Analysis
-
max time kernel
175s -
max time network
212s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 09:19
Behavioral task
behavioral1
Sample
d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe
Resource
win7-20230831-en
Errors
General
-
Target
d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe
-
Size
5.8MB
-
MD5
e08015604f562f1409440fec6a32b1f8
-
SHA1
f84afe3ff4bf4e463a881ab1e92de37e23d3a0b9
-
SHA256
d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a
-
SHA512
dda10ce2ba42e22032065942b03f51fd1d2f96247ad09725d1de10c8e3eebead7a5d1e9b40813c08830bb88beec0ff18496a9e00a0fc0cb2f5e27b61ef7b0f51
-
SSDEEP
98304:FLcFdRkuo92IMlQnbVIPzf83ouM3z7JYnGrxMy+FY9i3voKziPDC+kAECq4:F0dRdo929MxMfaoN6ILgjmrnkJ6
Malware Config
Signatures
-
Detect Blackmoon payload 10 IoCs
resource yara_rule behavioral1/memory/2616-15-0x0000000000400000-0x00000000009F8000-memory.dmp family_blackmoon behavioral1/memory/2616-18-0x0000000000400000-0x00000000009F8000-memory.dmp family_blackmoon behavioral1/memory/2740-38-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral1/memory/2616-26-0x0000000000400000-0x00000000009F8000-memory.dmp family_blackmoon behavioral1/memory/2740-43-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral1/memory/2740-50-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral1/memory/2740-67-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral1/memory/2740-78-0x0000000000400000-0x0000000000473000-memory.dmp family_blackmoon behavioral1/memory/2616-591-0x0000000000400000-0x00000000009F8000-memory.dmp family_blackmoon behavioral1/memory/2616-595-0x0000000000400000-0x00000000009F8000-memory.dmp family_blackmoon -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\libcurl.dll d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2728 set thread context of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 set thread context of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 2616 SystemPropertiesDataExecutionPrevention.exe 2616 SystemPropertiesDataExecutionPrevention.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe 2740 instnm.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 2616 SystemPropertiesDataExecutionPrevention.exe 2740 instnm.exe 2616 SystemPropertiesDataExecutionPrevention.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 wrote to memory of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 wrote to memory of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 wrote to memory of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 wrote to memory of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 wrote to memory of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 wrote to memory of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 wrote to memory of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 wrote to memory of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 wrote to memory of 2616 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 29 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30 PID 2728 wrote to memory of 2740 2728 d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe"C:\Users\Admin\AppData\Local\Temp\d89447de1ebb02394f5eb8fa8c3e5ad1478e9cfb5d0a0a3adc0a2af614f95a3a.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention.exeSystemPropertiesDataExecutionPrevention.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
C:\Windows\SysWOW64\instnm.exeinstnm.exe Mzeasst2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244B
MD5331535c9c818b98b80e9e83fef5b7b3d
SHA16c30e8f272e111f3e033ba513de266474f700e03
SHA256af4d07f3f5eef6a53fd28a19d288c9d3de0a341c3c879e2894befa9b8787801c
SHA512148ed5d3a082cf6433ddc76fba6010bd4e68b990c9bc3d37b2dce62ddbd5c49b20c652703747c8a98c10ce4ad58fb9cd7dce98d6ef26e802c676da3b9a1de05d
-
Filesize
283B
MD5e491e9d1152fc1ee13b0bcdd6547dc41
SHA167fcce56f4eb13ee71e88ccda8284eae7b42cfc0
SHA2565dfb40d13bc7ae738ed147f1a9f2893d09b1402a9d5ae03e59e74ab3a397cf98
SHA512ca58bb61011fb8cf783a080c31d9948e18a160a1ba164cf5a7bec979f5f8a5f78f6266f99dfb3c319fc89ac60e9e1c4b7c3f3940e6dc1fc3b54768bdbddbf1a5
-
Filesize
283B
MD5e491e9d1152fc1ee13b0bcdd6547dc41
SHA167fcce56f4eb13ee71e88ccda8284eae7b42cfc0
SHA2565dfb40d13bc7ae738ed147f1a9f2893d09b1402a9d5ae03e59e74ab3a397cf98
SHA512ca58bb61011fb8cf783a080c31d9948e18a160a1ba164cf5a7bec979f5f8a5f78f6266f99dfb3c319fc89ac60e9e1c4b7c3f3940e6dc1fc3b54768bdbddbf1a5