Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2023 20:27
Behavioral task
behavioral1
Sample
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe
Resource
win7-20230621-en
General
-
Target
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe
-
Size
1.5MB
-
MD5
50b94fdab98ec014a36e82defc3e338e
-
SHA1
ac25d9cbef937754155e9f03f3af3cce52b74ba7
-
SHA256
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
-
SHA512
730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265
-
SSDEEP
24576:p/FKhdUj9X3J8Zz2xghrxbGcdtYavsIi1xkQe9hu8UpkYy6Buc/te5seRtEKQ8iP:pmA58Pa2tfvsXLkhqpkYy6Bucle5sGEf
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
Processes:
resource yara_rule C:\Users\Public\Downloads\QYFDJEAm.exe family_blackmoon C:\Users\Public\Downloads\QYFDJEAm.exe family_blackmoon C:\Users\Public\Downloads\QYFDJEAm.exe family_blackmoon C:\Users\Public\Downloads\QYFDJEAm.exe family_blackmoon C:\Users\Public\Downloads\QYFDJEAm.exe family_blackmoon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\International\Geo\Nation 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe -
Executes dropped EXE 3 IoCs
Processes:
QYFDJEAm.exeQYFDJEAm.exeQYFDJEAm.exepid process 1516 QYFDJEAm.exe 2804 QYFDJEAm.exe 2260 QYFDJEAm.exe -
Processes:
resource yara_rule behavioral2/memory/2260-146-0x00000000020F0000-0x00000000020FB000-memory.dmp upx behavioral2/memory/2260-147-0x00000000020F0000-0x00000000020FB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exedescription pid process Token: SeIncBasePriorityPrivilege 3000 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exeQYFDJEAm.exedescription pid process target process PID 3000 wrote to memory of 1516 3000 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe QYFDJEAm.exe PID 3000 wrote to memory of 1516 3000 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe QYFDJEAm.exe PID 3000 wrote to memory of 1516 3000 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe QYFDJEAm.exe PID 3000 wrote to memory of 3740 3000 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe cmd.exe PID 3000 wrote to memory of 3740 3000 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe cmd.exe PID 3000 wrote to memory of 3740 3000 8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe cmd.exe PID 2804 wrote to memory of 2260 2804 QYFDJEAm.exe QYFDJEAm.exe PID 2804 wrote to memory of 2260 2804 QYFDJEAm.exe QYFDJEAm.exe PID 2804 wrote to memory of 2260 2804 QYFDJEAm.exe QYFDJEAm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe"C:\Users\Admin\AppData\Local\Temp\8353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Public\Downloads\QYFDJEAm.exe"C:\Users\Public\Downloads\QYFDJEAm.exe" -auto2⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8353DF~1.EXE > nul2⤵PID:3740
-
C:\Users\Public\Downloads\QYFDJEAm.exe\Users\Public\Downloads\QYFDJEAm.exe Service 11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Public\Downloads\QYFDJEAm.exe-ojbk2⤵
- Executes dropped EXE
PID:2260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD550b94fdab98ec014a36e82defc3e338e
SHA1ac25d9cbef937754155e9f03f3af3cce52b74ba7
SHA2568353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
SHA512730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265
-
Filesize
1.5MB
MD550b94fdab98ec014a36e82defc3e338e
SHA1ac25d9cbef937754155e9f03f3af3cce52b74ba7
SHA2568353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
SHA512730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265
-
Filesize
1.5MB
MD550b94fdab98ec014a36e82defc3e338e
SHA1ac25d9cbef937754155e9f03f3af3cce52b74ba7
SHA2568353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
SHA512730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265
-
Filesize
1.5MB
MD550b94fdab98ec014a36e82defc3e338e
SHA1ac25d9cbef937754155e9f03f3af3cce52b74ba7
SHA2568353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
SHA512730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265
-
Filesize
1.5MB
MD550b94fdab98ec014a36e82defc3e338e
SHA1ac25d9cbef937754155e9f03f3af3cce52b74ba7
SHA2568353dfb0aaef6842df37c669ccbd506d94f34e76b54b65f2a09a8db5102cb4a7
SHA512730da0fad2e76516784b95e8773c9aa4cfc9c97f421f35e1d307b092c0edebd1a0466a326f5fdbf03f6cb8a19ee6de750c5fcd471d3045974324a90c9e089265