Analysis
-
max time kernel
153s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
3C1EF3BD5CDB2F48F81450A8D66B4521.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3C1EF3BD5CDB2F48F81450A8D66B4521.exe
Resource
win10v2004-20231215-en
General
-
Target
3C1EF3BD5CDB2F48F81450A8D66B4521.exe
-
Size
1.0MB
-
MD5
3c1ef3bd5cdb2f48f81450a8d66b4521
-
SHA1
52852cfdb69a11e9380fc9e001213982db3ba7af
-
SHA256
435a12ab59bb78ad797f1f9b4b2fad50799bc217e93669bf543540b358a5dcdc
-
SHA512
34f990d15be83b476e1684c6c6467fdc92e6117692803cf50e33821ac1ebdb3d9d81e13fab8f04bfc78d26fe2d476d8b87cc27a60b27988ec9a5e0a5ae0312c1
-
SSDEEP
24576:DlR3W+VUl+iJyv4cNENUkGIO3kaCkspl2L56:Dl0+Vi+iAhKNmVC1GL
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x000200000001e7ea-2.dat family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 1484 Agghosts.exe -
Loads dropped DLL 3 IoCs
pid Process 2644 3C1EF3BD5CDB2F48F81450A8D66B4521.exe 1484 Agghosts.exe 1484 Agghosts.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Æô¶¯Ïî¹ÜÀí = "C:\\iyozxf\\Agghosts.exe" Agghosts.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Agghosts.exe File opened (read-only) \??\P: Agghosts.exe File opened (read-only) \??\T: Agghosts.exe File opened (read-only) \??\V: Agghosts.exe File opened (read-only) \??\W: Agghosts.exe File opened (read-only) \??\E: Agghosts.exe File opened (read-only) \??\G: Agghosts.exe File opened (read-only) \??\N: Agghosts.exe File opened (read-only) \??\X: Agghosts.exe File opened (read-only) \??\S: Agghosts.exe File opened (read-only) \??\Z: Agghosts.exe File opened (read-only) \??\K: Agghosts.exe File opened (read-only) \??\M: Agghosts.exe File opened (read-only) \??\Q: Agghosts.exe File opened (read-only) \??\J: Agghosts.exe File opened (read-only) \??\R: Agghosts.exe File opened (read-only) \??\L: Agghosts.exe File opened (read-only) \??\U: Agghosts.exe File opened (read-only) \??\Y: Agghosts.exe File opened (read-only) \??\B: Agghosts.exe File opened (read-only) \??\H: Agghosts.exe File opened (read-only) \??\I: Agghosts.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Agghosts.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Agghosts.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ helppane.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2644 3C1EF3BD5CDB2F48F81450A8D66B4521.exe 2644 3C1EF3BD5CDB2F48F81450A8D66B4521.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe 1484 Agghosts.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1484 Agghosts.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5024 helppane.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5024 helppane.exe 5024 helppane.exe 1484 Agghosts.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5024 wrote to memory of 1484 5024 helppane.exe 97 PID 5024 wrote to memory of 1484 5024 helppane.exe 97 PID 5024 wrote to memory of 1484 5024 helppane.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\3C1EF3BD5CDB2F48F81450A8D66B4521.exe"C:\Users\Admin\AppData\Local\Temp\3C1EF3BD5CDB2F48F81450A8D66B4521.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\iyozxf\Agghosts.exe"C:\iyozxf\Agghosts.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD527409998a5047ed2ddbb99e6676ef7ec
SHA117e510effffeef9a1556cd28ea3ccde39ec06599
SHA256d2966e08d8f1077cb9c2bcdb570f1136b5173f8c42f01cfd240b51f69ae7bcf8
SHA5123f4807689ef5dfcc70398fada056917f00551f99053749ea5f886a4d0b75b91556cc4a9d1c1de2058652734cf461e1f85f5d7ef78d3fc1dca36c7f8e87fb38e5
-
Filesize
23KB
MD55aab297fa8f143bfa67310ad78b76d3f
SHA15db963c2cca1bc8c8c060c52f7df76ccb477f01a
SHA2568ec64bc55e5641d7683288e5e8e27c9391f06eb4da096c3d677d8f25ca4d04df
SHA512c1ee67bd4c6bcfdc4179f905c7abc4ac632c9265b61dd5fdb90eeeec39802abe2cc487a5c8ded8a0748728104170c1b4d3a88904f102e1c3f891fac7702a2256
-
Filesize
215KB
MD50d1e7a90ae0df082e9da031379a4e939
SHA1db5e7d7bb6d8e2290cc7d1650030e0828d2745ba
SHA2561bd3ddf276473fb64192b735b2dc5b9b061a4717643b7ed2d49d3c77bbd4dd6d
SHA5123d303d8bfc9f428e726db281aa82ef383c6172bb5901710f8d9049cc4ed474a02b42bd747196999384a9d4e3788f49e57b18163d670c6e111264e435c84a9cdb
-
Filesize
15KB
MD5035a5066cb9371f56278eb18ad984ab1
SHA142acd17ecc8b55f0e72d4158f48f829ffb43d5e8
SHA256210e69778c43fa2126ee7b39f1feae0fe58e08ea829781872c07fcc1b39b7566
SHA512f22661577eb834e3b5954fa3420c61b52b20af0f34eb71a43ac35373ab16cc69285d2f7aa5d64f4efe293a39915a7ec3e7924115335f493910a1db867e11eeb9
-
Filesize
77KB
MD5f107a3c7371c4543bd3908ba729dd2db
SHA1af8e7e8f446de74db2f31d532e46eab8bbf41e0a
SHA25600df0901c101254525a219d93ff1830da3a20d3f14bc323354d8d5fee5854ec0
SHA512fd776f8ceaac498f4f44819794c0fa89224712a8c476819ffc76ba4c7ff4caa9b360b9d299d9df7965387e5bbcb330f316f53759b5146a73b27a5f2e964c3530