Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2023 02:39
Static task
static1
Behavioral task
behavioral1
Sample
libcrypto-3.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
libcrypto-3.dll
Resource
win10v2004-20230621-en
Behavioral task
behavioral3
Sample
saxbn.exe
Resource
win7-20230621-en
General
-
Target
saxbn.exe
-
Size
1.7MB
-
MD5
af7aac457eaefe1c228937403b933251
-
SHA1
166cbb657538ad45778dc77b9ae2b70eb961038b
-
SHA256
24411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
-
SHA512
9b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
SSDEEP
49152:1Z6ZbaHcYz5aAVKiw6ZWqTG93jJ3hWpVc5:1g3Yz5J/693km
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
Processes:
resource yara_rule behavioral4/memory/344-149-0x0000000000400000-0x0000000000426000-memory.dmp family_blackmoon behavioral4/memory/344-150-0x0000000000400000-0x0000000000426000-memory.dmp family_blackmoon behavioral4/memory/344-158-0x0000000000400000-0x0000000000426000-memory.dmp family_blackmoon behavioral4/memory/344-156-0x0000000000400000-0x0000000000426000-memory.dmp family_blackmoon behavioral4/memory/5104-181-0x0000000010000000-0x0000000011000000-memory.dmp family_blackmoon -
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/1932-151-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat -
Blocklisted process makes network request 36 IoCs
Processes:
cmd.exeflow pid process 25 1932 cmd.exe 28 1932 cmd.exe 30 1932 cmd.exe 32 1932 cmd.exe 35 1932 cmd.exe 37 1932 cmd.exe 41 1932 cmd.exe 43 1932 cmd.exe 48 1932 cmd.exe 58 1932 cmd.exe 62 1932 cmd.exe 64 1932 cmd.exe 78 1932 cmd.exe 80 1932 cmd.exe 82 1932 cmd.exe 84 1932 cmd.exe 88 1932 cmd.exe 90 1932 cmd.exe 92 1932 cmd.exe 94 1932 cmd.exe 96 1932 cmd.exe 101 1932 cmd.exe 109 1932 cmd.exe 112 1932 cmd.exe 113 1932 cmd.exe 114 1932 cmd.exe 115 1932 cmd.exe 116 1932 cmd.exe 117 1932 cmd.exe 119 1932 cmd.exe 121 1932 cmd.exe 123 1932 cmd.exe 125 1932 cmd.exe 127 1932 cmd.exe 129 1932 cmd.exe 131 1932 cmd.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
saxbn.exedescription pid process target process PID 5104 set thread context of 1932 5104 saxbn.exe cmd.exe PID 5104 set thread context of 4416 5104 saxbn.exe cmd.exe PID 5104 set thread context of 344 5104 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 5104 set thread context of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 set thread context of 4524 5104 saxbn.exe cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exemecxzcaasxzcxcassascxcxcx23667.exemecxzcaasxzcxcassascxcxcx23667.exepid process 344 secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe 3312 mecxzcaasxzcxcassascxcxcx23667.exe 1252 mecxzcaasxzcxcassascxcxcx23667.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4380 344 WerFault.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
saxbn.exepid process 5104 saxbn.exe 5104 saxbn.exe 5104 saxbn.exe 5104 saxbn.exe 5104 saxbn.exe 5104 saxbn.exe 5104 saxbn.exe 5104 saxbn.exe 5104 saxbn.exe 5104 saxbn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exemecxzcaasxzcxcassascxcxcx23667.exepid process 344 secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe 1252 mecxzcaasxzcxcassascxcxcx23667.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
saxbn.exedescription pid process target process PID 5104 wrote to memory of 1932 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 1932 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 1932 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 1932 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 1932 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 1932 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 1932 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 1932 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4128 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4128 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4128 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4416 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4416 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4416 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4416 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4416 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4416 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4416 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4416 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 344 5104 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 5104 wrote to memory of 344 5104 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 5104 wrote to memory of 344 5104 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 5104 wrote to memory of 344 5104 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 5104 wrote to memory of 344 5104 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 5104 wrote to memory of 344 5104 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 5104 wrote to memory of 344 5104 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 5104 wrote to memory of 344 5104 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 5104 wrote to memory of 344 5104 saxbn.exe secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe PID 5104 wrote to memory of 3312 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 3312 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 3312 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 1252 5104 saxbn.exe mecxzcaasxzcxcassascxcxcx23667.exe PID 5104 wrote to memory of 4524 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4524 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4524 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4524 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4524 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4524 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4524 5104 saxbn.exe cmd.exe PID 5104 wrote to memory of 4524 5104 saxbn.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\saxbn.exe"C:\Users\Admin\AppData\Local\Temp\saxbn.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Blocklisted process makes network request
PID:1932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:4128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exeC:\Users\Admin\AppData\Local\Temp\secvbnmcxccvxcxcsdsdsxcxczsasadrunshellcode86000.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 344 -s 4203⤵
- Program crash
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\mecxzcaasxzcxcassascxcxcx23667.exeC:\Users\Admin\AppData\Local\Temp\mecxzcaasxzcxcassascxcxcx23667.exe2⤵
- Executes dropped EXE
PID:3312
-
-
C:\Users\Admin\AppData\Local\Temp\mecxzcaasxzcxcassascxcxcx23667.exeC:\Users\Admin\AppData\Local\Temp\mecxzcaasxzcxcassascxcxcx23667.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 344 -ip 3441⤵PID:4944
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c
-
Filesize
1.7MB
MD5af7aac457eaefe1c228937403b933251
SHA1166cbb657538ad45778dc77b9ae2b70eb961038b
SHA25624411c2364855dfecc955f5ce2081d2ba9af1cb108eef97963b3c8a91ff288b8
SHA5129b77d0605b3d4e0b79fc7ad01f7873e04c1331e438f20960fb18d51f4063ecb1c4df2d739e7731d78f2f5c89555e0135db65429baebc03a0144fc756f8410f8c