Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-03-2023 05:27
Behavioral task
behavioral1
Sample
27163309.exe
Resource
win7-20230220-en
General
-
Target
27163309.exe
-
Size
210KB
-
MD5
3c2241f0c7d29032d0130a2ddbc9c2fa
-
SHA1
0fdc6879b4e8d617827b7568ffacfec750945fbd
-
SHA256
82ae5e783b35a1bdc9574991132dea83e4d46b20f14f61ca764fc1057959f857
-
SHA512
21e27c63e393aab29637ba2b6f6a00b4e9f71331acbdc4efa793e7e7d806b5a401478aa0964234ef5dde13f4b2434abb1090b368792aedb9120dc3e0fc9ed6ac
-
SSDEEP
6144:JwROTC3S05EouCW/deSXPyWSp8i7i9xJGQqHu/:TTztCWFecimsiPv/
Malware Config
Signatures
-
Detect Blackmoon payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1704-57-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral1/memory/1704-58-0x0000000001ED0000-0x0000000001F08000-memory.dmp family_blackmoon behavioral1/memory/1704-62-0x0000000002B60000-0x0000000002BC6000-memory.dmp family_blackmoon behavioral1/memory/1704-63-0x0000000002B60000-0x0000000002BC6000-memory.dmp family_blackmoon behavioral1/memory/1704-66-0x0000000002B60000-0x0000000002BC6000-memory.dmp family_blackmoon behavioral1/memory/1704-102-0x0000000002B60000-0x0000000002BC6000-memory.dmp family_blackmoon behavioral1/memory/1704-109-0x0000000002B60000-0x0000000002BC6000-memory.dmp family_blackmoon behavioral1/memory/1704-110-0x0000000001ED0000-0x0000000001F08000-memory.dmp family_blackmoon -
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1704-89-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat -
Loads dropped DLL 2 IoCs
Processes:
27163309.exepid process 1704 27163309.exe 1704 27163309.exe -
Processes:
resource yara_rule behavioral1/memory/1704-57-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
27163309.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run 27163309.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdate = "C:\\Users\\Public\\Documents\\Applicationcebas.exe" 27163309.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
27163309.exedescription ioc process File opened (read-only) \??\O: 27163309.exe File opened (read-only) \??\X: 27163309.exe File opened (read-only) \??\B: 27163309.exe File opened (read-only) \??\E: 27163309.exe File opened (read-only) \??\Q: 27163309.exe File opened (read-only) \??\R: 27163309.exe File opened (read-only) \??\V: 27163309.exe File opened (read-only) \??\P: 27163309.exe File opened (read-only) \??\S: 27163309.exe File opened (read-only) \??\U: 27163309.exe File opened (read-only) \??\H: 27163309.exe File opened (read-only) \??\J: 27163309.exe File opened (read-only) \??\K: 27163309.exe File opened (read-only) \??\M: 27163309.exe File opened (read-only) \??\N: 27163309.exe File opened (read-only) \??\W: 27163309.exe File opened (read-only) \??\Y: 27163309.exe File opened (read-only) \??\Z: 27163309.exe File opened (read-only) \??\F: 27163309.exe File opened (read-only) \??\G: 27163309.exe File opened (read-only) \??\I: 27163309.exe File opened (read-only) \??\L: 27163309.exe File opened (read-only) \??\T: 27163309.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
27163309.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 27163309.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 27163309.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 884 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 41 IoCs
Processes:
27163309.exepid process 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
27163309.exepid process 1704 27163309.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
27163309.exepid process 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe 1704 27163309.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
27163309.exepid process 1704 27163309.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
27163309.exedescription pid process target process PID 1704 wrote to memory of 884 1704 27163309.exe NOTEPAD.EXE PID 1704 wrote to memory of 884 1704 27163309.exe NOTEPAD.EXE PID 1704 wrote to memory of 884 1704 27163309.exe NOTEPAD.EXE PID 1704 wrote to memory of 884 1704 27163309.exe NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\27163309.exe"C:\Users\Admin\AppData\Local\Temp\27163309.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\27163309.txt2⤵
- Opens file in notepad (likely ransom note)
PID:884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD53aea5b78bac5359a799c2714fecccd1a
SHA15d3203b328ecfc7a55c0ded1032d209e9f273367
SHA256c05e763cab67cf9daf5be7a6a6cff2650223987a9693eaa119f69b2bbb6df6c3
SHA5129513cc84a7ed3dd709d4affb03f6e286dcd43e82f33441c00a9d74d2b45449f2ee20baa8db46218d7a59d9e62fb7f95050ea305166e70f3e71dde39ccf07b6d3
-
Filesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
Filesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003