Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 13:30
Behavioral task
behavioral1
Sample
7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe
Resource
win7-20230712-en
General
-
Target
7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe
-
Size
1.3MB
-
MD5
5a60899b40ecdfb29cf6e26ea315a677
-
SHA1
b87516cac18c30cfc6eefceef0ad55d5369a1c56
-
SHA256
7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4
-
SHA512
7257bf367946b6df191d0771ac6d95d702d9dc9183035dce266f7358787c2bfa40e2f276a2ecaee313f8330a5421506b15ffbb192a979bdd893fa2a2451d8c6e
-
SSDEEP
12288:0KxY+e0CN+caNNU8lW9cuW8X+NbUROlh:0KxYTaNiMVswwCh
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral1/files/0x0009000000012022-1.dat family_blackmoon behavioral1/files/0x0009000000012022-4.dat family_blackmoon behavioral1/files/0x0009000000012022-5.dat family_blackmoon behavioral1/files/0x0009000000012022-7.dat family_blackmoon behavioral1/files/0x0009000000012022-17.dat family_blackmoon -
Deletes itself 1 IoCs
pid Process 2796 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2404 LKXXltFJB.exe 2944 LKXXltFJB.exe 1524 LKXXltFJB.exe -
Loads dropped DLL 1 IoCs
pid Process 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe -
resource yara_rule behavioral1/memory/1524-8-0x0000000000360000-0x000000000036B000-memory.dmp upx behavioral1/memory/1524-9-0x0000000000360000-0x000000000036B000-memory.dmp upx behavioral1/memory/1524-12-0x0000000002060000-0x000000000206B000-memory.dmp upx behavioral1/memory/1524-11-0x0000000002060000-0x000000000206B000-memory.dmp upx behavioral1/memory/1524-41-0x0000000000360000-0x000000000036B000-memory.dmp upx behavioral1/memory/1524-45-0x0000000002060000-0x000000000206B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\LKXXltFJB.exe 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe File opened for modification C:\Windows\SysWOW64\LKXXltFJB.exe 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1524 LKXXltFJB.exe 1524 LKXXltFJB.exe 1524 LKXXltFJB.exe 1524 LKXXltFJB.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe Token: SeDebugPrivilege 1524 LKXXltFJB.exe Token: SeDebugPrivilege 1524 LKXXltFJB.exe Token: SeDebugPrivilege 1524 LKXXltFJB.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe 2404 LKXXltFJB.exe 2944 LKXXltFJB.exe 1524 LKXXltFJB.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2404 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe 28 PID 2856 wrote to memory of 2404 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe 28 PID 2856 wrote to memory of 2404 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe 28 PID 2856 wrote to memory of 2404 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe 28 PID 2856 wrote to memory of 2796 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe 29 PID 2856 wrote to memory of 2796 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe 29 PID 2856 wrote to memory of 2796 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe 29 PID 2856 wrote to memory of 2796 2856 7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe 29 PID 2944 wrote to memory of 1524 2944 LKXXltFJB.exe 32 PID 2944 wrote to memory of 1524 2944 LKXXltFJB.exe 32 PID 2944 wrote to memory of 1524 2944 LKXXltFJB.exe 32 PID 2944 wrote to memory of 1524 2944 LKXXltFJB.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe"C:\Users\Admin\AppData\Local\Temp\7899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\LKXXltFJB.exe-auto2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\789923~1.EXE > nul2⤵
- Deletes itself
PID:2796
-
-
C:\Windows\SysWOW64\LKXXltFJB.exeC:\Windows\SysWOW64\LKXXltFJB.exe Service 11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\LKXXltFJB.exe-OBJECT12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55a60899b40ecdfb29cf6e26ea315a677
SHA1b87516cac18c30cfc6eefceef0ad55d5369a1c56
SHA2567899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4
SHA5127257bf367946b6df191d0771ac6d95d702d9dc9183035dce266f7358787c2bfa40e2f276a2ecaee313f8330a5421506b15ffbb192a979bdd893fa2a2451d8c6e
-
Filesize
1.3MB
MD55a60899b40ecdfb29cf6e26ea315a677
SHA1b87516cac18c30cfc6eefceef0ad55d5369a1c56
SHA2567899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4
SHA5127257bf367946b6df191d0771ac6d95d702d9dc9183035dce266f7358787c2bfa40e2f276a2ecaee313f8330a5421506b15ffbb192a979bdd893fa2a2451d8c6e
-
Filesize
1.3MB
MD55a60899b40ecdfb29cf6e26ea315a677
SHA1b87516cac18c30cfc6eefceef0ad55d5369a1c56
SHA2567899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4
SHA5127257bf367946b6df191d0771ac6d95d702d9dc9183035dce266f7358787c2bfa40e2f276a2ecaee313f8330a5421506b15ffbb192a979bdd893fa2a2451d8c6e
-
Filesize
1.3MB
MD55a60899b40ecdfb29cf6e26ea315a677
SHA1b87516cac18c30cfc6eefceef0ad55d5369a1c56
SHA2567899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4
SHA5127257bf367946b6df191d0771ac6d95d702d9dc9183035dce266f7358787c2bfa40e2f276a2ecaee313f8330a5421506b15ffbb192a979bdd893fa2a2451d8c6e
-
Filesize
1.3MB
MD55a60899b40ecdfb29cf6e26ea315a677
SHA1b87516cac18c30cfc6eefceef0ad55d5369a1c56
SHA2567899234afc56abd778fa36ecb7f71e24b174aaf871ab1e26dd0a513976b32ea4
SHA5127257bf367946b6df191d0771ac6d95d702d9dc9183035dce266f7358787c2bfa40e2f276a2ecaee313f8330a5421506b15ffbb192a979bdd893fa2a2451d8c6e