Analysis
-
max time kernel
68s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe
Resource
win10v2004-20221111-en
General
-
Target
88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe
-
Size
224KB
-
MD5
608cd26c9f0bf7848a9fa42e2f9df214
-
SHA1
8d9e045a0e44f7e4049188b07f498f56ce43fb1d
-
SHA256
88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4
-
SHA512
3fc8ad1f5c4c05ca5bda85ac5d4e06b1efd6edcc2c9f99e16bfac7f06fe4018991858ac1642932516c9be8b90c9c35fd5007f03594251ac878c3432dd2b3c000
-
SSDEEP
6144:mf796MRAjXvujSLdvNJPSR+KxRL7Y0a2XRbNlU0:O79WjXvVGXY0dBplU0
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral1/memory/1780-70-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/1780-71-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/1780-72-0x0000000000401000-mapping.dmp family_blackmoon behavioral1/memory/1780-78-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/files/0x0006000000014294-58.dat aspack_v212_v242 behavioral1/files/0x0006000000014294-59.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 576 360siom.exe -
Deletes itself 1 IoCs
pid Process 988 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1976 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe 576 360siom.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\V3ikebat = "C:\\Program Files\\V3ikebat\\360siom.exe" 360siom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run calc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\syotom = "C:\\Windows\\SysWOW64\\calc.exe" calc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 576 set thread context of 1780 576 360siom.exe 27 -
Drops file in Program Files directory 11 IoCs
description ioc Process File created C:\Program Files\Info\360siom.exe 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe File opened for modification C:\Program Files\Info\360siom.exe 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe File created C:\Program Files\Info\PotPlayer.dll 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe File created C:\Program Files\V3ikebat\360siom.exe 360siom.exe File created C:\Program Files\V3ikebat\PotPlayer.dll 360siom.exe File created C:\Program Files\Info\V3like.lnk 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe File opened for modification C:\Program Files\Info\V3like.lnk 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe File created C:\Program Files\V3ikebat\V3like.lnk 360siom.exe File opened for modification C:\Program Files\V3ikebat\V3like.lnk 360siom.exe File opened for modification C:\Program Files\Info\PotPlayer.dll 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe File opened for modification C:\Program Files\V3ikebat\360siom.exe 360siom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 576 360siom.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1976 wrote to memory of 576 1976 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe 26 PID 1976 wrote to memory of 576 1976 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe 26 PID 1976 wrote to memory of 576 1976 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe 26 PID 1976 wrote to memory of 576 1976 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe 26 PID 576 wrote to memory of 1780 576 360siom.exe 27 PID 576 wrote to memory of 1780 576 360siom.exe 27 PID 576 wrote to memory of 1780 576 360siom.exe 27 PID 576 wrote to memory of 1780 576 360siom.exe 27 PID 576 wrote to memory of 1780 576 360siom.exe 27 PID 576 wrote to memory of 1780 576 360siom.exe 27 PID 576 wrote to memory of 1780 576 360siom.exe 27 PID 576 wrote to memory of 1780 576 360siom.exe 27 PID 576 wrote to memory of 1780 576 360siom.exe 27 PID 576 wrote to memory of 1780 576 360siom.exe 27 PID 1976 wrote to memory of 988 1976 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe 28 PID 1976 wrote to memory of 988 1976 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe 28 PID 1976 wrote to memory of 988 1976 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe 28 PID 1976 wrote to memory of 988 1976 88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe"C:\Users\Admin\AppData\Local\Temp\88543a3734f2d2f49d64eac9cbd9a0b4ad39ef049a593b495155db5807be8be4.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Info\360siom.exe"C:\Program Files\Info\360siom.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\calc.execalc.exe3⤵
- Adds Run key to start application
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵
- Deletes itself
PID:988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5170b67264b306aca215bf72bd36b4f53
SHA10be7190a02ee3bab0389d8473fb515b59889bdca
SHA256be7f35ced141ab9c2f8a964f2eaf5249921f433560f9386f0dd228d8042cebc3
SHA51298d23934df6ecbfc171594fdfdf21ca31a499605dc27f2796b8c7067a6fdaa2988e1134b42fff60cd7eee81b09cc861dbd1cf386aaf68ca1ae909aede2b840ba
-
Filesize
76KB
MD5170b67264b306aca215bf72bd36b4f53
SHA10be7190a02ee3bab0389d8473fb515b59889bdca
SHA256be7f35ced141ab9c2f8a964f2eaf5249921f433560f9386f0dd228d8042cebc3
SHA51298d23934df6ecbfc171594fdfdf21ca31a499605dc27f2796b8c7067a6fdaa2988e1134b42fff60cd7eee81b09cc861dbd1cf386aaf68ca1ae909aede2b840ba
-
Filesize
45KB
MD505d65650e23ced5d763530105dd1b7ef
SHA1c1d606d187ec363582667c1a206fcc3a7e5ea289
SHA2567ea795367b2ffb30424367e84e2365b32b0b0ef4815d78eb635c819cc71e7685
SHA512bb7307791aef6c521c00f46c5cd02a6743157c7260bb13f906ccd5a061235a0f70d9a68410e0b53cbf3c5b842bcf35cc31db7554846ffe1e874f2d40c421e374
-
Filesize
118KB
MD504efeb8e35d023d3701bca55c489b983
SHA12a3723a5c2ba80d9d66e058c8f5e5a46249b2786
SHA256cabbab7edc0db61fee3a185d6191dec1f610da839026b8a32c56393726e39682
SHA512aebe8ba35de45978d108e3fca0cfd5be68d9ae01196664a6f94a7512d69216ed5df4827a8fbe45e9ecf605e5d0f5017b4a13b2ab1220976108392da6a1d8be73
-
Filesize
300B
MD5d70b5604236ee86dbd092dbcae56a5b3
SHA1550f2e406bc9ba32df7c29ca8a3f877f05b8984b
SHA256451d76a6ef03a7555790c0f65512d6a43bdbf03d61b0d38dacc035c2aa670d69
SHA512d54e8b46f46350e3b2e3bb6499f4a92fbdaedf83e9053c659a6895eb0c68d1abe7e61b2b8fb90e3b827f100bad619b4970638d8d7e69a5df73e8f8fc2ed46d63
-
Filesize
76KB
MD5170b67264b306aca215bf72bd36b4f53
SHA10be7190a02ee3bab0389d8473fb515b59889bdca
SHA256be7f35ced141ab9c2f8a964f2eaf5249921f433560f9386f0dd228d8042cebc3
SHA51298d23934df6ecbfc171594fdfdf21ca31a499605dc27f2796b8c7067a6fdaa2988e1134b42fff60cd7eee81b09cc861dbd1cf386aaf68ca1ae909aede2b840ba
-
Filesize
45KB
MD505d65650e23ced5d763530105dd1b7ef
SHA1c1d606d187ec363582667c1a206fcc3a7e5ea289
SHA2567ea795367b2ffb30424367e84e2365b32b0b0ef4815d78eb635c819cc71e7685
SHA512bb7307791aef6c521c00f46c5cd02a6743157c7260bb13f906ccd5a061235a0f70d9a68410e0b53cbf3c5b842bcf35cc31db7554846ffe1e874f2d40c421e374