Analysis
-
max time kernel
137s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 02:00
Behavioral task
behavioral1
Sample
5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe
Resource
win7-20231129-en
General
-
Target
5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe
-
Size
1.8MB
-
MD5
e62c8dd01651b0b125bc1cf30e99cd73
-
SHA1
5b9ee6c9f8f39a110427976c313d563d6dbb61f5
-
SHA256
5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3
-
SHA512
d0bce64422386facffef52f5086ed8b380735133d8d45d7b664f50d481171c8c3b654025959963877c3d57ce5272b4542aef3f15ccbfa72681d0f8a3af3fb2d0
-
SSDEEP
24576:HfqMeY3QBhoWYJgIDWAeTkzZ+RkFN/yKBUZZAFDrrqBh3SWgSklWXKBUZq:HneXoWS5ZRN/yKiZEDrKBST1WXKiZq
Malware Config
Signatures
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral1/memory/624-0-0x0000000000400000-0x0000000000602000-memory.dmp family_blackmoon behavioral1/files/0x000a000000015626-8.dat family_blackmoon behavioral1/memory/3008-10-0x0000000000400000-0x0000000000602000-memory.dmp family_blackmoon behavioral1/memory/624-11-0x0000000000400000-0x0000000000602000-memory.dmp family_blackmoon behavioral1/memory/3008-23-0x0000000000400000-0x0000000000602000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 3008 SEMS.KNNQP -
Loads dropped DLL 4 IoCs
pid Process 624 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 624 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 3008 SEMS.KNNQP 3008 SEMS.KNNQP -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ESPI11.dll SEMS.KNNQP File opened for modification C:\Windows\SysWOW64\ESPI11.dll SEMS.KNNQP -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3008 SEMS.KNNQP 3008 SEMS.KNNQP 3008 SEMS.KNNQP 3008 SEMS.KNNQP 3008 SEMS.KNNQP 3008 SEMS.KNNQP 3008 SEMS.KNNQP 3008 SEMS.KNNQP 3008 SEMS.KNNQP 3008 SEMS.KNNQP -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 624 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 624 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 3008 SEMS.KNNQP 3008 SEMS.KNNQP -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 624 wrote to memory of 3008 624 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 28 PID 624 wrote to memory of 3008 624 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 28 PID 624 wrote to memory of 3008 624 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 28 PID 624 wrote to memory of 3008 624 5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe 28 PID 3008 wrote to memory of 1696 3008 SEMS.KNNQP 29 PID 3008 wrote to memory of 1696 3008 SEMS.KNNQP 29 PID 3008 wrote to memory of 1696 3008 SEMS.KNNQP 29 PID 3008 wrote to memory of 1696 3008 SEMS.KNNQP 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe"C:\Users\Admin\AppData\Local\Temp\5e2de89e01d48c383780e2fc5e56619b4a2cd8a91b6a9c6040d8f360bad39db3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\SEMS.KNNQP"C:\Users\Admin\AppData\Local\Temp\SEMS.KNNQP"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\netsh.exenetsh winsock reset3⤵PID:1696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5f9b33ed760c739a29128c200667046f3
SHA12dc8b5a9f27c0de23694475c132d4b6edb683973
SHA256ac5ab166239564ca429efea4f1a44a3d720c75b25c44db8efa9050cbdc8f5cc2
SHA51285e4d6a1b7d439ad90a83c94741306c08321e2ce5506335fb36cced50d7524362efc14e3fe1520f1abbe11ef2ea067d2c5d02b5cf784c44529856687bba05692
-
Filesize
120KB
MD5c3adbb35a05b44bc877a895d273aa270
SHA18afe20d8261d217fd23ccfe53bd45ad3bec82d2d
SHA256b2b2ea9737587313d420bde96a42063c002a83e35d9f987f8ec0d5d4d96c262c
SHA512614dc24e3368047d68e2833ecdf9cda1f5ef290fc74287769a70df46bfa937386ce2e1332b3bada0f7e54b470ecdfe7c8bbd4ec3fa1c815f52993bb7edb93afc