Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
03-07-2023 02:39
Static task
static1
Behavioral task
behavioral1
Sample
libcrypto-3.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
libcrypto-3.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral3
Sample
saxbn.exe
Resource
win7-20230621-en
General
-
Target
saxbn.exe
-
Size
1.7MB
-
MD5
af7aac457eaefe1c228937403b933251
-
SHA1
166cbb657538ad45778dc77b9ae2b70eb961038b
-
SHA256
24411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
-
SHA512
9b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
SSDEEP
49152:1Z6ZbaHcYz5aAVKiw6ZWqTG93jJ3hWpVc5:1g3Yz5J/693km
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
Processes:
resource yara_rule behavioral3/memory/1156-94-0x0000000000400000-0x0000000000426000-memory.dmp family_blackmoon behavioral3/memory/1156-92-0x0000000000400000-0x0000000000426000-memory.dmp family_blackmoon behavioral3/memory/1156-98-0x0000000000400000-0x0000000000426000-memory.dmp family_blackmoon -
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral3/memory/1276-77-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat -
Blocklisted process makes network request 44 IoCs
Processes:
cmd.exeflow pid process 2 1276 cmd.exe 3 1276 cmd.exe 6 1276 cmd.exe 8 1276 cmd.exe 10 1276 cmd.exe 11 1276 cmd.exe 13 1276 cmd.exe 15 1276 cmd.exe 17 1276 cmd.exe 23 1276 cmd.exe 25 1276 cmd.exe 27 1276 cmd.exe 28 1276 cmd.exe 29 1276 cmd.exe 30 1276 cmd.exe 31 1276 cmd.exe 33 1276 cmd.exe 34 1276 cmd.exe 35 1276 cmd.exe 36 1276 cmd.exe 37 1276 cmd.exe 38 1276 cmd.exe 40 1276 cmd.exe 42 1276 cmd.exe 43 1276 cmd.exe 45 1276 cmd.exe 47 1276 cmd.exe 49 1276 cmd.exe 50 1276 cmd.exe 52 1276 cmd.exe 54 1276 cmd.exe 57 1276 cmd.exe 58 1276 cmd.exe 59 1276 cmd.exe 60 1276 cmd.exe 62 1276 cmd.exe 63 1276 cmd.exe 65 1276 cmd.exe 67 1276 cmd.exe 69 1276 cmd.exe 71 1276 cmd.exe 73 1276 cmd.exe 74 1276 cmd.exe 76 1276 cmd.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
saxbn.exedescription pid process target process PID 1432 set thread context of 1276 1432 saxbn.exe cmd.exe PID 1432 set thread context of 1092 1432 saxbn.exe cmd.exe PID 1432 set thread context of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1432 set thread context of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 set thread context of 1620 1432 saxbn.exe cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exemecxzcaasxzcxcassascxcxcx23667.exemecxzcaasxzcxcassascxcxcx23667.exepid process 1156 secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe 1020 mecxzcaasxzcxcassascxcxcx23667.exe 1756 mecxzcaasxzcxcassascxcxcx23667.exe -
Loads dropped DLL 8 IoCs
Processes:
saxbn.exeWerFault.exepid process 1432 saxbn.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 1432 saxbn.exe 1432 saxbn.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 292 1156 WerFault.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
saxbn.exepid process 1432 saxbn.exe 1432 saxbn.exe 1432 saxbn.exe 1432 saxbn.exe 1432 saxbn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exemecxzcaasxzcxcassascxcxcx23667.exepid process 1156 secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe 1756 mecxzcaasxzcxcassascxcxcx23667.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
saxbn.exesecvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exedescription pid process target process PID 1432 wrote to memory of 1684 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1684 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1684 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1684 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1276 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1276 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1276 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1276 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1276 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1276 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1276 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1276 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1276 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1092 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1092 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1092 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1092 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1092 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1092 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1092 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1092 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1092 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1432 wrote to memory of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1432 wrote to memory of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1432 wrote to memory of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1432 wrote to memory of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1432 wrote to memory of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1432 wrote to memory of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1432 wrote to memory of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1432 wrote to memory of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1432 wrote to memory of 1156 1432 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 1156 wrote to memory of 292 1156 secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe WerFault.exe PID 1156 wrote to memory of 292 1156 secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe WerFault.exe PID 1156 wrote to memory of 292 1156 secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe WerFault.exe PID 1156 wrote to memory of 292 1156 secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe WerFault.exe PID 1432 wrote to memory of 1020 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1020 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1020 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1020 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1756 1432 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 1432 wrote to memory of 1620 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1620 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1620 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1620 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1620 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1620 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1620 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1620 1432 saxbn.exe cmd.exe PID 1432 wrote to memory of 1620 1432 saxbn.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\saxbn.exe"C:\Users\Admin\AppData\Local\Temp\saxbn.exe"1⤵
- Suspicious use of SetThreadContext
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:1684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Blocklisted process makes network request
PID:1276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exeC:\Users\Admin\AppData\Local\Temp\secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 1323⤵
- Loads dropped DLL
- Program crash
PID:292
-
-
-
C:\Users\Admin\AppData\Local\Temp\mecxzcaasxzcxcassascxcxcx23667.exeC:\Users\Admin\AppData\Local\Temp\mecxzcaasxzcxcassascxcxcx23667.exe2⤵
- Executes dropped EXE
PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\mecxzcaasxzcxcassascxcxcx23667.exeC:\Users\Admin\AppData\Local\Temp\mecxzcaasxzcxcassascxcxcx23667.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:1620
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c