Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 22:07
Behavioral task
behavioral1
Sample
60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe
Resource
win7-20231129-en
General
-
Target
60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe
-
Size
15.4MB
-
MD5
6c383722ad1c17ca56ec68423b58164f
-
SHA1
770a9217fd95d2fb5346f46d114ba9bf7dc75cb3
-
SHA256
60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901
-
SHA512
0e3f9afc8d9983816d56bb93cb1a03c024e83aa3ead68d6611867570bdd127d4c2ac2b8c00c1d29332004de15098dee4ea1cae7c6202cf2c17d595b419b4296e
-
SSDEEP
393216:gPDPKFpGNvnodC5/3LhAvxvkKL0+8zFf32YJzW1aJ:YSFpGZR5/3LaVkoYh2YJW10
Malware Config
Signatures
-
Detect Blackmoon payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/2684-2-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/2684-1-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/2684-3-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/2548-19-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/2548-18-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/2684-17-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/2548-20-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/2548-49-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon -
Processes:
resource yara_rule C:\9SFÍò½çħÖ÷\3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exepid process 2548 3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exedescription ioc process File opened (read-only) \??\G: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\H: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\L: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\R: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\M: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\P: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\Y: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\A: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\T: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\Z: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\B: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\E: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\I: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\J: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\K: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\N: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\O: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\Q: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\S: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\U: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\V: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\W: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe File opened (read-only) \??\X: 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exepid process 2684 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe 2684 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe 2684 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe 2548 3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe 2548 3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe 2548 3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exedescription pid process target process PID 2684 wrote to memory of 2548 2684 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe 3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe PID 2684 wrote to memory of 2548 2684 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe 3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe PID 2684 wrote to memory of 2548 2684 60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe 3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe"C:\Users\Admin\AppData\Local\Temp\60afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\9SFÍò½çħÖ÷\3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exeC:\9SFÍò½çħÖ÷\3367460afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.4MB
MD56c383722ad1c17ca56ec68423b58164f
SHA1770a9217fd95d2fb5346f46d114ba9bf7dc75cb3
SHA25660afa1da090d4ae091c03c92cae5e2f59753bd3236968bccc7998efd1f651901
SHA5120e3f9afc8d9983816d56bb93cb1a03c024e83aa3ead68d6611867570bdd127d4c2ac2b8c00c1d29332004de15098dee4ea1cae7c6202cf2c17d595b419b4296e
-
Filesize
15B
MD5bc39f4faa60ec6b3a3fc283a05984747
SHA1c5c8d1faabdc13e1f7db6399d36ec9cf48ccd45a
SHA256e7acdccd5bc382a74ea1b9a5da5a4b76cc268df250d27f29b5967c0dbbccc4ca
SHA512100af08b64c2aa1b2021be03707a8d4e1f462a39b8b31da38c860f9d5e513f5ee43535b5425d2e2070ff2df52d61515166f58ce97b0ecb56aad4a8cc5e58b343