Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 01:21
Behavioral task
behavioral1
Sample
2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67.exe
Resource
win7-20240221-en
General
-
Target
2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67.exe
-
Size
113KB
-
MD5
7f1724a7f154d9be81887ef065dce1b1
-
SHA1
0a060d513d209075c4d914b94ef1bbe6285b995d
-
SHA256
2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67
-
SHA512
ff170925ff666c5558d4619c4ee133ec4a5ac5b2b23c188f280fea9b8d32bf7e81f584a5a445226e7ccdc62f7cd0fbb406a711173b0b48d7ef5a35de15350a46
-
SSDEEP
1536:bViMsvI+AQX1OdBaKpVllHG/fdt+fV3JbB5OPnDE5+QDJ4rX27qTrf:bav9OdPx8wJ4rm7qn
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000122fa-1.dat family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 2132 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2212 2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67.exe 2212 2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2132 2212 2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67.exe 28 PID 2212 wrote to memory of 2132 2212 2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67.exe 28 PID 2212 wrote to memory of 2132 2212 2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67.exe 28 PID 2212 wrote to memory of 2132 2212 2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67.exe"C:\Users\Admin\AppData\Local\Temp\2a94bef55dd9fa7692bb27739a510e434c8a87d4c0661c8a70854bacdcf4ea67.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Windows\system32\svhost.exe -k RPC2⤵
- Executes dropped EXE
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5a31557fe968d2762b715ba204f748a2a
SHA1e9cfe2011cf6f454e05b07eda648d62af35ad173
SHA2568085f108970ed0120c23e425d383f11e4ab9e549ae212ac7046d653d175b671c
SHA512cff2212c3f75d73aab32cbcb61923294f6fd934d19142f507d244cd94e2bfc21d73c88ff102824e44714d4417c0dce79ac9d48a8d8524acbe92a231494647b4e
-
Filesize
113KB
MD5dc420d7ce75bac9e2ad9d6e4e8342d47
SHA1632ed27a136fd9d32eafa435fd1cc73df60e778a
SHA256faaec52d558ce8bb7b12bd890957fc8ad8751c7b0a77e52b81e02475b160b55e
SHA512180762a10f677573ac60049d0624b2f59dfec2bc6686075330796450f29ae3f4fe363df30c628fdfee900bbc1cfc348e01d6498556ff79dcaaa4cfd4b843dedb