Analysis
-
max time kernel
141s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2023 19:57
Behavioral task
behavioral1
Sample
7241749b64007e255cc25a652774ca8bcead00057c1334a153da8b3a74d5e206.exe
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7241749b64007e255cc25a652774ca8bcead00057c1334a153da8b3a74d5e206.exe
-
Size
119KB
-
MD5
bb936612f4049ec59d46950e251d0d85
-
SHA1
f70f4ec79cfa82f78a8b68ab083b624e416d9f7e
-
SHA256
7241749b64007e255cc25a652774ca8bcead00057c1334a153da8b3a74d5e206
-
SHA512
eae32ca90d4fc5bbd29c92bac6a600780a42d33cdcd4edc2dbed65f02f876e10e42e1ea1e173b477b86e0c24265e690f416ce679016ad3155482e61f72419f1c
-
SSDEEP
3072:cIXi9VmOi082SAIlhYuPRVKPLJEUneO71B2uE:dy581zxPqjqUnzL2
Malware Config
Signatures
-
Detect Blackmoon payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1232-133-0x0000000000400000-0x0000000000472000-memory.dmp family_blackmoon behavioral2/memory/1232-134-0x0000000000400000-0x0000000000472000-memory.dmp family_blackmoon behavioral2/memory/1232-135-0x0000000000400000-0x0000000000472000-memory.dmp family_blackmoon behavioral2/memory/1232-136-0x0000000000400000-0x0000000000472000-memory.dmp family_blackmoon behavioral2/memory/1232-142-0x0000000000400000-0x0000000000472000-memory.dmp family_blackmoon behavioral2/memory/1232-148-0x0000000000400000-0x0000000000472000-memory.dmp family_blackmoon -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7241749b64007e255cc25a652774ca8bcead00057c1334a153da8b3a74d5e206.exepid process 1232 7241749b64007e255cc25a652774ca8bcead00057c1334a153da8b3a74d5e206.exe 1232 7241749b64007e255cc25a652774ca8bcead00057c1334a153da8b3a74d5e206.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7241749b64007e255cc25a652774ca8bcead00057c1334a153da8b3a74d5e206.exedescription pid process Token: SeDebugPrivilege 1232 7241749b64007e255cc25a652774ca8bcead00057c1334a153da8b3a74d5e206.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7241749b64007e255cc25a652774ca8bcead00057c1334a153da8b3a74d5e206.exe"C:\Users\Admin\AppData\Local\Temp\7241749b64007e255cc25a652774ca8bcead00057c1334a153da8b3a74d5e206.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1232-133-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/1232-134-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/1232-135-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/1232-136-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/1232-142-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/1232-148-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB