Analysis
-
max time kernel
43s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 07:06
Static task
static1
Behavioral task
behavioral1
Sample
803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe
Resource
win7-20221111-en
General
-
Target
803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe
-
Size
739KB
-
MD5
416820bf37862a1162d85d9470d927d0
-
SHA1
376ca85ad426c47f6f4b1c8e8d897e3f2d7f4fc1
-
SHA256
803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8
-
SHA512
f856b25c33c474c2bbbdea4da52ac7e43e9a852b9e15d49859fcd6962c1f896f239c270ef6367e659e42a0357015d6b9e1f368c9d4a3781619cb15e633f65ba6
-
SSDEEP
12288:iJ+sfkS6arVI34ShtmhmTkzkukqeub91ljUuuzj1WPCQfW:YkJ7hghmKklub916dHzQO
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral1/memory/848-63-0x0000000000400000-0x0000000000589000-memory.dmp family_blackmoon behavioral1/memory/848-65-0x0000000000400000-0x0000000000589000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 848 explorer.exe -
resource yara_rule behavioral1/files/0x000b0000000122ef-57.dat upx behavioral1/files/0x000b0000000122ef-61.dat upx behavioral1/files/0x000b0000000122ef-58.dat upx behavioral1/memory/848-63-0x0000000000400000-0x0000000000589000-memory.dmp upx behavioral1/memory/848-65-0x0000000000400000-0x0000000000589000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 848 explorer.exe 848 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1552 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 28 PID 1616 wrote to memory of 1552 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 28 PID 1616 wrote to memory of 1552 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 28 PID 1616 wrote to memory of 1552 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 28 PID 1616 wrote to memory of 848 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 29 PID 1616 wrote to memory of 848 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 29 PID 1616 wrote to memory of 848 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 29 PID 1616 wrote to memory of 848 1616 803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe"C:\Users\Admin\AppData\Local\Temp\803f49e8f4f7873ba236fa2cda24a7134d5763eef297a5dfb4aba5f26051b3a8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:848
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD587c6fd1725c489aeca28e08e38ac8d33
SHA1b519a83832fc882bb3644722cbe7576dfa310cdd
SHA2560dc56e2f96b814a48c8e1587677c4639a71a76ecdce8652b0d6df62077524012
SHA512a5bca71f12afe28b236370b2efa228d2572840fd6570fb7dfd00e01b7f84f8b6b5f0fbe4aa8498a59093d30a30b99660b29a7310376e4841606cbfdfbf45c551
-
Filesize
405KB
MD587c6fd1725c489aeca28e08e38ac8d33
SHA1b519a83832fc882bb3644722cbe7576dfa310cdd
SHA2560dc56e2f96b814a48c8e1587677c4639a71a76ecdce8652b0d6df62077524012
SHA512a5bca71f12afe28b236370b2efa228d2572840fd6570fb7dfd00e01b7f84f8b6b5f0fbe4aa8498a59093d30a30b99660b29a7310376e4841606cbfdfbf45c551
-
Filesize
405KB
MD587c6fd1725c489aeca28e08e38ac8d33
SHA1b519a83832fc882bb3644722cbe7576dfa310cdd
SHA2560dc56e2f96b814a48c8e1587677c4639a71a76ecdce8652b0d6df62077524012
SHA512a5bca71f12afe28b236370b2efa228d2572840fd6570fb7dfd00e01b7f84f8b6b5f0fbe4aa8498a59093d30a30b99660b29a7310376e4841606cbfdfbf45c551