Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 19:15
Behavioral task
behavioral1
Sample
096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe
Resource
win7-20231020-en
General
-
Target
096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe
-
Size
320KB
-
MD5
c80040ba82ca50d848427d5a643441ee
-
SHA1
9f14ba8601223091a5bfe20dd3367aa83379bcfa
-
SHA256
096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d
-
SHA512
b5dcd16db37c79c9614b4301ffce3274667e345a39325ae2ea65c696ea8ba81216dac4bcf59b6babd43869a8b845d7ed4c66fca0a7aed6109c369fe0f5aaf3b3
-
SSDEEP
3072:m4gQvLzOEFqxNpIKPM6Oqdb2mCXhH02xoX0uL+9N21bjz7pr2OhEtDoYTGSHJty1:m4gQvLzxqLpIKk6l2mX0KNT8xGSRt3E
Malware Config
Signatures
-
Detect Blackmoon payload 7 IoCs
resource yara_rule behavioral2/files/0x0007000000022e2f-4.dat family_blackmoon behavioral2/memory/876-15-0x0000000000400000-0x0000000000463000-memory.dmp family_blackmoon behavioral2/memory/876-16-0x0000000000400000-0x0000000000463000-memory.dmp family_blackmoon behavioral2/memory/876-20-0x0000000000400000-0x0000000000463000-memory.dmp family_blackmoon behavioral2/memory/876-21-0x0000000000400000-0x0000000000463000-memory.dmp family_blackmoon behavioral2/memory/876-24-0x0000000000400000-0x0000000000463000-memory.dmp family_blackmoon behavioral2/memory/876-29-0x0000000000400000-0x0000000000463000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 876 YY.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5096 set thread context of 876 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 876 YY.exe 876 YY.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe Token: SeDebugPrivilege 876 YY.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 876 YY.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5096 wrote to memory of 876 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 89 PID 5096 wrote to memory of 876 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 89 PID 5096 wrote to memory of 876 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 89 PID 5096 wrote to memory of 876 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 89 PID 5096 wrote to memory of 876 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 89 PID 5096 wrote to memory of 876 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 89 PID 5096 wrote to memory of 876 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 89 PID 5096 wrote to memory of 876 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 89 PID 5096 wrote to memory of 876 5096 096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe"C:\Users\Admin\AppData\Local\Temp\096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\YY.exeC:\Users\Admin\AppData\Local\Temp\YY.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:876
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\096a6fcb215086bc3b8b3dd9a13e2fca84a51658d7b6815a19b0b21066827a6d.exe{2012C39F-61A0-49f5-9764-543C6FCB60E7}
Filesize320KB
MD5d5f07ad5f9d558b0f5fa7f6c612852db
SHA1e5d2f099e647bbb0401f5e441e77399ca90afd18
SHA2567b63a2860b9cd5fbb10e0aeb5f5e0d4f705679f6a07304233ea3f6d1e9e9942c
SHA5123614f8bc93457a094d2be8720da44b79d738195a3ea5852996141fa963687a3d5725deec59d7a4c5b1f6ba94c9b454ed1e9f9743d5160286eac53fa6ce1d855f
-
Filesize
14KB
MD5e31fb4f13f5949b868c117714bb44375
SHA118930fd524b3fdfaca1c0e6a81524f5a282b3009
SHA2562bbc91b888ce64f5de28f76dcf1047f5d324a099fe6a6f1500c53c7943b91499
SHA512f46358cdfaed1338a16c6df992fc9367adca1a8dcd7c57ee8c853bef8522d9026a5e2355e181c8523ba4ee76ace0240acb24e09f2a6affe9087a675107b754ab
-
Filesize
14KB
MD5e31fb4f13f5949b868c117714bb44375
SHA118930fd524b3fdfaca1c0e6a81524f5a282b3009
SHA2562bbc91b888ce64f5de28f76dcf1047f5d324a099fe6a6f1500c53c7943b91499
SHA512f46358cdfaed1338a16c6df992fc9367adca1a8dcd7c57ee8c853bef8522d9026a5e2355e181c8523ba4ee76ace0240acb24e09f2a6affe9087a675107b754ab
-
Filesize
14KB
MD5e31fb4f13f5949b868c117714bb44375
SHA118930fd524b3fdfaca1c0e6a81524f5a282b3009
SHA2562bbc91b888ce64f5de28f76dcf1047f5d324a099fe6a6f1500c53c7943b91499
SHA512f46358cdfaed1338a16c6df992fc9367adca1a8dcd7c57ee8c853bef8522d9026a5e2355e181c8523ba4ee76ace0240acb24e09f2a6affe9087a675107b754ab