Analysis
-
max time kernel
84s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 19:30
Behavioral task
behavioral1
Sample
ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe
Resource
win7-20230621-en
General
-
Target
ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe
-
Size
1.8MB
-
MD5
4b24bb7eb024e319888f9e7e00fe4243
-
SHA1
c3607f61d72e6ec43cf7bf4f41d166eecaa27f58
-
SHA256
ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2
-
SHA512
48c27f416e07307ee046ccab04fe868b0cf25fe178b002bcc1075adbc47d3fb7ae92b0e8709cdbd159f54755bd7c492e343d8da149d2a9a227836a8d315a0fc3
-
SSDEEP
49152:iRTQWltDVTODlosbWp6FjTxEeliYZ8+Y7JKQa:itzlnY/bW0FjTOKZJaJI
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule C:\Users\Public\xiaodaxzqxia\jecxz.exe family_blackmoon C:\Users\Public\xiaodaxzqxia\jecxz.exe family_blackmoon -
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\International\Geo\Nation ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe Key value queried \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
Processes:
jecxz.exev.exepid process 2884 jecxz.exe 3292 v.exe -
Loads dropped DLL 1 IoCs
Processes:
v.exepid process 3292 v.exe -
Processes:
resource yara_rule behavioral2/memory/1716-133-0x0000000000400000-0x000000000083F000-memory.dmp upx behavioral2/memory/1716-151-0x0000000000400000-0x000000000083F000-memory.dmp upx behavioral2/memory/1716-170-0x0000000000400000-0x000000000083F000-memory.dmp upx behavioral2/memory/1716-184-0x0000000000400000-0x000000000083F000-memory.dmp upx -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
jecxz.exedescription ioc process File opened (read-only) \??\Z: jecxz.exe File opened (read-only) \??\Q: jecxz.exe File opened (read-only) \??\R: jecxz.exe File opened (read-only) \??\T: jecxz.exe File opened (read-only) \??\W: jecxz.exe File opened (read-only) \??\U: jecxz.exe File opened (read-only) \??\V: jecxz.exe File opened (read-only) \??\X: jecxz.exe File opened (read-only) \??\Y: jecxz.exe File opened (read-only) \??\E: jecxz.exe File opened (read-only) \??\G: jecxz.exe File opened (read-only) \??\H: jecxz.exe File opened (read-only) \??\L: jecxz.exe File opened (read-only) \??\O: jecxz.exe File opened (read-only) \??\P: jecxz.exe File opened (read-only) \??\B: jecxz.exe File opened (read-only) \??\J: jecxz.exe File opened (read-only) \??\M: jecxz.exe File opened (read-only) \??\N: jecxz.exe File opened (read-only) \??\I: jecxz.exe File opened (read-only) \??\K: jecxz.exe File opened (read-only) \??\S: jecxz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
jecxz.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 jecxz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString jecxz.exe -
Modifies registry class 1 IoCs
Processes:
ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000_Classes\Local Settings ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exejecxz.exepid process 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe 2884 jecxz.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
