Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 20:23
Behavioral task
behavioral1
Sample
3b2a14671a4f0ea12152874527663303.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b2a14671a4f0ea12152874527663303.exe
Resource
win10v2004-20231215-en
General
-
Target
3b2a14671a4f0ea12152874527663303.exe
-
Size
260KB
-
MD5
3b2a14671a4f0ea12152874527663303
-
SHA1
30e6c17a0cd075e3947e82532800a0ae74fd1fc0
-
SHA256
04e28b87b59c589e1a889384d82499b62e4c557d8bc972e8c9d656c9c153103e
-
SHA512
67f2a5d5d616e6391cabd7649abaaa61afa9fda5c67f13f5af17b6b2336d876b728b2687170108773538f15bb6dbaed999a429c812fdab1f422cc2e027e1f12a
-
SSDEEP
6144:lop3GqvWfVGiJjODSd0XuLwvr/eR2fq4P+yvDmIB:loRGqvqnJjODSWXMwvr/7fq49Dm
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002320d-4.dat family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 3304 etClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\360. = "C:\\Windows\\etClient.exe" 3b2a14671a4f0ea12152874527663303.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\etClient.exe 3b2a14671a4f0ea12152874527663303.exe File opened for modification C:\Windows\etClient.exe 3b2a14671a4f0ea12152874527663303.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 264 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1472 3b2a14671a4f0ea12152874527663303.exe 1472 3b2a14671a4f0ea12152874527663303.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1472 wrote to memory of 3304 1472 3b2a14671a4f0ea12152874527663303.exe 23 PID 1472 wrote to memory of 3304 1472 3b2a14671a4f0ea12152874527663303.exe 23 PID 1472 wrote to memory of 3304 1472 3b2a14671a4f0ea12152874527663303.exe 23 PID 1472 wrote to memory of 1804 1472 3b2a14671a4f0ea12152874527663303.exe 17 PID 1472 wrote to memory of 1804 1472 3b2a14671a4f0ea12152874527663303.exe 17 PID 1472 wrote to memory of 1804 1472 3b2a14671a4f0ea12152874527663303.exe 17 PID 1804 wrote to memory of 264 1804 cmd.exe 19 PID 1804 wrote to memory of 264 1804 cmd.exe 19 PID 1804 wrote to memory of 264 1804 cmd.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b2a14671a4f0ea12152874527663303.exe"C:\Users\Admin\AppData\Local\Temp\3b2a14671a4f0ea12152874527663303.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 2 &del "C:\Users\Admin\AppData\Local\Temp\3b2a14671a4f0ea12152874527663303.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:264
-
-
-
C:\Windows\etClient.exeC:\Windows\etClient.exe2⤵
- Executes dropped EXE
PID:3304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD53b2a14671a4f0ea12152874527663303
SHA130e6c17a0cd075e3947e82532800a0ae74fd1fc0
SHA25604e28b87b59c589e1a889384d82499b62e4c557d8bc972e8c9d656c9c153103e
SHA51267f2a5d5d616e6391cabd7649abaaa61afa9fda5c67f13f5af17b6b2336d876b728b2687170108773538f15bb6dbaed999a429c812fdab1f422cc2e027e1f12a