Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/08/2023, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe
Resource
win10v2004-20230703-en
General
-
Target
6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe
-
Size
6.6MB
-
MD5
23a649edd78a9a3385dfc5c864554344
-
SHA1
326c1760b169265e927b21c682f1bf1ce76884f2
-
SHA256
6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8
-
SHA512
0fc1b5bc424dc5fd57193848f3396516c31d7bf65f3924104956af29c3b529ce051849380bbd85574f9faa99a4f050b1aed0baab153c568462beea7214eb7196
-
SSDEEP
196608:t6PL/+7/A1Yhd1DsD8VBLVk1Q7vGs13rrqHXfY17:ML/k/2YxJkLq7O3Q
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/1952-56-0x0000000010000000-0x0000000010438000-memory.dmp family_blackmoon behavioral1/memory/1952-68-0x0000000002530000-0x00000000025D0000-memory.dmp family_blackmoon behavioral1/memory/1952-76-0x0000000002530000-0x00000000025D0000-memory.dmp family_blackmoon -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\xabqpq\ImagePath = "\\??\\C:\\Windows\\xabqpq.sys" 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe -
Stops running service(s) 3 TTPs
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xabqpq.sys 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe File opened for modification C:\Windows\xabqpq.sys 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2824 sc.exe 2856 sc.exe 1256 sc.exe 2980 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2140 1952 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2340 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 28 PID 1952 wrote to memory of 2340 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 28 PID 1952 wrote to memory of 2340 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 28 PID 1952 wrote to memory of 2340 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 28 PID 2340 wrote to memory of 2856 2340 CMD.exe 30 PID 2340 wrote to memory of 2856 2340 CMD.exe 30 PID 2340 wrote to memory of 2856 2340 CMD.exe 30 PID 2340 wrote to memory of 2856 2340 CMD.exe 30 PID 1952 wrote to memory of 2936 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 31 PID 1952 wrote to memory of 2936 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 31 PID 1952 wrote to memory of 2936 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 31 PID 1952 wrote to memory of 2936 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 31 PID 2936 wrote to memory of 1256 2936 CMD.exe 33 PID 2936 wrote to memory of 1256 2936 CMD.exe 33 PID 2936 wrote to memory of 1256 2936 CMD.exe 33 PID 2936 wrote to memory of 1256 2936 CMD.exe 33 PID 1952 wrote to memory of 2832 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 34 PID 1952 wrote to memory of 2832 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 34 PID 1952 wrote to memory of 2832 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 34 PID 1952 wrote to memory of 2832 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 34 PID 2832 wrote to memory of 2980 2832 CMD.exe 36 PID 2832 wrote to memory of 2980 2832 CMD.exe 36 PID 2832 wrote to memory of 2980 2832 CMD.exe 36 PID 2832 wrote to memory of 2980 2832 CMD.exe 36 PID 1952 wrote to memory of 2712 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 37 PID 1952 wrote to memory of 2712 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 37 PID 1952 wrote to memory of 2712 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 37 PID 1952 wrote to memory of 2712 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 37 PID 2712 wrote to memory of 2824 2712 CMD.exe 39 PID 2712 wrote to memory of 2824 2712 CMD.exe 39 PID 2712 wrote to memory of 2824 2712 CMD.exe 39 PID 2712 wrote to memory of 2824 2712 CMD.exe 39 PID 1952 wrote to memory of 2140 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 40 PID 1952 wrote to memory of 2140 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 40 PID 1952 wrote to memory of 2140 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 40 PID 1952 wrote to memory of 2140 1952 6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe"C:\Users\Admin\AppData\Local\Temp\6bf70bc39b4245ebd0ba59e920a9b4cacfbecaffbf9f51dcdafe5ca5175f54e8.exe"1⤵
- Sets service image path in registry
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\CMD.exeCMD /C SC STOP xabqpq2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\sc.exeSC STOP xabqpq3⤵
- Launches sc.exe
PID:2856
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C SC DELETE xabqpq2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\sc.exeSC DELETE xabqpq3⤵
- Launches sc.exe
PID:1256
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C SC STOP xabqpq2⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\sc.exeSC STOP xabqpq3⤵
- Launches sc.exe
PID:2980
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C SC DELETE xabqpq2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\sc.exeSC DELETE xabqpq3⤵
- Launches sc.exe
PID:2824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 4282⤵
- Program crash
PID:2140
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1