v.exedescription pid process Token: SeRestorePrivilege 3292 v.exe Token: 35 3292 v.exe Token: SeSecurityPrivilege 3292 v.exe Token: SeSecurityPrivilege 3292 v.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exejecxz.exehh.exehh.exepid process 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe 2884 jecxz.exe 2884 jecxz.exe 3432 hh.exe 3432 hh.exe 1568 hh.exe 1568 hh.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.execmd.exeWScript.execmd.execmd.execmd.exedescription pid process target process PID 1716 wrote to memory of 3872 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe cmd.exe PID 1716 wrote to memory of 3872 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe cmd.exe PID 1716 wrote to memory of 3872 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe cmd.exe PID 3872 wrote to memory of 3500 3872 cmd.exe reg.exe PID 3872 wrote to memory of 3500 3872 cmd.exe reg.exe PID 3872 wrote to memory of 3500 3872 cmd.exe reg.exe PID 1716 wrote to memory of 2220 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe WScript.exe PID 1716 wrote to memory of 2220 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe WScript.exe PID 1716 wrote to memory of 2220 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe WScript.exe PID 2220 wrote to memory of 2284 2220 WScript.exe cmd.exe PID 2220 wrote to memory of 2284 2220 WScript.exe cmd.exe PID 2220 wrote to memory of 2284 2220 WScript.exe cmd.exe PID 2284 wrote to memory of 3224 2284 cmd.exe reg.exe PID 2284 wrote to memory of 3224 2284 cmd.exe reg.exe PID 2284 wrote to memory of 3224 2284 cmd.exe reg.exe PID 1716 wrote to memory of 3292 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe v.exe PID 1716 wrote to memory of 3292 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe v.exe PID 1716 wrote to memory of 3292 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe v.exe PID 1716 wrote to memory of 3360 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe cmd.exe PID 1716 wrote to memory of 3360 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe cmd.exe PID 1716 wrote to memory of 3360 1716 ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe cmd.exe PID 3360 wrote to memory of 1340 3360 cmd.exe cmd.exe PID 3360 wrote to memory of 1340 3360 cmd.exe cmd.exe PID 3360 wrote to memory of 1340 3360 cmd.exe cmd.exe PID 1340 wrote to memory of 1372 1340 cmd.exe reg.exe PID 1340 wrote to memory of 1372 1340 cmd.exe reg.exe PID 1340 wrote to memory of 1372 1340 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe"C:\Users\Admin\AppData\Local\Temp\ed04378d4fe8fd0814a4435d86b7097706413094c476b29f2539b08ae9592bc2.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\xiaodaxzqxia\n.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0" /v "1201" /d "0" /t REG_DWORD /f3⤵PID:3500
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\xiaodaxzqxia\A.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\xiaodaxzqxia\n.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0" /v "1201" /d "0" /t REG_DWORD /f4⤵PID:3224
-
-
-
-
C:\Users\Public\xiaodaxzqxia\v.exe"C:\Users\Public\xiaodaxzqxia\v.exe" x 111 -y2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\xiaodaxzqxia\v.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /k C:\Windows\System32\reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:1372
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3456
-
C:\Users\Public\xiaodaxzqxia\jecxz.exe"C:\Users\Public\xiaodaxzqxia\jecxz.exe"1⤵
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2884
-
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Public\cxzvasdfg\7133965649694649\A11.chm1⤵
- Suspicious use of SetWindowsHookEx
PID:3432
-
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Public\cxzvasdfg\7133965649694649\A11.chm1⤵
- Suspicious use of SetWindowsHookEx
PID:1568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5648d91f08bccccf86c831a9f7296cd9e
SHA1c853c9da60fd6e843d4a32b81df55ac29fc46402
SHA2562f8eca4c2783dc97191455b545108e6b13881863227ae650d4773ae0e97bcd19
