Analysis
-
max time kernel
175s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:42
Static task
static1
Behavioral task
behavioral1
Sample
b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe
Resource
win10v2004-20221111-en
General
-
Target
b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe
-
Size
45KB
-
MD5
848f235a39462120b498648a516426d9
-
SHA1
5f81ada2243741961ed1ee995ec8d39173c852f0
-
SHA256
b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222
-
SHA512
5e4f47842e19bca52e6dd092bf40a467b8817fc857a809d9bb2df1179f5df9626fb0551d29069a1b77ff1cd64ceb143dde1ae0438c3ff7b43e2221bb6c4156d1
-
SSDEEP
768:SI11SSlgEVG0UnyxWlnB+WHR6jiekphMf1PZFLJ4JGcTzMbhFHZyV8o1i3yG:YSleyeQWHxzuf1RFLqJGcTobhF5yV8o8
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4328-138-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/2648-139-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral2/memory/4328-140-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon -
Drops file in Drivers directory 2 IoCs
Processes:
syetom.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts.ics syetom.exe File created C:\Windows\System32\drivers\etc\hosts.ics syetom.exe -
Executes dropped EXE 1 IoCs
Processes:
syetom.exepid process 4328 syetom.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exedescription ioc process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\CurrentVersion\Run b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\syetom = "C:\\Program Files (x86)\\Nril\\syetom.exe" b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe -
Drops file in Program Files directory 2 IoCs
Processes:
b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exedescription ioc process File created C:\Program Files (x86)\Nril\syetom.exe b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe File opened for modification C:\Program Files (x86)\Nril\syetom.exe b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exedescription pid process target process PID 2648 wrote to memory of 4328 2648 b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe syetom.exe PID 2648 wrote to memory of 4328 2648 b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe syetom.exe PID 2648 wrote to memory of 4328 2648 b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe syetom.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe"C:\Users\Admin\AppData\Local\Temp\b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Nril\syetom.exe"C:\Program Files (x86)\Nril\syetom.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:4328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Nril\syetom.exeFilesize
45KB
MD5848f235a39462120b498648a516426d9
SHA15f81ada2243741961ed1ee995ec8d39173c852f0
SHA256b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222
SHA5125e4f47842e19bca52e6dd092bf40a467b8817fc857a809d9bb2df1179f5df9626fb0551d29069a1b77ff1cd64ceb143dde1ae0438c3ff7b43e2221bb6c4156d1
-
C:\Program Files (x86)\Nril\syetom.exeFilesize
45KB
MD5848f235a39462120b498648a516426d9
SHA15f81ada2243741961ed1ee995ec8d39173c852f0
SHA256b8d258f2bb3939c6f23c7e0675c0b3d80373cccc0a14410b392e364fb39cd222
SHA5125e4f47842e19bca52e6dd092bf40a467b8817fc857a809d9bb2df1179f5df9626fb0551d29069a1b77ff1cd64ceb143dde1ae0438c3ff7b43e2221bb6c4156d1
-
memory/2648-132-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/2648-133-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/2648-139-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/4328-134-0x0000000000000000-mapping.dmp
-
memory/4328-138-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/4328-140-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB