Analysis
-
max time kernel
90s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 16:53
Behavioral task
behavioral1
Sample
8fabbda1d779a34f2dcdd6bc6e8d4874.exe
Resource
win7-20231215-en
General
-
Target
8fabbda1d779a34f2dcdd6bc6e8d4874.exe
-
Size
247KB
-
MD5
8fabbda1d779a34f2dcdd6bc6e8d4874
-
SHA1
6fcceac353b07564108c6e2e7b8415c12bbc8773
-
SHA256
185487a76e98e7ba79f8b7e59ab55b78a02038f9487542a545c31d7b017c028a
-
SHA512
c7a3a2f713553c14c4d1ce2844828e4e46236b75e4f8082da085476a9d2104acff3369e3dc7ff9d7c1f272828763016a5f6e8924d06edfb9a21dc7729410646b
-
SSDEEP
6144:ubDkES+ZLIbb9Bq3mGrvQSud3Sx4RGQOWalAUXnDjmUf:2DkES+CGmGre3SaRDOWalAU3/x
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023210-6.dat family_blackmoon behavioral2/files/0x000600000002321f-26.dat family_blackmoon behavioral2/files/0x0007000000023213-38.dat family_blackmoon behavioral2/memory/2936-53-0x0000000000400000-0x00000000004D7000-memory.dmp family_blackmoon -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2936-53-0x0000000000400000-0x00000000004D7000-memory.dmp family_gh0strat -
Registers new Print Monitor 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\RunDllExe 8fabbda1d779a34f2dcdd6bc6e8d4874.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\RunDllExe\Driver = "C:\\Windows\\Logs\\RunDllExe.dll" 8fabbda1d779a34f2dcdd6bc6e8d4874.exe -
Executes dropped EXE 3 IoCs
pid Process 2076 Process not Found 4720 RunDllExe.exe 3612 RunDllExe.exe -
resource yara_rule behavioral2/memory/2936-0-0x0000000000400000-0x00000000004D7000-memory.dmp upx behavioral2/memory/2936-53-0x0000000000400000-0x00000000004D7000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\Logs\RunDllExe.dll RunDllExe.exe File opened for modification C:\Windows\Logs\RunDllExe.dll RunDllExe.exe File created C:\Windows\Logs\RunDllExe_New.dll RunDllExe.exe File created C:\Windows\Logs\RunDllExe 8fabbda1d779a34f2dcdd6bc6e8d4874.exe File created C:\Windows\Logs\RunDllExe.dll 8fabbda1d779a34f2dcdd6bc6e8d4874.exe File created C:\Windows\MpMgSvc.dll 8fabbda1d779a34f2dcdd6bc6e8d4874.exe File created C:\Windows\Logs\RunDllExe_New RunDllExe.exe File opened for modification C:\Windows\Logs\RunDllExe RunDllExe.exe File created C:\Windows\Logs\RunDllExe_New.dll RunDllExe.exe File created C:\Windows\Logs\RunDllExe_New RunDllExe.exe File created C:\Windows\Logs\RunDllExe.exe 8fabbda1d779a34f2dcdd6bc6e8d4874.exe File opened for modification C:\Windows\Logs\RunDllExe RunDllExe.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2936 8fabbda1d779a34f2dcdd6bc6e8d4874.exe 4720 RunDllExe.exe 3612 RunDllExe.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4720 wrote to memory of 1524 4720 RunDllExe.exe 91 PID 4720 wrote to memory of 1524 4720 RunDllExe.exe 91 PID 4720 wrote to memory of 1524 4720 RunDllExe.exe 91 PID 3612 wrote to memory of 4664 3612 RunDllExe.exe 92 PID 3612 wrote to memory of 4664 3612 RunDllExe.exe 92 PID 3612 wrote to memory of 4664 3612 RunDllExe.exe 92 PID 2936 wrote to memory of 1904 2936 8fabbda1d779a34f2dcdd6bc6e8d4874.exe 94 PID 2936 wrote to memory of 1904 2936 8fabbda1d779a34f2dcdd6bc6e8d4874.exe 94 PID 2936 wrote to memory of 1904 2936 8fabbda1d779a34f2dcdd6bc6e8d4874.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fabbda1d779a34f2dcdd6bc6e8d4874.exe"C:\Users\Admin\AppData\Local\Temp\8fabbda1d779a34f2dcdd6bc6e8d4874.exe"1⤵
- Registers new Print Monitor
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\8fabbda1d779a34f2dcdd6bc6e8d4874.exe"2⤵PID:1904
-
-
C:\Windows\Logs\RunDllExe.exeC:\Windows\Logs\RunDllExe.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1524
-
-
C:\Windows\Logs\RunDllExe.exeC:\Windows\Logs\RunDllExe.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD540667dbcb5782efe26350cfbec600aa2
SHA13a1d5d248b9df9a0a110a9c06e8933126286d400
SHA256d0a54429b15c39fdae2e976957a98ac8acb6f6312f300a51374556409accca17
SHA5129116de669d7ba30d301e49c37142d1f483beccc97bfc0c9e7c72d050c872b54a792d683e22c2b2755202c6f7a37367fc99eaff983e9016081b214a0d75a8fc86
-
Filesize
89KB
MD5b2097b2e2c2b1afad072533f0e210862
SHA14009fc7efac9a637fb80aa0033b9d2301ffcfb9a
SHA2561e1903a7a4373eb80d58537036ef80d04fd32934b6269d4b80c5004fe99d0c14
SHA5123603858c6a7880c5d84cb742767461b916960b53403650694f59859c79e447199d769898a72b0e76bd5726b74b992d1b185ae7ee0ff8f115733847b783ec3307
-
Filesize
89KB
MD5c02d9300deea8aaa42bf5e9c56ddcf29
SHA14c547bab0a92ba6fe77a8bfcef56faf5f1a0ad89
SHA25654dd6ca2fab1eab858fa8d06fa095a943d6d1ff601c71a4c6af5e9061019f9d5
SHA512c2537d3bf63bf67ac0e844fc65285bcd444896201fd14add9bef7bab054eb93269248ecfa752268e3f692bb8ea3bc8d861e40f4ba5f63b5428f8f75a204315e1
-
Filesize
160KB
MD5645564cf1c80e047a6e90ac0f2d6a6b7
SHA135e4b5e065b90fe5b1713e5a4645875f023b6a18
SHA2566f3a1b04d5398967356e42fb0245e26fb2d15c5e03db2650e225c6fbe9f6cef9
SHA512e4ce9ad7f83c84932b30641937c1b9fc9c2dbb647fa05743f8ec5f01b66a7813441b410166e181b432fc2ca47c7edbb94000bd4d389c53961c2a100f319a0c21
-
Filesize
160KB
MD55b9da57ccd306eb1774e3d4fe09454e5
SHA17a87fb2451b5caaa0fbdd49b6f93f39729b38823
SHA256be0c9df3ddd7658f577a4cb25fd8c403c8570c1ef1af4a3940c8c591e30b5c2d
SHA512737574f99f357f5da5c77bbcf326dd35fb431132e75eb1859d1842412b429beddceaed6f4c544d97867e0cad6e471243db98e29444e782c72c37c2197a63da92
-
Filesize
89KB
MD59dc2bf9e4b797e874a1e837d39d84b89
SHA1cfd56ee2be017d4d98314d21834d0007750009ec
SHA2568a796510d161365eeb854c3f38a2b4af6e536479fd9422cde5c1b0455f35e03c
SHA512391826722daed00de5564e5a9dbebf75f33a7bb7b8af12edfff17575a9042e241eda133935030500e807a362f84cf423bbf9bdcc7f652fe66ed5627bf9fd8a74