Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 00:50
Behavioral task
behavioral1
Sample
7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe
Resource
win10v2004-20230703-en
General
-
Target
7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe
-
Size
556KB
-
MD5
dd76ef9e2d63eb6fbea5db358e21f55d
-
SHA1
023bf61604ed3b47f9bfcf4a33dc24c3a5ad5ed9
-
SHA256
7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c
-
SHA512
bc5826bbcaf4d6bfb6b9a7d93d3a0907c0c9391c3716cd03fef0ff0b259dfbd8d36b044f13ce57f5731b77e11c249b55f7b8b97df4d10471f67778b12ac83d0a
-
SSDEEP
12288:ij9qk+AmzwPBJeh0F09hrYR5nWFpPoSFDV42/:ij9j+AmkPBgh0FMhvb7DV7
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/3836-51-0x0000000000400000-0x00000000004A4000-memory.dmp family_blackmoon behavioral2/memory/3836-54-0x0000000000400000-0x00000000004A4000-memory.dmp family_blackmoon behavioral2/memory/3836-55-0x0000000000400000-0x00000000004A4000-memory.dmp family_blackmoon behavioral2/memory/3836-79-0x0000000000400000-0x00000000004A4000-memory.dmp family_blackmoon -
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\101c1846343\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\101c1846343.bin" wlanext.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\101f00b4f34\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\101f00b4f34.bin" wlanext.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\1021e4dbccb\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\1021e4dbccb.bin" wlanext.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ff9959ab13\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\ff9959ab13.bin" wlanext.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\1016aa7093c\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\1016aa7093c.bin" wlanext.exe -
resource yara_rule behavioral2/memory/2204-1-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-0-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-25-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-27-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2204-49-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-57-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-58-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-59-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-61-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-63-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-65-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-67-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-69-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-73-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-76-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-81-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-85-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-88-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-91-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-94-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-97-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-100-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-103-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-106-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-109-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-112-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-114-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/3836-126-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2204 set thread context of 3836 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 84 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\E403A1DFC8F377E0F4AA43A83EE9EA079A1F55F2 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\E403A1DFC8F377E0F4AA43A83EE9EA079A1F55F2\Blob = 09000000010000004c000000304a060a2b0601040182370a0602060a2b0601040182370a060106082b0601050507030806082b0601050507030406082b0601050507030306082b0601050507030206082b060105050703015c000000010000000400000000100000030000000100000014000000e403a1dfc8f377e0f4aa43a83ee9ea079a1f55f219000000010000001000000079d8e39856b0540913defb485e73ed621400000001000000140000000525862f6536a1e59d9eca5c0919ad0e3d96261d0f000000010000001400000052bf462203121ab271f48ff1a32d373fd9f12399040000000100000010000000dc911e8da3a186bb4d52eec0e57b51555300000001000000230000003021301f060960864801a4a227020130123010060a2b0601040182373c0101030200c02000000001000000d3050000308205cf308203b7a00302010202041eb132d5300d06092a864886f70d01010505003076310b300906035