Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 09:00
Behavioral task
behavioral1
Sample
b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe
Resource
win7-20230831-en
General
-
Target
b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe
-
Size
10.5MB
-
MD5
943dcdfa939d60d841d076d29be57f91
-
SHA1
2158db795771332a3477f512cab08993f29344ff
-
SHA256
b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa
-
SHA512
e4faefd4057c4e6d232142a39e54803f88599cf54e13280deb8576e691d1f117aec81bd2cd3bb47f0105824791a88eaa06dab1ba05e9f073093a51c8e08106c9
-
SSDEEP
196608:soZd1OmHb9OpFJHCgXV/EOC3iw7+arCFT7t0K7l5eBf:lZ7Hb9OpFYgNaPkTeVB
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/3004-0-0x0000000000400000-0x0000000000EA5000-memory.dmp family_blackmoon behavioral2/memory/3004-16-0x0000000000400000-0x0000000000EA5000-memory.dmp family_blackmoon -
Loads dropped DLL 2 IoCs
pid Process 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe -
resource yara_rule behavioral2/memory/3004-1-0x0000000010000000-0x000000001052F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3777073499-70821052-905318652-1000_Classes\Local Settings b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe 3004 b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe"C:\Users\Admin\AppData\Local\Temp\b8f38c8991f1c00fbe07747e41075b11283d3320aa115b191b35823352dd40fa.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3004
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52fe14842d419762d7f8a7e63b0ddece7
SHA1be44c93e1d758568d95c583aa24b18b0ad47acd2
SHA2561b9c31bba96d9ed28b3d649ee8071aaba2fdb15119b7a204c093e84956e6715b
SHA5129feef224304d8aee5915a0163340c67a6e22ec41bf766471382a82c540c99616600e21c9a87312ce8eaff7ea46a0576155c17e6532321aa0f664ce6ee89b71ec
-
Filesize
1.1MB
MD52fe14842d419762d7f8a7e63b0ddece7
SHA1be44c93e1d758568d95c583aa24b18b0ad47acd2
SHA2561b9c31bba96d9ed28b3d649ee8071aaba2fdb15119b7a204c093e84956e6715b
SHA5129feef224304d8aee5915a0163340c67a6e22ec41bf766471382a82c540c99616600e21c9a87312ce8eaff7ea46a0576155c17e6532321aa0f664ce6ee89b71ec