Analysis
-
max time kernel
168s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:46
Static task
static1
Behavioral task
behavioral1
Sample
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Resource
win10v2004-20221111-en
General
-
Target
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
-
Size
426KB
-
MD5
07f06f07be8fed6d6d3549194b3e5686
-
SHA1
3af21ce20da77519adb2e75e4115805b58b906d0
-
SHA256
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef
-
SHA512
d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb
-
SSDEEP
12288:82pPo5DWEbs+LjK0VneEFhPlTSzZV4hQt:8225iEbsGeEhrKt
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3484-143-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1512-147-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral2/memory/1512-148-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon -
Executes dropped EXE 4 IoCs
Processes:
e56d4c9.tmpedd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exee56d5a4.exesyotom.exepid process 5108 e56d4c9.tmp 1536 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 3484 e56d5a4.exe 1512 syotom.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e56d5a4.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run e56d5a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\syotom = "C:\\Windows\\syotom.exe" e56d5a4.exe -
Drops file in Windows directory 2 IoCs
Processes:
e56d5a4.exedescription ioc process File created C:\Windows\syotom.exe e56d5a4.exe File opened for modification C:\Windows\syotom.exe e56d5a4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exepid process 1536 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 1536 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exepid process 1536 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe 1536 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exee56d4c9.tmpe56d5a4.exedescription pid process target process PID 5016 wrote to memory of 5108 5016 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe e56d4c9.tmp PID 5016 wrote to memory of 5108 5016 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe e56d4c9.tmp PID 5016 wrote to memory of 5108 5016 edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe e56d4c9.tmp PID 5108 wrote to memory of 1536 5108 e56d4c9.tmp edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe PID 5108 wrote to memory of 1536 5108 e56d4c9.tmp edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe PID 5108 wrote to memory of 1536 5108 e56d4c9.tmp edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe PID 5108 wrote to memory of 3484 5108 e56d4c9.tmp e56d5a4.exe PID 5108 wrote to memory of 3484 5108 e56d4c9.tmp e56d5a4.exe PID 5108 wrote to memory of 3484 5108 e56d4c9.tmp e56d5a4.exe PID 3484 wrote to memory of 1512 3484 e56d5a4.exe syotom.exe PID 3484 wrote to memory of 1512 3484 e56d5a4.exe syotom.exe PID 3484 wrote to memory of 1512 3484 e56d5a4.exe syotom.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\e56d4c9.tmp>C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\e56d5a4.exe"C:\Users\Admin\AppData\Local\Temp\\e56d5a4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\syotom.exeC:\Windows\syotom.exe4⤵
- Executes dropped EXE
PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1512 -ip 15121⤵PID:3420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426KB
MD507f06f07be8fed6d6d3549194b3e5686
SHA13af21ce20da77519adb2e75e4115805b58b906d0
SHA256edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef
SHA512d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb
-
Filesize
426KB
MD507f06f07be8fed6d6d3549194b3e5686
SHA13af21ce20da77519adb2e75e4115805b58b906d0
SHA256edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef
SHA512d42d4385c74a6a544410e39d1d81d355d8f794f532b9da9d683bdc61d59f28611580b46e935a1c65394bd70ade0542de049eaa119a034849ff0619384e7bd9bb
-
Filesize
59KB
MD55a0f7fe220f0caafe614e1cc98b892ff
SHA1272501e08f3c4ffd7e879aad2f0fb8efd588fd4b
SHA2569cd8e4452551d25c2f7a8f4a07ce16f3cf0c9bd85d22f9ece56ca473e1dbecca
SHA51270b56cd40fa41763e1a56192bbcf81b0f88ce655a2916409f4f1ec7edecbfaf8c88ed631001dad6440544bcd06805142240357406516c2f2cb218ec369c6a375
-
Filesize
59KB
MD55a0f7fe220f0caafe614e1cc98b892ff
SHA1272501e08f3c4ffd7e879aad2f0fb8efd588fd4b
SHA2569cd8e4452551d25c2f7a8f4a07ce16f3cf0c9bd85d22f9ece56ca473e1dbecca
SHA51270b56cd40fa41763e1a56192bbcf81b0f88ce655a2916409f4f1ec7edecbfaf8c88ed631001dad6440544bcd06805142240357406516c2f2cb218ec369c6a375
-
C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Filesize350KB
MD594a510acab1446ebf38e0e08c21853d9
SHA1780702baabd2e5b4503b50d640b3a86fbf62e448
SHA256a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165
SHA5124018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de
-
C:\Users\Admin\AppData\Local\Temp\edd0709feb2fc5a23857845dd6e22d033f2aff6458510c20c027aed095e5e5ef.exe
Filesize350KB
MD594a510acab1446ebf38e0e08c21853d9
SHA1780702baabd2e5b4503b50d640b3a86fbf62e448
SHA256a8fe4c595219412475f26e9c3890b63f53b87f4397095ee313d895f659520165
SHA5124018dba7a308427fe071c558136fa0eb64349441d764ff57df784c1766abb513d5ded3163c8715a3bb6215a13814c35f904e4353481e4703e911c18147fbc4de
-
Filesize
59KB
MD55a0f7fe220f0caafe614e1cc98b892ff
SHA1272501e08f3c4ffd7e879aad2f0fb8efd588fd4b
SHA2569cd8e4452551d25c2f7a8f4a07ce16f3cf0c9bd85d22f9ece56ca473e1dbecca
SHA51270b56cd40fa41763e1a56192bbcf81b0f88ce655a2916409f4f1ec7edecbfaf8c88ed631001dad6440544bcd06805142240357406516c2f2cb218ec369c6a375
-
Filesize
59KB
MD55a0f7fe220f0caafe614e1cc98b892ff
SHA1272501e08f3c4ffd7e879aad2f0fb8efd588fd4b
SHA2569cd8e4452551d25c2f7a8f4a07ce16f3cf0c9bd85d22f9ece56ca473e1dbecca
SHA51270b56cd40fa41763e1a56192bbcf81b0f88ce655a2916409f4f1ec7edecbfaf8c88ed631001dad6440544bcd06805142240357406516c2f2cb218ec369c6a375