Analysis
-
max time kernel
110s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 11:59
Behavioral task
behavioral1
Sample
70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe
Resource
win7-20220812-en
General
-
Target
70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe
-
Size
10.8MB
-
MD5
1c974b9aaf3a98cd2221591db21f9f93
-
SHA1
19cc90e4969a97971d5a45bccd35bf5612644de7
-
SHA256
70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa
-
SHA512
54df741f40a3d641d6f9b711e614f14eb4b207d255d3b8ced850dcf90701cb16626cf1027f9a8bd5d3412e5edd3b8b83c644dc39afe579d57cabff78617a5f8a
-
SSDEEP
196608:lU6na3D1MLj1Zd//tYL/LQ1K+AHtIa8SL:lUbM5/aL/RHtpxL
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1808-55-0x0000000000400000-0x0000000000F03000-memory.dmp family_blackmoon behavioral1/memory/1808-56-0x0000000000400000-0x0000000000F03000-memory.dmp family_blackmoon behavioral1/memory/1808-61-0x0000000000400000-0x0000000000F03000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral1/memory/1808-58-0x00000000003B0000-0x00000000003D6000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/1808-55-0x0000000000400000-0x0000000000F03000-memory.dmp vmprotect behavioral1/memory/1808-56-0x0000000000400000-0x0000000000F03000-memory.dmp vmprotect behavioral1/memory/1808-61-0x0000000000400000-0x0000000000F03000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exedescription ioc process File opened for modification \??\PhysicalDrive0 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{079FC891-6CF9-11ED-A94D-C6F54D7498C3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003cfd5a2cc6d15d4d819cc15278b1474b00000000020000000000106600000001000020000000b90b24e4fd2302b2ec051db50a71b21470b9ab0f1dfc43d8fc99d1edb062c1f0000000000e80000000020000200000004645c89ff2efa428b70eeb5fed0beb0bff92dd43d0c11ad28be5d8926d19650a20000000f6e31d3bb04ffd06b51b971f9c73f002f1dd9380b9a7fe8d54ca49b7db7aece74000000031dff620b304e0717f5cfa16219d07f92a388152be94fbce9425a87de8d0b15f413a9ae37e8be145156ce08f2d35fd10b7fccc4140e7a4dac83a981613cb590f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d289da0501d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376170217" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exepid process 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exedescription pid process Token: SeDebugPrivilege 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exeiexplore.exeIEXPLORE.EXEpid process 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe 1936 iexplore.exe 1936 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exeiexplore.exedescription pid process target process PID 1808 wrote to memory of 1756 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe cmd.exe PID 1808 wrote to memory of 1756 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe cmd.exe PID 1808 wrote to memory of 1756 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe cmd.exe PID 1808 wrote to memory of 1756 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe cmd.exe PID 1808 wrote to memory of 1004 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe cmd.exe PID 1808 wrote to memory of 1004 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe cmd.exe PID 1808 wrote to memory of 1004 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe cmd.exe PID 1808 wrote to memory of 1004 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe cmd.exe PID 1808 wrote to memory of 1936 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe iexplore.exe PID 1808 wrote to memory of 1936 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe iexplore.exe PID 1808 wrote to memory of 1936 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe iexplore.exe PID 1808 wrote to memory of 1936 1808 70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe iexplore.exe PID 1936 wrote to memory of 1700 1936 iexplore.exe IEXPLORE.EXE PID 1936 wrote to memory of 1700 1936 iexplore.exe IEXPLORE.EXE PID 1936 wrote to memory of 1700 1936 iexplore.exe IEXPLORE.EXE PID 1936 wrote to memory of 1700 1936 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe"C:\Users\Admin\AppData\Local\Temp\70c1395c202359a6d45426a2ba8d045dfbb9dcfbd0b294173e2403310be3f1fa.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\rom1076.tmp.exe > C:\Users\Admin\AppData\Local\Temp\rom1076.tmp2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\rom12B8.tmp.exe > C:\Users\Admin\AppData\Local\Temp\rom12B8.tmp2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.91chg.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57529085cb2ce7211d3873de2fe19a433
SHA189a7099667415cfb16af3fa5f4ab03390b9e7bbe
SHA256ed6007fabe80c7b51f59cca035d5d5de1019c7df402a9e00b76dad07812a0448
SHA512b7310bf530a0c8d9252afac136238934a9339f0bbc14b6f1f9e222f553aae28cdb1dd8df9383943b53e2f5b314eceae256077254bb79aa1b2b764c14ad84a34e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.datFilesize
5KB
MD57d21ba3d51fad5d08ac11b8710bb3801
SHA1da1b820bc5957fd8f275c26b64b74cafc399e388
SHA2564742c3972ad8cf95378d9f80cfb7f793cbd1626682c5a2880dbe1c92629561d2
SHA51257fdfc7d5a94385c8fb9678eca7bb0e1fe3f8b8544b237d1586d24ee55d44daf54cea9d925f9d09a899a1b6fce92911b51cf758b7aa61bca0c85185511fd070f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.datFilesize
6KB
MD5b9fcdde0ba29d21729b7f68f4b3de809
SHA1f2410ea2eb8d43b02327a27c75d77d219ef020a3
SHA2567e2e933e1175b8c9e555762540dc5508de9c47a962608b4afd9f1869cdc2ba29
SHA51294e97e1697dc36a4e5cfbc4a728106a0e0f7d6b4f5abdb753ac5c565dc55a14377dbdd7d168c43430113e0d51d8735640e8a54c239cb566e1cb3f594957b2e53
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\899P31UD.txtFilesize
603B
MD58efdbfc7e35c5eff2b9896b3a93660e0
SHA1c16dae64e59baddaf7fc11fa4d0633e980642e3a
SHA256009633b5cc3438b8c56a851e2ca79b965b20f4dd625f55ef10097bc72de1bf06
SHA512640dbafd86ca5661239d80094468b8e5766b38cb968dc03a529a282ab24be1458d047f52b1e4aea8a62674f10dc82f6f356414ccf5a83b1296a28bad61f5b37b
-
memory/1004-59-0x0000000000000000-mapping.dmp
-
memory/1756-57-0x0000000000000000-mapping.dmp
-
memory/1808-61-0x0000000000400000-0x0000000000F03000-memory.dmpFilesize
11.0MB
-
memory/1808-62-0x00000000003B0000-0x00000000003D6000-memory.dmpFilesize
152KB
-
memory/1808-60-0x00000000003B0000-0x00000000003D6000-memory.dmpFilesize
152KB
-
memory/1808-58-0x00000000003B0000-0x00000000003D6000-memory.dmpFilesize
152KB
-
memory/1808-54-0x0000000076171000-0x0000000076173000-memory.dmpFilesize
8KB
-
memory/1808-56-0x0000000000400000-0x0000000000F03000-memory.dmpFilesize
11.0MB
-
memory/1808-55-0x0000000000400000-0x0000000000F03000-memory.dmpFilesize
11.0MB