Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
28-06-2023 20:27
Behavioral task
behavioral1
Sample
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe
Resource
win7-20230621-en
General
-
Target
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe
-
Size
1.5MB
-
MD5
50b94fdab98ec014a36e82defc3e338e
-
SHA1
ac25d9cbef937754155e9f03f3af3cce52b74ba7
-
SHA256
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
-
SHA512
730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265
-
SSDEEP
24576:p/FKhdUj9X3J8Zz2xghrxbGcdtYavsIi1xkQe9hu8UpkYy6Buc/te5seRtEKQ8iP:pmA58Pa2tfvsXLkhqpkYy6Bucle5sGEf
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
Processes:
resource yara_rule \Users\Public\Downloads\QYFDJEAm.exe family_blackmoon C:\Users\Public\Downloads\QYFDJEAm.exe family_blackmoon C:\Users\Public\Downloads\QYFDJEAm.exe family_blackmoon C:\Users\Public\Downloads\QYFDJEAm.exe family_blackmoon C:\Users\Public\Downloads\QYFDJEAm.exe family_blackmoon -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 432 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
QYFDJEAm.exeQYFDJEAm.exeQYFDJEAm.exepid process 1664 QYFDJEAm.exe 1708 QYFDJEAm.exe 556 QYFDJEAm.exe -
Loads dropped DLL 1 IoCs
Processes:
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exepid process 1312 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe -
Processes:
resource yara_rule behavioral1/memory/556-63-0x00000000003D0000-0x00000000003DB000-memory.dmp upx behavioral1/memory/556-64-0x00000000003D0000-0x00000000003DB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exedescription pid process Token: SeIncBasePriorityPrivilege 1312 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exeQYFDJEAm.exedescription pid process target process PID 1312 wrote to memory of 1664 1312 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe QYFDJEAm.exe PID 1312 wrote to memory of 1664 1312 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe QYFDJEAm.exe PID 1312 wrote to memory of 1664 1312 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe QYFDJEAm.exe PID 1312 wrote to memory of 1664 1312 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe QYFDJEAm.exe PID 1312 wrote to memory of 432 1312 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe cmd.exe PID 1312 wrote to memory of 432 1312 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe cmd.exe PID 1312 wrote to memory of 432 1312 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe cmd.exe PID 1312 wrote to memory of 432 1312 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe cmd.exe PID 1708 wrote to memory of 556 1708 QYFDJEAm.exe QYFDJEAm.exe PID 1708 wrote to memory of 556 1708 QYFDJEAm.exe QYFDJEAm.exe PID 1708 wrote to memory of 556 1708 QYFDJEAm.exe QYFDJEAm.exe PID 1708 wrote to memory of 556 1708 QYFDJEAm.exe QYFDJEAm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe"C:\Users\Admin\AppData\Local\Temp\8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Public\Downloads\QYFDJEAm.exe"C:\Users\Public\Downloads\QYFDJEAm.exe" -auto2⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8353DF~1.EXE > nul2⤵
- Deletes itself
PID:432
-
C:\Users\Public\Downloads\QYFDJEAm.exe\Users\Public\Downloads\QYFDJEAm.exe Service 11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Public\Downloads\QYFDJEAm.exe-ojbk2⤵
- Executes dropped EXE
PID:556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD550b94fdab98ec014a36e82defc3e338e
SHA1ac25d9cbef937754155e9f03f3af3cce52b74ba7
SHA2568353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
SHA512730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265
-
Filesize
1.5MB
MD550b94fdab98ec014a36e82defc3e338e
SHA1ac25d9cbef937754155e9f03f3af3cce52b74ba7
SHA2568353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
SHA512730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265
-
Filesize
1.5MB
MD550b94fdab98ec014a36e82defc3e338e
SHA1ac25d9cbef937754155e9f03f3af3cce52b74ba7
SHA2568353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
SHA512730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265
-
Filesize
1.5MB
MD550b94fdab98ec014a36e82defc3e338e
SHA1ac25d9cbef937754155e9f03f3af3cce52b74ba7
SHA2568353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
SHA512730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265
-
Filesize
1.5MB
MD550b94fdab98ec014a36e82defc3e338e
SHA1ac25d9cbef937754155e9f03f3af3cce52b74ba7
SHA2568353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
SHA512730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265