Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2023 23:45
Behavioral task
behavioral1
Sample
cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe
Resource
win7-20231025-en
General
-
Target
cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe
-
Size
3.0MB
-
MD5
c819195bc0cc7131549993c41538a730
-
SHA1
4695f496ac10e5fa03e4a7e265bd6697c4493ff0
-
SHA256
cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733
-
SHA512
bc898f1715836d9195d5035552e91954f451a4a06513408dae85e6ff32166ba51c03f5b8706ae90874dcba187aa09d084d604349c06256e045ca902191fa7d84
-
SSDEEP
49152:dl+sHIraGZJIDPOo+QSIuUV4DMn5UON1:ysorMWo+QS/eL5U61
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/4068-2-0x0000000000400000-0x0000000000756000-memory.dmp family_blackmoon behavioral2/memory/4068-3-0x0000000000400000-0x0000000000756000-memory.dmp family_blackmoon behavioral2/memory/4068-4-0x0000000000400000-0x0000000000756000-memory.dmp family_blackmoon behavioral2/memory/4068-7-0x0000000000400000-0x0000000000756000-memory.dmp family_blackmoon -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0002000000022612-9.dat acprotect behavioral2/files/0x0002000000022612-8.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 4068 explorer.exe -
resource yara_rule behavioral2/files/0x0002000000022612-9.dat upx behavioral2/memory/4068-10-0x0000000074E40000-0x0000000074F4B000-memory.dmp upx behavioral2/files/0x0002000000022612-8.dat upx behavioral2/memory/4068-11-0x0000000074E40000-0x0000000074F4B000-memory.dmp upx behavioral2/memory/4068-14-0x0000000074E40000-0x0000000074F4B000-memory.dmp upx behavioral2/memory/4068-24-0x0000000074E40000-0x0000000074F4B000-memory.dmp upx behavioral2/memory/4068-25-0x0000000074E40000-0x0000000074F4B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ExuiKrnln.dll cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe File created C:\Windows\SysWOW64\ExuiKrnln.dll explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4208 set thread context of 4068 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3360 4208 WerFault.exe 85 2572 4208 WerFault.exe 85 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\TypedURLs explorer.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Software\Microsoft\Internet Explorer\TypedURLs cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 4068 explorer.exe 4068 explorer.exe 4068 explorer.exe 4068 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 4068 explorer.exe 4068 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4208 wrote to memory of 4068 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 86 PID 4208 wrote to memory of 4068 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 86 PID 4208 wrote to memory of 4068 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 86 PID 4208 wrote to memory of 4068 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 86 PID 4208 wrote to memory of 4068 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 86 PID 4208 wrote to memory of 4068 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 86 PID 4208 wrote to memory of 4068 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 86 PID 4208 wrote to memory of 4068 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 86 PID 4208 wrote to memory of 4068 4208 cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe 86 PID 4068 wrote to memory of 3424 4068 explorer.exe 90 PID 4068 wrote to memory of 3424 4068 explorer.exe 90 PID 4068 wrote to memory of 3424 4068 explorer.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe"C:\Users\Admin\AppData\Local\Temp\cb2290bb41e2edabf9238983e703e448cfac9549db64aabbee732c6e72ca0733.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3424
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 19922⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 19762⤵
- Program crash
PID:2572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4208 -ip 42081⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4208 -ip 42081⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD56b0c10b774ee6dbcf0e4bd1557e7160b
SHA198e5502f0cb27e355062e8fa0b9aad80e5c0bbad
SHA256335722b2684ffeac668ed8e9d7d582a395f9fc3d13f552f07c5d3ec7f025890f
SHA512a44729fad75a090e4b3a0a4211ded10ef8ec499a7479efd2e3e6c448a3c625073b88e9e2c63c943f2fbcd9605aa9cc3cb1176a2ad61d91f22c4116948d66decf
-
Filesize
328KB
MD56b0c10b774ee6dbcf0e4bd1557e7160b
SHA198e5502f0cb27e355062e8fa0b9aad80e5c0bbad
SHA256335722b2684ffeac668ed8e9d7d582a395f9fc3d13f552f07c5d3ec7f025890f
SHA512a44729fad75a090e4b3a0a4211ded10ef8ec499a7479efd2e3e6c448a3c625073b88e9e2c63c943f2fbcd9605aa9cc3cb1176a2ad61d91f22c4116948d66decf