Analysis
-
max time kernel
32s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 06:36
Behavioral task
behavioral1
Sample
千月1210.vmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
千月1210.vmp.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
当当下载站downdownz.com.url
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
当当下载站downdownz.com.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
百度导航.url
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
百度导航.url
Resource
win10v2004-20220812-en
General
-
Target
千月1210.vmp.exe
-
Size
3.7MB
-
MD5
4e354d702744838b1d89838aaf4dc589
-
SHA1
d6c1a22b81f8f35e2ddba551ac13ea39ac5b0666
-
SHA256
6638ca5e79e54398cfb705e1f76e5e8ac86c0e097ad6717da5cb6b067f7a8e85
-
SHA512
325ae3275df86d5bb1f40775c8e49882a9f65b10d0e6df6374172e832c2da660125938f5f96706c57da78537b51a6ba3df4ca5753c18edbf496e171bd1f05774
-
SSDEEP
98304:v0/vvhTtozYBsRQBurNfBizdmAd7lamGxpVOjnHYg:kvheIsOmcmA5lamYKEg
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1160-56-0x0000000000400000-0x0000000000C5E000-memory.dmp family_blackmoon behavioral1/memory/1160-58-0x0000000000400000-0x0000000000C5E000-memory.dmp family_blackmoon behavioral1/memory/1160-59-0x0000000000400000-0x0000000000C5E000-memory.dmp family_blackmoon behavioral1/memory/1160-60-0x0000000000400000-0x0000000000C5E000-memory.dmp family_blackmoon -
Processes:
resource yara_rule behavioral1/memory/1160-54-0x0000000000400000-0x0000000000C5E000-memory.dmp vmprotect behavioral1/memory/1160-56-0x0000000000400000-0x0000000000C5E000-memory.dmp vmprotect behavioral1/memory/1160-58-0x0000000000400000-0x0000000000C5E000-memory.dmp vmprotect behavioral1/memory/1160-59-0x0000000000400000-0x0000000000C5E000-memory.dmp vmprotect behavioral1/memory/1160-60-0x0000000000400000-0x0000000000C5E000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
千月1210.vmp.exedescription ioc process File opened for modification \??\PhysicalDrive0 千月1210.vmp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
千月1210.vmp.exepid process 1160 千月1210.vmp.exe 1160 千月1210.vmp.exe 1160 千月1210.vmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
千月1210.vmp.exedescription pid process Token: SeDebugPrivilege 1160 千月1210.vmp.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
千月1210.vmp.exepid process 1160 千月1210.vmp.exe 1160 千月1210.vmp.exe 1160 千月1210.vmp.exe