXE
PID:664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426KB
MD507f06f07be8fed6d6d3549194b3e5686
SHA13af21ce20da77519adb2e75e4115805b58b906d0
SHA256edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef
SHA512d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb
-
Filesize
426KB
MD507f06f07be8fed6d6d3549194b3e5686
SHA13af21ce20da77519adb2e75e4115805b58b906d0
SHA256edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef
SHA512d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb
-
Filesize
59KB
MD57b86a52b0408148032096a84cf75ece9
SHA1c069be8b2adf29b3f4ce07b53072db36b7a8dd70
SHA25687c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea
SHA512d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e
-
Filesize
59KB
MD57b86a52b0408148032096a84cf75ece9
SHA1c069be8b2adf29b3f4ce07b53072db36b7a8dd70
SHA25687c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea
SHA512d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e
-
C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Filesize350KB
MD594a510acab1446ebf38e0e08c21853d9
SHA1780702baabd2e5b4503b50d640b3a86fbf62e448
SHA256a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165
SHA5124018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de
-
C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Filesize350KB
MD594a510acab1446ebf38e0e08c21853d9
SHA1780702baabd2e5b4503b50d640b3a86fbf62e448
SHA256a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165
SHA5124018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de
-
Filesize
59KB
MD57b86a52b0408148032096a84cf75ece9
SHA1c069be8b2adf29b3f4ce07b53072db36b7a8dd70
SHA25687c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea
SHA512d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e
-
Filesize
59KB
MD57b86a52b0408148032096a84cf75ece9
SHA1c069be8b2adf29b3f4ce07b53072db36b7a8dd70
SHA25687c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea
SHA512d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e
-
Filesize
426KB
MD507f06f07be8fed6d6d3549194b3e5686
SHA13af21ce20da77519adb2e75e4115805b58b906d0
SHA256edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef
SHA512d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb
-
Filesize
426KB
MD507f06f07be8fed6d6d3549194b3e5686
SHA13af21ce20da77519adb2e75e4115805b58b906d0
SHA256edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef
SHA512d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb
-
Filesize
59KB
MD57b86a52b0408148032096a84cf75ece9
SHA1c069be8b2adf29b3f4ce07b53072db36b7a8dd70
SHA25687c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea
SHA512d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e
-
Filesize
59KB
MD57b86a52b0408148032096a84cf75ece9
SHA1c069be8b2adf29b3f4ce07b53072db36b7a8dd70
SHA25687c6cf12af199aed7721ff058a3aba68ccf8deef17ea4d3226ae6857199620ea
SHA512d2c526e979053d0a9ef4f867f9c0014732b590aaa96167f82754948fc6df41c2db1f9ba929e7b1f5642b3449fcc43522677d975feb54d6ee6a3f84e5ef73b24e
-
\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Filesize350KB
MD594a510acab1446ebf38e0e08c21853d9
SHA1780702baabd2e5b4503b50d640b3a86fbf62e448
SHA256a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165
SHA5124018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de
-
\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Filesize350KB
MD594a510acab1446ebf38e0e08c21853d9
SHA1780702baabd2e5b4503b50d640b3a86fbf62e448
SHA256a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165
SHA5124018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de
-
\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Filesize350KB
MD594a510acab1446ebf38e0e08c21853d9
SHA1780702baabd2e5b4503b50d640b3a86fbf62e448
SHA256a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165
SHA5124018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de
-
\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Filesize350KB
MD594a510acab1446ebf38e0e08c21853d9
SHA1780702baabd2e5b4503b50d640b3a86fbf62e448
SHA256a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165
SHA5124018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de