Analysis
-
max time kernel
133s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 17:38
Behavioral task
behavioral1
Sample
c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe
Resource
win10v2004-20231023-en
General
-
Target
c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe
-
Size
1.3MB
-
MD5
4f6be8b0a37123f64dc6c5c64d3ac731
-
SHA1
3cc764ed720c10ca1f35f2c15e64c58b054788e0
-
SHA256
c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b
-
SHA512
ff559524ae0ad1f5a7385db97cf2ef0b44a9b8b328056f879f7b0f3566d38df04864e25d7c099ac1e0bbf00bb42034a59f60c9486548f17838ac47dad08d0904
-
SSDEEP
24576:DkACnTTsXcJu1VUY4fA8sycIht2J14/4aoy13CDIMwZZgV0rtJynfBX4W:Dx1VUYd8DcI3gao4SDk3tJyfB
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000022cdf-1.dat family_blackmoon -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iqfjhzrwpzzesqlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\iqfjhzrwpzzesqlj = "C:\\ProgramData\\Citrix\\kkdxerypygkpnhnfzqqkldk\\iqfjhzrwpzzesqlj.exe" iqfjhzrwpzzesqlj.exe -
Executes dropped EXE 1 IoCs
pid Process 348 iqfjhzrwpzzesqlj.exe -
Loads dropped DLL 1 IoCs
pid Process 348 iqfjhzrwpzzesqlj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 348 iqfjhzrwpzzesqlj.exe 348 iqfjhzrwpzzesqlj.exe 348 iqfjhzrwpzzesqlj.exe 348 iqfjhzrwpzzesqlj.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3292 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 348 iqfjhzrwpzzesqlj.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1160 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 5012 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 3292 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 348 iqfjhzrwpzzesqlj.exe 348 iqfjhzrwpzzesqlj.exe 348 iqfjhzrwpzzesqlj.exe 348 iqfjhzrwpzzesqlj.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1160 wrote to memory of 5012 1160 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 84 PID 1160 wrote to memory of 5012 1160 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 84 PID 1160 wrote to memory of 5012 1160 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 84 PID 5012 wrote to memory of 3292 5012 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 85 PID 5012 wrote to memory of 3292 5012 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 85 PID 5012 wrote to memory of 3292 5012 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 85 PID 3292 wrote to memory of 1704 3292 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 86 PID 3292 wrote to memory of 1704 3292 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 86 PID 3292 wrote to memory of 1704 3292 c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe 86 PID 1704 wrote to memory of 348 1704 cmd.exe 88 PID 1704 wrote to memory of 348 1704 cmd.exe 88 PID 1704 wrote to memory of 348 1704 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe"C:\Users\Admin\AppData\Local\Temp\c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exeTY433A5C50726F6772616D446174615C4369747269785C6B6B64786572797079676B706E686E667A71716B6C646B5C6971666A687A7277707A7A6573716C6A2E6578652⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\c94f3e205c747ea3238c6aeb6fab6972af50a332af242b2aa02ef689ec269f8b.exeKL433A5C50726F6772616D446174615C4369747269785C6B6B64786572797079676B706E686E667A71716B6C646B5C6971666A687A7277707A7A6573716C6A2E6578653⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\ProgramData\Citrix\kkdxerypygkpnhnfzqqkldk\iqfjhzrwpzzesqlj.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\ProgramData\Citrix\kkdxerypygkpnhnfzqqkldk\iqfjhzrwpzzesqlj.exeC:\ProgramData\Citrix\kkdxerypygkpnhnfzqqkldk\iqfjhzrwpzzesqlj.exe5⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:348
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD5d9af52f6ba09088b0c6d40e84dd7e87d
SHA1178fbd173d5a64ca7b04f7c2f146d963b8ef0501
SHA256478b311e7397ef5db4d789e5af3f729558e8eb7afaba49b4d45b789a6ec0ecc9
SHA51264dffe73611881dc08576752364fe577aab70a0a306f90645a5dec16ea86dab85a90aa5a5693b32b40d05b14cd55ee865cfdab5bb28411d42f7a874bacf610bd
-
Filesize
125KB
MD58929530afda63d45859ecbabc5e9edb4
SHA17f8a88b9d815399ee0047f8bc67c7a2a1d7c16bd
SHA256f4f76935e15ae533d47434880b455297a7b57bd45cd98e124eabf4cfe5b24723
SHA512fae7e1027de3ece5ad06b24ead5c07912c0b5c6217677d2702ebec49c968c7a6f3feffb73491a1557878c6cc5cc69045bc818abc71a48c5a2408f1359f9bd583