Analysis
-
max time kernel
147s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 11:30
Behavioral task
behavioral1
Sample
731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe
Resource
win7-20221111-en
General
-
Target
731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe
-
Size
3.1MB
-
MD5
f2733cc44798b9014af14f7bc7d280de
-
SHA1
0f6a947f59710ef5dd197ed9ee02d00e72aef420
-
SHA256
731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215
-
SHA512
a03fc99fa026eaeac18fa1d3b0830eaeca4ee431601b9a752c31926a1a34589795faffb05a9c053e6ddd86dde335913a5ccf7b5a14055436c8bc341ac541aa31
-
SSDEEP
98304:al94XfeyP6RDfyu8LSMyj0mdQ1820sJPLaYy/:al2X2yiNKtSTdQ18dsJP+
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4452-150-0x0000000000400000-0x00000000009C8000-memory.dmp family_blackmoon behavioral2/memory/4452-152-0x0000000000400000-0x00000000009C8000-memory.dmp family_blackmoon behavioral2/memory/4452-154-0x0000000000400000-0x00000000009C8000-memory.dmp family_blackmoon -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Windows\jedata.dll acprotect -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Executes dropped EXE 3 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exeľÂí.exeľÂí.exepid process 4452 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 2844 ľÂí.exe 552 ľÂí.exe -
Processes:
resource yara_rule behavioral2/memory/5004-132-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/5004-140-0x0000000000400000-0x000000000041C000-memory.dmp upx C:\Windows\jedata.dll upx behavioral2/memory/4452-151-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4452-156-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Wine ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Loads dropped DLL 1 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exepid process 4452 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exepid process 4452 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ľÂí.exedescription pid process target process PID 2844 set thread context of 552 2844 ľÂí.exe ľÂí.exe -
Drops file in Windows directory 2 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exedescription ioc process File created C:\Windows\jedata.dll ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe File created C:\Windows\win8.she ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4248 552 WerFault.exe ľÂí.exe 1876 4452 WerFault.exe ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exepid process 4452 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 4452 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exepid process 4452 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 4452 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 4452 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 4452 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 4452 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exeľÂí.exedescription pid process target process PID 5004 wrote to memory of 4452 5004 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe PID 5004 wrote to memory of 4452 5004 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe PID 5004 wrote to memory of 4452 5004 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe PID 5004 wrote to memory of 2844 5004 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ľÂí.exe PID 5004 wrote to memory of 2844 5004 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ľÂí.exe PID 5004 wrote to memory of 2844 5004 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ľÂí.exe PID 2844 wrote to memory of 552 2844 ľÂí.exe ľÂí.exe PID 2844 wrote to memory of 552 2844 ľÂí.exe ľÂí.exe PID 2844 wrote to memory of 552 2844 ľÂí.exe ľÂí.exe PID 2844 wrote to memory of 552 2844 ľÂí.exe ľÂí.exe PID 2844 wrote to memory of 552 2844 ľÂí.exe ľÂí.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe"C:\Users\Admin\AppData\Local\Temp\731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe"C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 16883⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe"C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeC:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 804⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 552 -ip 5521⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4452 -ip 44521⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exeFilesize
3.0MB
MD551f2e214a0cd49d78b93092e25270a9b
SHA153091dc8ebd8f86ff5091bcd10fb9ca03adc7686
SHA2569edae2b07d53d0e39993e079e115dc146f42c078d4b4fd2df506921460d5fca2
SHA51273d5d7d801a4b78c23d5ccd12702e68c8475e7db204e627eb76881c2f76d1c5798558b7914e494d8fc9b26797e8180418ecd30e4753d563dfb8fe829f6a588eb
-
C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exeFilesize
3.0MB
MD551f2e214a0cd49d78b93092e25270a9b
SHA153091dc8ebd8f86ff5091bcd10fb9ca03adc7686
SHA2569edae2b07d53d0e39993e079e115dc146f42c078d4b4fd2df506921460d5fca2
SHA51273d5d7d801a4b78c23d5ccd12702e68c8475e7db204e627eb76881c2f76d1c5798558b7914e494d8fc9b26797e8180418ecd30e4753d563dfb8fe829f6a588eb
-
C:\Windows\jedata.dllFilesize
86KB
MD5114054313070472cd1a6d7d28f7c5002
SHA19a044986e6101df1a126035da7326a50c3fe9a23
SHA256e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1
SHA512a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522
-
memory/552-146-0x0000000000EE0000-0x0000000000EF8000-memory.dmpFilesize
96KB
-
memory/552-141-0x0000000000000000-mapping.dmp
-
memory/552-142-0x000000000001B000-0x000000000002A000-memory.dmpFilesize
60KB
-
memory/552-143-0x000000000001B000-0x0000000000022382-memory.dmpFilesize
28KB
-
memory/2844-145-0x0000000000EE0000-0x0000000000EF8000-memory.dmpFilesize
96KB
-
memory/2844-137-0x0000000000000000-mapping.dmp
-
memory/4452-150-0x0000000000400000-0x00000000009C8000-memory.dmpFilesize
5.8MB
-
memory/4452-136-0x0000000000400000-0x00000000009C8000-memory.dmpFilesize
5.8MB
-
memory/4452-147-0x00000000026C0000-0x0000000002823000-memory.dmpFilesize
1.4MB
-
memory/4452-148-0x0000000077B20000-0x0000000077CC3000-memory.dmpFilesize
1.6MB
-
memory/4452-133-0x0000000000000000-mapping.dmp
-
memory/4452-151-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/4452-152-0x0000000000400000-0x00000000009C8000-memory.dmpFilesize
5.8MB
-
memory/4452-153-0x0000000077B20000-0x0000000077CC3000-memory.dmpFilesize
1.6MB
-
memory/4452-154-0x0000000000400000-0x00000000009C8000-memory.dmpFilesize
5.8MB
-
memory/4452-155-0x0000000077B20000-0x0000000077CC3000-memory.dmpFilesize
1.6MB
-
memory/4452-156-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/5004-140-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/5004-132-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB