Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 05:13
Static task
static1
Behavioral task
behavioral1
Sample
93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe
Resource
win10v2004-20220812-en
General
-
Target
93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe
-
Size
129KB
-
MD5
32ceef1cc2a15e91db6645b0e1c94b54
-
SHA1
cf76717ac222d121d8ff7843627b1e31a21b8240
-
SHA256
93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f
-
SHA512
9385e85035d75519158123b8463c8f33599eef64bda32b526a5cd7ecd7b50a5bfaa1ccaba416ae1db08af344de64a98cc041a5dba9f724359c6336c23e3cfe2f
-
SSDEEP
3072:Z+WNkNXcl6hRICWl3BmFGTd2ko7o1jzzX5mTout:Z+WNOnh6CWl3VMbS3T8ToS
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4808-132-0x0000000000400000-0x000000000043E000-memory.dmp family_blackmoon -
Drops file in Drivers directory 1 IoCs
Processes:
93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe -
Executes dropped EXE 1 IoCs
Processes:
DETCAXZ.exepid process 396 DETCAXZ.exe -
Modifies AppInit DLL entries 2 TTPs
-
Processes:
resource yara_rule C:\Windows\SysWOW64\HIMYM.DLL vmprotect C:\Windows\SysWOW64\HIMYM.DLL vmprotect -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1124 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Disker = "rundll32.exe C:\\Windows\\system32\\HIMYM.DLL,DW" rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
DETCAXZ.exedescription ioc process File created C:\Windows\SysWOW64\HIMYM.DLL DETCAXZ.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exeDETCAXZ.exepid process 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe 396 DETCAXZ.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
DETCAXZ.exedescription pid process Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe Token: SeDebugPrivilege 396 DETCAXZ.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exeDETCAXZ.exedescription pid process target process PID 4808 wrote to memory of 396 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe DETCAXZ.exe PID 4808 wrote to memory of 396 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe DETCAXZ.exe PID 4808 wrote to memory of 396 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe DETCAXZ.exe PID 396 wrote to memory of 1124 396 DETCAXZ.exe rundll32.exe PID 396 wrote to memory of 1124 396 DETCAXZ.exe rundll32.exe PID 396 wrote to memory of 1124 396 DETCAXZ.exe rundll32.exe PID 396 wrote to memory of 1044 396 DETCAXZ.exe cmd.exe PID 396 wrote to memory of 1044 396 DETCAXZ.exe cmd.exe PID 396 wrote to memory of 1044 396 DETCAXZ.exe cmd.exe PID 4808 wrote to memory of 888 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe cmd.exe PID 4808 wrote to memory of 888 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe cmd.exe PID 4808 wrote to memory of 888 4808 93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe"C:\Users\Admin\AppData\Local\Temp\93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DETCAXZ.exeC:\Users\Admin\AppData\Local\Temp\DETCAXZ.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\HIMYM.DLL,DW3⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\DETCAXZ.exe"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\93c4ed64dc4c94a5ee75d3b71bcd05779e6144ad3e16801d0c7dd6edcf33727f.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DETCAXZ.exeFilesize
80.1MB
MD516bf5055b4b0e5db136da3e6940b3a48
SHA1b372531b266cc93fe38c596ccda872e2add67f93
SHA2561ec8e6565c13745d2073bcacdea5d53082b053bca8a47abf965e5922bdfdce17
SHA512e30ad97a83ca2dbc6ebdf36fb7694f3bca87db186a1eae7bd9069a85447d38fa9cae493e51bf80f558f2b3102f23d83ebf6ea87a6a230fce939d59b70c2266da
-
C:\Users\Admin\AppData\Local\Temp\DETCAXZ.exeFilesize
80.1MB
MD516bf5055b4b0e5db136da3e6940b3a48
SHA1b372531b266cc93fe38c596ccda872e2add67f93
SHA2561ec8e6565c13745d2073bcacdea5d53082b053bca8a47abf965e5922bdfdce17
SHA512e30ad97a83ca2dbc6ebdf36fb7694f3bca87db186a1eae7bd9069a85447d38fa9cae493e51bf80f558f2b3102f23d83ebf6ea87a6a230fce939d59b70c2266da
-
C:\Windows\SysWOW64\HIMYM.DLLFilesize
100KB
MD5c9b14c8e3af048a7ef6546f2981dc16f
SHA1f146e301b8ef68159cc3d45f529f9c68e4941b4e
SHA256fc3850ce2af7a4d437f4030009d440a3f2f394c7ee2f8c5a7e12a1a7b0d79a48
SHA5129de8f0ff94a9b7ee204b4b8cae01c11518e52d18dc2f2d6ce94232f4d052bd28c59143675c189ef25c7bcbb622232bbec72a3286250c08dce927c710f9beaa45
-
C:\Windows\SysWOW64\HIMYM.DLLFilesize
100KB
MD5c9b14c8e3af048a7ef6546f2981dc16f
SHA1f146e301b8ef68159cc3d45f529f9c68e4941b4e
SHA256fc3850ce2af7a4d437f4030009d440a3f2f394c7ee2f8c5a7e12a1a7b0d79a48
SHA5129de8f0ff94a9b7ee204b4b8cae01c11518e52d18dc2f2d6ce94232f4d052bd28c59143675c189ef25c7bcbb622232bbec72a3286250c08dce927c710f9beaa45
-
memory/396-141-0x000000000C270000-0x000000000C2A6000-memory.dmpFilesize
216KB
-
memory/396-137-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/396-136-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/396-133-0x0000000000000000-mapping.dmp
-
memory/396-143-0x0000000000400000-0x0000000001400000-memory.dmpFilesize
16.0MB
-
memory/888-144-0x0000000000000000-mapping.dmp
-
memory/1044-142-0x0000000000000000-mapping.dmp
-
memory/1124-138-0x0000000000000000-mapping.dmp
-
memory/4808-132-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB