Analysis
-
max time kernel
129s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/08/2023, 03:09
Behavioral task
behavioral1
Sample
1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe
Resource
win7-20230712-en
General
-
Target
1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe
-
Size
889KB
-
MD5
b2360d22132c3fe3dc5a15b7fd067bad
-
SHA1
63dc22bf87622588701b64f0f2dff7c5d103443b
-
SHA256
1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730
-
SHA512
43ad8d720190e7db1b519f2abca2855b257ab49c8e9c0b08691c00052d3b1369d8bccb6ffe366fd3c835ff6c7d91ba009b0b30b170ca59c214c01d9cb5cd2467
-
SSDEEP
12288:2076zUu2kLGh6sPmozu119YICnZ8sq6iq39ncG/z0O9nxQX/eZqd:LQUuPGckzu5JCnCaioZxQX/eI
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral1/memory/2584-72-0x0000000003B00000-0x0000000003B67000-memory.dmp family_blackmoon behavioral1/memory/2584-75-0x0000000003B00000-0x0000000003B67000-memory.dmp family_blackmoon behavioral1/memory/2584-117-0x0000000003B00000-0x0000000003B67000-memory.dmp family_blackmoon behavioral1/memory/2584-122-0x0000000003B00000-0x0000000003B67000-memory.dmp family_blackmoon behavioral1/memory/2584-119-0x0000000003B00000-0x0000000003B67000-memory.dmp family_blackmoon -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2584-105-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe -
resource yara_rule behavioral1/memory/1968-53-0x0000000000400000-0x00000000005D4000-memory.dmp upx behavioral1/files/0x0008000000012028-56.dat upx behavioral1/memory/1968-59-0x0000000000400000-0x00000000005D4000-memory.dmp upx behavioral1/memory/2584-62-0x0000000000400000-0x00000000005D4000-memory.dmp upx behavioral1/files/0x0008000000012028-61.dat upx behavioral1/files/0x0008000000012028-89.dat upx behavioral1/memory/2584-103-0x0000000000400000-0x00000000005D4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Run\qdatem = "C:\\Users\\Public\\Documents\\Applicationtelmi.exe" 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\B: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\R: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\V: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\W: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\X: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\P: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\S: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\G: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\H: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\K: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\N: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\O: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\U: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\Y: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\E: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\I: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\L: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\M: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\T: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\J: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe File opened (read-only) \??\Q: 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2340 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe Token: SeIncBasePriorityPrivilege 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe Token: 33 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe Token: SeIncBasePriorityPrivilege 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1968 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 1968 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2584 1968 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 28 PID 1968 wrote to memory of 2584 1968 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 28 PID 1968 wrote to memory of 2584 1968 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 28 PID 1968 wrote to memory of 2584 1968 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 28 PID 2584 wrote to memory of 2340 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 29 PID 2584 wrote to memory of 2340 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 29 PID 2584 wrote to memory of 2340 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 29 PID 2584 wrote to memory of 2340 2584 1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe"C:\Users\Admin\AppData\Local\Temp\1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Public\Music\1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe"C:\Users\Public\Music\1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730.txt
Filesize120KB
MD53aea5b78bac5359a799c2714fecccd1a
SHA15d3203b328ecfc7a55c0ded1032d209e9f273367
SHA256c05e763cab67cf9daf5be7a6a6cff2650223987a9693eaa119f69b2bbb6df6c3
SHA5129513cc84a7ed3dd709d4affb03f6e286dcd43e82f33441c00a9d74d2b45449f2ee20baa8db46218d7a59d9e62fb7f95050ea305166e70f3e71dde39ccf07b6d3
-
Filesize
235B
MD5c1ddb75a4b5d3b5902e1acf91b377ad5
SHA1e30b5b79501192edc552e18b43bba6001aa111a5
SHA25677a8a804893145e7ac072ce243a30715f4a83e8be876ea9b06bc26e8933036f9
SHA51249f9a9a8ac1c39fcc21fc9764f12a22a66324c2fd2e6dcc0417fc11b985cd9ef89bd6c228a4b62524d8c4e17fb94cdad989572044e014c99eee43a568766dcc4
-
Filesize
66KB
MD5d70ed4778e67fe2dfea2e6b49251160d
SHA1a9357aac2ab0fa260b646e628c2cbbacf4a16bd7
SHA25678a07514c888d6b24d602f0c2972800bcbb2ac1ca7cd24b56d74666dbf73d568
SHA51215a373af9a570f241f76b247850b39d513bce8bdfa29000e0d56e081c90743192907a2238a31d0c2cca4456b6000577bcf622817758748de799f46cbfc746bbb
-
Filesize
889KB
MD5b2360d22132c3fe3dc5a15b7fd067bad
SHA163dc22bf87622588701b64f0f2dff7c5d103443b
SHA2561de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730
SHA51243ad8d720190e7db1b519f2abca2855b257ab49c8e9c0b08691c00052d3b1369d8bccb6ffe366fd3c835ff6c7d91ba009b0b30b170ca59c214c01d9cb5cd2467
-
Filesize
889KB
MD5b2360d22132c3fe3dc5a15b7fd067bad
SHA163dc22bf87622588701b64f0f2dff7c5d103443b
SHA2561de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730
SHA51243ad8d720190e7db1b519f2abca2855b257ab49c8e9c0b08691c00052d3b1369d8bccb6ffe366fd3c835ff6c7d91ba009b0b30b170ca59c214c01d9cb5cd2467
-
Filesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
Filesize
889KB
MD5b2360d22132c3fe3dc5a15b7fd067bad
SHA163dc22bf87622588701b64f0f2dff7c5d103443b
SHA2561de2e0e806b4200a5c1077057b4bcaa9e2a47803eb62f9d64e02ecb6938e4730
SHA51243ad8d720190e7db1b519f2abca2855b257ab49c8e9c0b08691c00052d3b1369d8bccb6ffe366fd3c835ff6c7d91ba009b0b30b170ca59c214c01d9cb5cd2467