Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 19:26
Behavioral task
behavioral1
Sample
c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a.exe
Resource
win7-20231023-en
General
-
Target
c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a.exe
-
Size
185KB
-
MD5
fe2cebee0dfbae482f46e693bbc451bf
-
SHA1
2a8e6e73706ef94b52681c5ae156504daa629589
-
SHA256
c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a
-
SHA512
4d52dcb5b93650457570cfa72bf5a0a1bd9752cb1b813269e4132b2303d91b3519158859fb327d7f0f332d1f96eb9062f3e297a2abceb7b736aaa31453744b6e
-
SSDEEP
3072:FlyCWX6fkKuRR6gLKVBIERq7cbo32DgjUikZBJOtO1XI3pmAqFueZcKP+VGrtfra:PBdktvObRqlWg2BJdwwAqFueZc2+gxtM
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral2/memory/2804-13-0x0000000000400000-0x0000000000491000-memory.dmp family_blackmoon behavioral2/memory/2804-37-0x0000000010000000-0x0000000010055000-memory.dmp family_blackmoon behavioral2/memory/2804-38-0x0000000000400000-0x0000000000491000-memory.dmp family_blackmoon -
Downloads MZ/PE file
-
Drops file in Drivers directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\hYnZmAzZ.dll c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a.exe File opened for modification C:\Windows\System32\drivers\hYnZmAzZ.dll c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a.exe File created C:\Windows\SysWOW64\drivers\aSkUzJgR c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a.exe File opened for modification C:\Windows\SysWOW64\drivers\aSkUzJgR c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a.exe File created C:\Windows\System32\drivers\rgF43rgF c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a.exe File opened for modification C:\Windows\System32\drivers\rgF43rgF c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a.exe File created C:\Windows\System32\drivers\sDA38sDA c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a.exe File opened for modification C:\Windows\System32\drivers\sDA38sDA c2209697fccff0d07f6f9b80cb9581f19bb8c68220a4d8f01a378c766270cd0a.exe -
resource yara_rule behavioral2/memory/2804-0-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2804-2-0x0000000002240000-0x0000000002267000-memory.dmp upx behavioral2/memory/2804-11-0x0000000010000000-0x0000000010055000-memory.dmp upx behavioral2/memory/2804-13-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2804-28-0x0000000002240000-0x0000000002267000-memory.dmp upx behavioral2/memory/2804-37-0x0000000010000000-0x0000000010055000-memory.dmp upx behavioral2/memory/2804-38-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2804-58-0x0000000002F20000-0x0000000002F21000-memory.dmp upx -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5f8884a2874a0abe17a0bde15549ea4be
SHA1f28ab00af36d4c5e19db1c891db9c4e24492c316
SHA25646903b9e202d31a99221ec63d453b2a5a61d474d2dc94fcf85a88b56e2435a49
SHA512cf15b839ceed22d4b31cec1a7e458498833780b7971951999212da5ff879f27cbc434680542685e8622d1f42615bb955632895db16a8d63e7c28e1765936e5b7