Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 04:39
Behavioral task
behavioral1
Sample
ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe
Resource
win7-20240508-en
General
-
Target
ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe
-
Size
15.4MB
-
MD5
23f87f4db9da43225c083271aefbc337
-
SHA1
95e0246ad205e61045dea39617bfca2d27f317b6
-
SHA256
ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2
-
SHA512
e4813623352478ba195590a7e9c296ead59f193523dffca8197ba77fabe676500ad85e1bd9f849a2081a8776e35733f1264628545666b877bc677d14a708aa65
-
SSDEEP
393216:UnaetWreNcKL2Drs9LiA+S3jHRNUO0GoU/WhonaC:YcreqKik9+i3jxQhU/6onB
Malware Config
Signatures
-
Detect Blackmoon payload 13 IoCs
Processes:
resource yara_rule behavioral1/memory/2896-1-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2896-2-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2896-3-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2896-8-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2896-9-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2896-10-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2764-48-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2764-45-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2764-44-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2896-43-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2764-46-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2764-77-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon behavioral1/memory/2764-78-0x0000000000400000-0x0000000000927000-memory.dmp family_blackmoon -
Processes:
resource yara_rule \ÖîÉñ´«Ëµ\19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exepid process 2764 19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe -
Loads dropped DLL 1 IoCs
Processes:
ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exepid process 2896 ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exedescription ioc process File opened (read-only) \??\L: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\M: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\V: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\Y: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\H: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\J: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\K: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\B: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\S: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\T: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\X: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\Z: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\A: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\G: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\R: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\O: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\P: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\Q: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\U: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\W: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\E: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\I: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe File opened (read-only) \??\N: ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main 19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exepid process 2896 ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe 2896 ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe 2896 ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe 2764 19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe 2764 19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe 2764 19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exedescription pid process target process PID 2896 wrote to memory of 2764 2896 ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe 19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe PID 2896 wrote to memory of 2764 2896 ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe 19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe PID 2896 wrote to memory of 2764 2896 ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe 19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe PID 2896 wrote to memory of 2764 2896 ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe 19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe"C:\Users\Admin\AppData\Local\Temp\ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\ÖîÉñ´«Ëµ\19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exeC:\ÖîÉñ´«Ëµ\19306ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IO0LJX84\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
Filesize
12B
MD52018fad0d562984421a6daedc428d0ec
SHA1f5ef2e251a75b272770ea623cdc99742a5a04a92
SHA256ae8a77c9bca81f3d2883066984a87213b97601be540cd1a7c8fcb8f9996367ad
SHA5124270f94bfa1c0a9e59395a7433614db127d2fcf110c218e8b73b95413b3df358f3a53f5115089e2135935ad3b0eeddc7dd92b649082d8408c867f0ba16c3a5be
-
Filesize
15.4MB
MD523f87f4db9da43225c083271aefbc337
SHA195e0246ad205e61045dea39617bfca2d27f317b6
SHA256ac7cdfc98a9d2ba7fa4b851727156d0aee97336867fcab4a4a00a57e398fafd2
SHA512e4813623352478ba195590a7e9c296ead59f193523dffca8197ba77fabe676500ad85e1bd9f849a2081a8776e35733f1264628545666b877bc677d14a708aa65