Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 05:45
Static task
static1
Behavioral task
behavioral1
Sample
cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe
Resource
win7-20220812-en
windows7-x64
8 signatures
150 seconds
General
-
Target
cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe
-
Size
1.4MB
-
MD5
f069af3bf6f9bc95b863ef6520c482cb
-
SHA1
ad6b1a78b2c29fc33585c7a8e714fc60825be268
-
SHA256
cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d
-
SHA512
8d37e7bb797047ce6b1ad6998ea0e4fb515be153ac3a5608b1da8e2bd318f549764d564509b15c964ab8fa31fb92ccb02424ad7891100b669f34eb1ff45f7ba0
-
SSDEEP
24576:nG5MAvRLUD9S0mgqDvn7UwOEhVQw0Ogp1O9y2XX2rHwECF4:GXYM0mgqDDcw0pgyK2Xw
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/memory/2592-137-0x0000000000400000-0x000000000075C000-memory.dmp family_blackmoon behavioral2/memory/2592-140-0x0000000000400000-0x000000000075C000-memory.dmp family_blackmoon behavioral2/memory/2592-144-0x0000000000400000-0x000000000075C000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/2592-133-0x0000000010000000-0x0000000010020000-memory.dmp upx behavioral2/memory/2592-135-0x0000000010000000-0x0000000010020000-memory.dmp upx behavioral2/memory/2592-136-0x0000000010000000-0x0000000010020000-memory.dmp upx behavioral2/memory/2592-139-0x0000000010000000-0x0000000010020000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2592 cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe 2592 cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe 2592 cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe 2592 cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 3068 2592 cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe 80 PID 2592 wrote to memory of 3068 2592 cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe 80 PID 3068 wrote to memory of 4976 3068 msedge.exe 81 PID 3068 wrote to memory of 4976 3068 msedge.exe 81 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 224 3068 msedge.exe 84 PID 3068 wrote to memory of 2664 3068 msedge.exe 85 PID 3068 wrote to memory of 2664 3068 msedge.exe 85 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87 PID 3068 wrote to memory of 3548 3068 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe"C:\Users\Admin\AppData\Local\Temp\cb80c32d2f1bf7d590263d50e98bf726d130e957542689fda9671f55b732ec7d.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.3gri.com/2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff3e0246f8,0x7fff3e024708,0x7fff3e0247183⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9249851185817722873,4302255683015279718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:23⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,9249851185817722873,4302255683015279718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,9249851185817722873,4302255683015279718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:83⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9249851185817722873,4302255683015279718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:13⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9249851185817722873,4302255683015279718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:13⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2128,9249851185817722873,4302255683015279718,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4672 /prefetch:83⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9249851185817722873,4302255683015279718,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:13⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9249851185817722873,4302255683015279718,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:13⤵PID:1788
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676