504061302434e31233021060355040a0c1a4a656d6d794c6f76654a656e6e7920504b492053657276696365311e301c060355040b0c15706b692e6a656d6d796c6f76656a656e6e792e746b3122302006035504030c194a656d6d794c6f76654a656e6e7920455620526f6f742043413020170d3030303130313030303030305a180f32303939313233313233353935395a3076310b300906035504061302434e31233021060355040a0c1a4a656d6d794c6f76654a656e6e7920504b492053657276696365311e301c060355040b0c15706b692e6a656d6d796c6f76656a656e6e792e746b3122302006035504030c194a656d6d794c6f76654a656e6e7920455620526f6f7420434130820222300d06092a864886f70d01010105000382020f003082020a0282020100b5bf164ce267332d80ffed87e949041ea0b8dd6e4389cc2ece1e2606c7dc4085d75631f5bf99e3b60a4dbe48dc7337e8edc95dd02aca568a119c2884dd8cecd0c174585e1b6ec89e47f37f28626bb42abb0f7cb0ee0f25d11e268026937bfc4587de5d7cd89d9cd3fee634120724a3771d3dec3ba265398f84274bc72d683be7982706d99e24f4ffe84370fb7b0c8d56449c1bdb2d53ca85a55ea12b4cb65aa691fbbceb57c3cb924ded732c252a968069030dbd3a2bf0c8fa027b7ab6afc325b439d4edc7bad1d3e57dfa244705d36bae516daa94378ea3a87e54aad21deb547b1bc659ca611b05da6f473f6dedfc7616bb9a86838cb2b1be86ff2169d4bcc9078527fa4e579acfc1d649339751c2e6521432cf6b5f26666f2c732ec567a2f5c89f62a34b4a73352238b02d981eaf905c6a66ebe570b20d6ae57d978420f34ab679268d8910217031fa6c69831f485eab30c445789242977e2c9d2df3f0f1aa4ec0cae5612418ffdf0127b7d5809e7a1803121d5b0ff82537ab112a49d7946a51ec8c4691332d5ffa415471f2d95e104400776c21250ae00d587b233b22a596db169e0583c0027c59814544963e66a5eb293ea11523e338d924244bd36b6d27227eecf848c3aef39b756123595c646d36d6cdf570b72fe9fbef779e0afa1db7cf4cc81964b366441f8032337a328f3c988997d0a27d2d8dce891c221a514ab30203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e041604140525862f6536a1e59d9eca5c0919ad0e3d96261d301f0603551d230418301680140525862f6536a1e59d9eca5c0919ad0e3d96261d300d06092a864886f70d01010505000382020100ad21caaf24b3bfa5ae380783453b61419a4625b1adf976ca6ee77f802063842fd2ca4879ddf39df1a0ca779bb313fb86d1241607b6df5e868ad9cddb69e19baf3107c22cf951569dc8d5f89db4b4ab7b859b61482b10df9bfcce81c4f1b86c77d40a5ee2805a460dd0d6ea165f86e67085097d159090416b07de58ece97764bd1ab9d3c197d1e52aa132182f68fe1962f194b22e1a5a9d4d25c46c9e97a8a6fde4ec57296b4a509eb6dcc8be7b25ff104ef9892d413c93662351b7f3bab4725aaadd18adf65efba74224dbd1dd718356d68e205046d648ac74e11d3be7494d0dba37c51a467af57c721a25968ab1e6a48416009cfb2ac1c063245d93ec2459ac262778e907e4b9aa5bf666db808344c83857d632ae46fe2daba83d1497a155bb9da767ca7fe567b218dffda7aa61055501b2f515cd0fd8b830a67c82b765f52cf80f077ea177480395a29c8dbe9cd572715257a7cef58ad63218e05d16f0096bd496e12d17bf7790b9ddb6318fb91a2a3f3395dd55e4ba739c2c8d15442fbc8de41bade132d1a23fb5a2844e6b08062208f9191e1f3ca0a5504e07cf4b3f2baa683bdc0dc10a8a6631b3d46481641798a4a37b35ada800104d8bc70c0fc31f6615284cb1229592ee072139b6a15a8ad9e1a8135bb4fe7b426d5e69ca1a9a420d7ce3612490d4d9421835a89a05f14e3ca3fd987c51cd62f2926945cfbff32caa 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 3836 wlanext.exe 3836 wlanext.exe 3836 wlanext.exe 3836 wlanext.exe 3836 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe Token: SeLoadDriverPrivilege 3836 wlanext.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 3836 wlanext.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3836 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 84 PID 2204 wrote to memory of 3836 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 84 PID 2204 wrote to memory of 3836 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 84 PID 2204 wrote to memory of 3836 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 84 PID 2204 wrote to memory of 3836 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 84 PID 2204 wrote to memory of 3836 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 84 PID 2204 wrote to memory of 3836 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 84 PID 2204 wrote to memory of 3836 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 84 PID 2204 wrote to memory of 3836 2204 7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe"C:\Users\Admin\AppData\Local\Temp\7b70bd346a0c3fa08c34589c0cefd13548e8229d81b46cc8603f5fd988015c0c.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD51be7e0b413679057c80c9333928eced8
SHA19db886e297ef166a43495f18b5a0af43764e4bf0
SHA256aa26ce0b481b510d7c1527f2c2cc211e93eb49ff84d3bf539a9641d48b4e6a4e
SHA51206af8ec9fa693dcac431d889b98f33cb823db8d230798f4af540f992111eebfbef24ea7b99b9aceb4e4e8b8c3f93869ac39036686078da6a53a3b9ccb90ba9b5