Analysis
-
max time kernel
187s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 16:31
Behavioral task
behavioral1
Sample
1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe
-
Size
4.3MB
-
MD5
a900f8aaed039d568de5049cdbdf5323
-
SHA1
9574d69c3460c3619dd1123cb2d8572263275c72
-
SHA256
1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928
-
SHA512
0c538ee5f61d39a129ec772011cd773a43696ef61706dbd054fedc9c028769abef79029620bcf945337e366d15fbd273e5a56e614d282cf3917df20ae91db0d0
-
SSDEEP
49152:qDj7mIDaT72MPRd8mWo+QRin27xZu2XHf27ayr/AEulITRvXm6ybJB4GGC9z:vQa/hfWodooi2X/27aclX9T27Gw
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
resource yara_rule behavioral2/memory/2896-0-0x0000000000400000-0x00000000008CB000-memory.dmp family_blackmoon behavioral2/memory/2896-6-0x0000000000400000-0x00000000008CB000-memory.dmp family_blackmoon -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4680 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 97 PID 2896 wrote to memory of 4680 2896 1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe"C:\Users\Admin\AppData\Local\Temp\1f31778c43dcaced5d234bad95c30724a095ded3dd834762427b4070e572b928.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http:///2⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3680,i,107393453197044369,3794435770200482906,262144 --variations-seed-version --mojo-platform-channel-handle=5792 /prefetch:81⤵PID:3604
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=4256,i,107393453197044369,3794435770200482906,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:81⤵PID:680