Analysis
-
max time kernel
144s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 13:07
Behavioral task
behavioral1
Sample
985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exe
Resource
win7-20240220-en
General
-
Target
985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exe
-
Size
826KB
-
MD5
ae66286589587bc0e384cef379d544f8
-
SHA1
565daaf19ae62495df2f2ebf76363df43fa39740
-
SHA256
985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42
-
SHA512
d748235632391480bd272f1419fce889c5d767a3f7a84fe78522d444f31857448259cd4ff690274550bab0ba5159703ecabb62e6bdf2d86a3f16be298938ed05
-
SSDEEP
12288:363wP8U1/M+r5Rdp2JX/xASW6r2mCEl8nF6z5Ky1VkPXHQdGxV/db0uwG0x8CJ5z:35idX/ximAFs5Ky1VkPXHPh0Lg3Zy
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule C:\Windows\libexdui.dll family_blackmoon behavioral2/memory/4524-9-0x0000000000400000-0x0000000000698000-memory.dmp family_blackmoon -
Loads dropped DLL 1 IoCs
Processes:
985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exepid process 4524 985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exe -
Processes:
resource yara_rule behavioral2/memory/4524-0-0x0000000000400000-0x0000000000698000-memory.dmp upx behavioral2/memory/4524-9-0x0000000000400000-0x0000000000698000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
Processes:
985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exedescription ioc process File created C:\Windows\libexdui.dll 985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exepid process 4524 985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exe 4524 985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exe 4524 985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exe"C:\Users\Admin\AppData\Local\Temp\985d288c9e372cce138acc87f7c968f449288069a691cfd29a74b26758a45f42.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4332,i,13091489124830795026,15731852258593881289,262144 --variations-seed-version --mojo-platform-channel-handle=4164 /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\libexdui.dllFilesize
660KB
MD5edb2ae3f3a41f5e9939ab13b14231049
SHA1dd72537627466033192d6ff3a7c65c515cf6df31
SHA256d470bea39a4d942afe3789a4d8d90f6152b00b5bb2cc3f1bcff013da7cbaf061
SHA51235f777e97fed4b082f64f288f0b822c7a57d09176bf5ba7bdfe2e9b2dc8444302451019e77c0b8c950c01389f56acc1216da1d88ca089694ba58103af06c2b8c
-
memory/4524-0-0x0000000000400000-0x0000000000698000-memory.dmpFilesize
2.6MB
-
memory/4524-6-0x0000000006240000-0x0000000006241000-memory.dmpFilesize
4KB
-
memory/4524-7-0x0000000003600000-0x0000000003601000-memory.dmpFilesize
4KB
-
memory/4524-8-0x0000000003660000-0x0000000003661000-memory.dmpFilesize
4KB
-
memory/4524-9-0x0000000000400000-0x0000000000698000-memory.dmpFilesize
2.6MB