Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 12:33
Behavioral task
behavioral1
Sample
NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe
-
Size
8.6MB
-
MD5
3cd56bf11533629310b9606947ca6edb
-
SHA1
1d3b6b81c93b6d99c48e84c1c0a87f8e918996d5
-
SHA256
77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9
-
SHA512
21aeff2bdfb88b887fd11d686a9109ba731a0ba32d03d372f645b8d0b36f418eab497250725615684921bd9552a003aca7357ac77d1d836f661fb8075984beaa
-
SSDEEP
98304:mY6acVdq4KN0IaDOw7UY9mLW9+Ok0fdbIVhkl8usYU8ykT83n+CpwfMCO22ROTV/:mj/Z1ZNvYzhsch7stnbcEhz
Malware Config
Signatures
-
Detect Blackmoon payload 6 IoCs
resource yara_rule behavioral1/memory/804-12-0x0000000000400000-0x0000000000CC8000-memory.dmp family_blackmoon behavioral1/memory/804-13-0x0000000000400000-0x0000000000CC8000-memory.dmp family_blackmoon behavioral1/memory/804-14-0x0000000000400000-0x0000000000CC8000-memory.dmp family_blackmoon behavioral1/memory/804-15-0x0000000000400000-0x0000000000CC8000-memory.dmp family_blackmoon behavioral1/memory/804-16-0x0000000000400000-0x0000000000CC8000-memory.dmp family_blackmoon behavioral1/memory/804-40-0x0000000000400000-0x0000000000CC8000-memory.dmp family_blackmoon -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0035000000016d68-18.dat acprotect behavioral1/files/0x0035000000016d68-19.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2644 regsvr32.exe -
resource yara_rule behavioral1/memory/804-1-0x0000000010000000-0x0000000010019000-memory.dmp upx behavioral1/memory/804-0-0x0000000010000000-0x0000000010019000-memory.dmp upx behavioral1/files/0x0035000000016d68-18.dat upx behavioral1/files/0x0035000000016d68-19.dat upx behavioral1/memory/2644-20-0x0000000010000000-0x00000000104E0000-memory.dmp upx behavioral1/memory/804-37-0x0000000010000000-0x0000000010019000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dult.dll NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CurVer\ = "dm.dmsoft" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID\ = "dm.dmsoft" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\ = "{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ = "dm.dmsoft" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\ = "dm" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\HELPDIR\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dm.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\ = "dm.dmsoft" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ = "Idmsoft" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib\ = "{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\dm.dmsoft\CLSID\ = "{26037A0E-7CBD-4FFF-9C63-56F2D0770214}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26037A0E-7CBD-4FFF-9C63-56F2D0770214}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dm.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{84288AAD-BA02-4EF2-85EC-3FAD4D11354D}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F54BC2-D6D1-4A85-B943-16287ECEA64C}\ = "Idmsoft" regsvr32.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe Token: SeDebugPrivilege 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe Token: SeDebugPrivilege 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe Token: 1 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe Token: SeDebugPrivilege 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 804 wrote to memory of 2644 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe 27 PID 804 wrote to memory of 2644 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe 27 PID 804 wrote to memory of 2644 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe 27 PID 804 wrote to memory of 2644 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe 27 PID 804 wrote to memory of 2644 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe 27 PID 804 wrote to memory of 2644 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe 27 PID 804 wrote to memory of 2644 804 NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.77a48b521d801458032332e31258318ced0b9dd590cd060a97726458e01696d9_JC.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 dm.dll /s2⤵
- Loads dropped DLL
- Modifies registry class
PID:2644
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD54525af26f2e99162858e674262b5be54
SHA1463200410611a673743f4f6d6377887033be2545
SHA25680191c3e79819646017bc3053b04ee51b619a9ff93b70b76c6540da7d40cddd8
SHA5126a4b225df7314dece89e0d2308b2871e23c89886bd565dc85a804f9137ba1b427ae4444280f9f1aac04a77f366cf917388da9573a9646af80bf5b2553ec0c715
-
Filesize
3.4MB
MD54525af26f2e99162858e674262b5be54
SHA1463200410611a673743f4f6d6377887033be2545
SHA25680191c3e79819646017bc3053b04ee51b619a9ff93b70b76c6540da7d40cddd8
SHA5126a4b225df7314dece89e0d2308b2871e23c89886bd565dc85a804f9137ba1b427ae4444280f9f1aac04a77f366cf917388da9573a9646af80bf5b2553ec0c715