SHA51243ce06d17d6748c1045e34a32870476b9c115d9f09f9fca056252614d6d1237726f6f8cc93a59dfbf2b988ef117600290ed8d198ce49bd0b5561bdfb484baaec
-
Filesize
9KB
MD52342b3ba19855ddd8c3e311b2842bdbb
SHA1ecec63f62d445bdcc369af3f29df566611c7d4a5
SHA256257c340891c8007dbb720853244785b8d7433fb70ca0038528b9fde035d0bfe6
SHA512f5230c860656004d8f860f5b2941b15519cebf7ce6494eefcea6307be4057f5cd6178cbdfca9a022d28fd11cc0d81ed1f2a719ff9a614e28a0eb12f048302cb9
-
Filesize
291KB
MD566bbcc42fe6cf9c1b890ec4a9049a9d7
SHA1dd6bf3e2ca01625a1c2d1cd59ec523b55978d32e
SHA2564950e959cb8ac30540acf2544bbe6a0bdf78e7ea2ce558f248c7f902df29b9ae
SHA51256daaa94dab1ec09d3a328f78e794d6040822ef26ee5370020e59a9da0e0be7e7c95c4e1805d24cf9270a475219e4dd98aa3a71afc6785df406f99a17110ddb0
-
Filesize
1.1MB
MD5b6672f5964eb4f8495ac54286af46c2c
SHA1cc41541c3dfec64af741154dddf28a0a5b0c7876
SHA2562b5fb8e16196b2c9f79406b5266de3f5a0709d7522e40f82f411df91e5d9b6b3
SHA512fb0a0cf37fcb88e647ff444eb3b7fd4445ebad38726172d91f26bb8ec41998e655a2ab27e4e7abba4b628bb694d07d5197311368de59e7b67309ae605468e0e6
-
Filesize
1.2MB
MD5a65e53c974a4e61728ecb632339a0978
SHA127e6ec4f8e34b40f1e08503245700c182b918ce9
SHA256ca8ab5aeef734f24a3c58bf10b3f0152c2ea1329b02d2730448693df563b4c6a
SHA512b029962f08867496cd3fd5e9af4b0703dae918e938aee759aeffbb4184ea6d3e81e0878ba8957e80d30db5d7b6fc8598e68918a4d16b3d010f31a2e16417593e
-
Filesize
1.2MB
MD5a65e53c974a4e61728ecb632339a0978
SHA127e6ec4f8e34b40f1e08503245700c182b918ce9
SHA256ca8ab5aeef734f24a3c58bf10b3f0152c2ea1329b02d2730448693df563b4c6a
SHA512b029962f08867496cd3fd5e9af4b0703dae918e938aee759aeffbb4184ea6d3e81e0878ba8957e80d30db5d7b6fc8598e68918a4d16b3d010f31a2e16417593e
-
Filesize
107B
MD5bcb223ea9c0598f04684216bcd0e12a6
SHA12661c8fbca3654a29fa261def7f16ea23a6f3165
SHA256ef2113720c94cbe4cb494d6e24d26803b4b1a094e35e4285cd4a2f5665ef2c37
SHA51277e440462544ca9f711f9241096601060080f5751651cab8a796d57ed74c424f03a9237a653c17a386c1ef654e6192d0e54080632dacff15a28a46564e639682
-
Filesize
124KB
MD53073cc5f21d39cd801335269f7592eff
SHA103db252b128d91d010418f55bc0afb7e3fa94078
SHA2569a0e14738eb9739bb48af7312fec5227dbc821b12dfb29619cc8e99a4991b3fd
SHA512a3816ef7319501f79125f5d94bd40f0a728b1ab4d85f427d4d26a407fabb6b9229fd56e0bde55f19528fea18c3778f53bf61b9bba4bde226193f4e7e3a1191e2
-
Filesize
124KB
MD53073cc5f21d39cd801335269f7592eff
SHA103db252b128d91d010418f55bc0afb7e3fa94078
SHA2569a0e14738eb9739bb48af7312fec5227dbc821b12dfb29619cc8e99a4991b3fd
SHA512a3816ef7319501f79125f5d94bd40f0a728b1ab4d85f427d4d26a407fabb6b9229fd56e0bde55f19528fea18c3778f53bf61b9bba4bde226193f4e7e3a1191e2
-
Filesize
263B
MD5c7d8b33e05722104d63de564a5d92b01
SHA1fd703f1c71ac1dae65dc34f3521854604cec8091
SHA256538ce88a3eed5a98c6a021a4c541080c5cfb652962f37da620e35b537513317a
SHA51254a80fc6ad3f08743dc1655c379de79f9496086a9a18f4716fc9a9d6a6fe4fd527dd4ac099c57408090b73903c64fa38d4723783708068878aa6e18c6cc0d08e
-
Filesize
275B
MD5be7bbc9c7f6b505918f84b006b871965
SHA162f62090deb64ebdd93e2d48a1b85b3d0082415b
SHA256259d09385d3e18e569e36542ea92eee43747ec48244659ca21ff6e20e9a9d91d
SHA51284afc35227b5b590b5db0bb0e3c1c991202c0d6eef6ecc3ec9d7c097dce3e60d32c85915c7103efa413586a62e0ee7ae773fe13186a2f37825d1f20ac3f705e9
-
Filesize
329KB
MD562d2156e3ca8387964f7aa13dd1ccd5b
SHA1a5067e046ed9ea5512c94d1d17c394d6cf89ccca
SHA25659cbfba941d3ac0238219daa11c93969489b40f1e8b38fabdb5805ac3dd72bfa
SHA512006f7c46021f339b6cbf9f0b80cffa74abb8d48e12986266d069738c4e6bdb799bfba4b8ee4565a01e90dbe679a96a2399d795a6ead6eacbb4818a155858bf60