Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe
Resource
win7-20240419-en
General
-
Target
26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe
-
Size
13.7MB
-
MD5
f754de0303fc8630411914324e18e268
-
SHA1
3320bcc2ca0cda7df4663023c4f8e327ef50ba0a
-
SHA256
26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7
-
SHA512
4e05a92304a0997cd3f69cd7f9dd35840ed5fadbd9314342ce4d5b6d838f6166d093fdeed6c433274f2cd234803a1354d4710bc8a16d4e05536671232d1d8538
-
SSDEEP
393216:iO4kpD4W2odC5v3LhAvxrnQMrvqQaHfo8VEbE40Fmy5ST:14kpDf2R5v3LaVQayo8VEEDA
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/656-14-0x0000000000400000-0x00000000009FA000-memory.dmp family_blackmoon behavioral2/memory/4896-46-0x0000000000400000-0x00000000009FA000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
Processes:
3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exepid process 4896 3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exedescription ioc process File opened (read-only) \??\I: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\K: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\N: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\R: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\W: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\Y: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\E: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\L: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\M: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\P: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\T: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\U: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\X: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\Z: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\H: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\G: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\J: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\Q: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\S: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\B: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\O: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\V: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe File opened (read-only) \??\A: 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exepid process 656 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe 656 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe 656 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe 4896 3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe 4896 3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe 4896 3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exedescription pid process target process PID 656 wrote to memory of 4896 656 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe 3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe PID 656 wrote to memory of 4896 656 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe 3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe PID 656 wrote to memory of 4896 656 26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe 3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe"C:\Users\Admin\AppData\Local\Temp\26f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\9SFÔÉñÊÀ½ç\3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exeC:\9SFÔÉñÊÀ½ç\3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\9SFÔÉñÊÀ½ç\3934026f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7.exeFilesize
13.7MB
MD5f754de0303fc8630411914324e18e268
SHA13320bcc2ca0cda7df4663023c4f8e327ef50ba0a
SHA25626f4213caab3e93c2d50fccc6716df2fb4e0bed666c37e2ec8142d6c176ba7d7
SHA5124e05a92304a0997cd3f69cd7f9dd35840ed5fadbd9314342ce4d5b6d838f6166d093fdeed6c433274f2cd234803a1354d4710bc8a16d4e05536671232d1d8538
-
C:\Users\Admin\AppData\Local\Temp\ce4c9e1dbc907e4f4ae843367ca5a46e.txtFilesize
15B
MD518c4ac2680305c3363812424f6e2ed39
SHA1f332b41f5aaba3eb5061648d2ccfc768250b7a2f
SHA2562f47ee82967feb1107747eb74e0a8937421974be0108ea03987c438cf963ee4f
SHA512158d2383ca3cc34b4b3251201f5030b2dfd1c7244d89bd877d627dc4804e716e8ccc015febdf13e1f595ac8b0da5a2c3cbb18bf11c7bd40c8f388b17e4b70055
-
memory/656-14-0x0000000000400000-0x00000000009FA000-memory.dmpFilesize
6.0MB
-
memory/656-6-0x0000000003F60000-0x0000000003F61000-memory.dmpFilesize
4KB
-
memory/656-5-0x00000000040C0000-0x00000000040C1000-memory.dmpFilesize
4KB
-
memory/656-7-0x00000000040D0000-0x00000000040D1000-memory.dmpFilesize
4KB
-
memory/656-1-0x0000000000B20000-0x0000000000B23000-memory.dmpFilesize
12KB
-
memory/656-15-0x0000000000B20000-0x0000000000B23000-memory.dmpFilesize
12KB
-
memory/656-0-0x0000000000400000-0x00000000009FA000-memory.dmpFilesize
6.0MB
-
memory/4896-17-0x0000000000B20000-0x0000000000B23000-memory.dmpFilesize
12KB
-
memory/4896-16-0x0000000000400000-0x00000000009FA000-memory.dmpFilesize
6.0MB
-
memory/4896-46-0x0000000000400000-0x00000000009FA000-memory.dmpFilesize
6.0MB
-
memory/4896-48-0x0000000000B20000-0x0000000000B23000-memory.dmpFilesize
12KB