Analysis
-
max time kernel
131s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 02:35
Static task
static1
Behavioral task
behavioral1
Sample
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe
Resource
win7-20240220-en
General
-
Target
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe
-
Size
10.2MB
-
MD5
4da32f1f0b1dac90157f53b293a95f08
-
SHA1
acbeb60776e715cea2e06d79d2608446919789de
-
SHA256
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba
-
SHA512
1b93e41cc5c8c8a4d02c4cea18f46f48a7c74511b69c1b2677e1e320cf6fe8ac803d3dd0654c3349ca5009b06ea0bc9fb5cd300e10981e77057ba73cb4e22c13
-
SSDEEP
196608:A8FHCu5uL1zRjyrQpcs+TYm3El87p8oF6eQoIK5CsC0H1F/oeVOX:VHn5uerQp1iEO7R6PK5CsC0z
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2584-14-0x0000000010000000-0x0000000010024000-memory.dmp family_blackmoon -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
²Ôñ·µÀ¶ÜºÏ»÷.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ²Ôñ·µÀ¶ÜºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ²Ôñ·µÀ¶ÜºÏ»÷.exe -
Executes dropped EXE 2 IoCs
Processes:
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe²Ôñ·µÀ¶ÜºÏ»÷.exepid process 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 2592 ²Ôñ·µÀ¶ÜºÏ»÷.exe -
Processes:
resource yara_rule behavioral2/memory/2584-14-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral2/memory/2584-13-0x0000000004220000-0x0000000004228000-memory.dmp upx behavioral2/memory/2584-12-0x0000000004210000-0x000000000421B000-memory.dmp upx behavioral2/memory/2584-11-0x0000000004200000-0x000000000420B000-memory.dmp upx behavioral2/memory/792-38-0x0000000003FF0000-0x0000000003FF8000-memory.dmp upx behavioral2/memory/792-37-0x0000000003F10000-0x0000000003F1B000-memory.dmp upx behavioral2/memory/792-36-0x0000000003F00000-0x0000000003F0B000-memory.dmp upx behavioral2/memory/792-42-0x0000000003FF0000-0x0000000003FF8000-memory.dmp upx F:\²Ôñ·µÀ¶ÜºÏ»÷(΢¶Ë)\²Ôñ·µÀ¶ÜºÏ»÷.exe upx behavioral2/memory/2592-54-0x0000000000400000-0x0000000001027000-memory.dmp upx behavioral2/memory/2592-55-0x0000000000400000-0x0000000001027000-memory.dmp upx behavioral2/memory/2592-57-0x0000000000400000-0x0000000001027000-memory.dmp upx -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
²Ôñ·µÀ¶ÜºÏ»÷.exe88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exedescription ioc process File opened (read-only) \??\S: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\V: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\Z: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\I: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\M: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\O: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\R: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\X: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\F: 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe File opened (read-only) \??\H: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\L: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\N: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\P: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\W: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\Y: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\E: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\G: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\J: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\K: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\Q: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\T: ²Ôñ·µÀ¶ÜºÏ»÷.exe File opened (read-only) \??\U: ²Ôñ·µÀ¶ÜºÏ»÷.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exedescription ioc process File opened for modification \??\PhysicalDrive0 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
²Ôñ·µÀ¶ÜºÏ»÷.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ²Ôñ·µÀ¶ÜºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ²Ôñ·µÀ¶ÜºÏ»÷.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
²Ôñ·µÀ¶ÜºÏ»÷.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ²Ôñ·µÀ¶ÜºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ²Ôñ·µÀ¶ÜºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName ²Ôñ·µÀ¶ÜºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ²Ôñ·µÀ¶ÜºÏ»÷.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion ²Ôñ·µÀ¶ÜºÏ»÷.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exepid process 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exedescription pid process Token: SeDebugPrivilege 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe Token: SeDebugPrivilege 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exepid process 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exepid process 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exepid process 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exedescription pid process target process PID 2584 wrote to memory of 792 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe PID 2584 wrote to memory of 792 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe PID 2584 wrote to memory of 792 2584 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe PID 792 wrote to memory of 2592 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe ²Ôñ·µÀ¶ÜºÏ»÷.exe PID 792 wrote to memory of 2592 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe ²Ôñ·µÀ¶ÜºÏ»÷.exe PID 792 wrote to memory of 2592 792 88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe ²Ôñ·µÀ¶ÜºÏ»÷.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe"C:\Users\Admin\AppData\Local\Temp\88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
F:\²Ôñ·µÀ¶ÜºÏ»÷(΢¶Ë)\88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe"F:\²Ôñ·µÀ¶ÜºÏ»÷(΢¶Ë)\88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:792 -
F:\²Ôñ·µÀ¶ÜºÏ»÷(΢¶Ë)\²Ôñ·µÀ¶ÜºÏ»÷.exe"F:\²Ôñ·µÀ¶ÜºÏ»÷(΢¶Ë)\²Ôñ·µÀ¶ÜºÏ»÷.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Enumerates system info in registry
PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\²Ôñ·µÀ¶ÜºÏ»÷(΢¶Ë)\88f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba.exeFilesize
10.2MB
MD54da32f1f0b1dac90157f53b293a95f08
SHA1acbeb60776e715cea2e06d79d2608446919789de
SHA25688f2c932b70a532e7ac7173a7ff9de11c27caaa514dc8019cb6319d0b0b88aba
SHA5121b93e41cc5c8c8a4d02c4cea18f46f48a7c74511b69c1b2677e1e320cf6fe8ac803d3dd0654c3349ca5009b06ea0bc9fb5cd300e10981e77057ba73cb4e22c13
-
F:\²Ôñ·µÀ¶ÜºÏ»÷(΢¶Ë)\²Ôñ·µÀ¶ÜºÏ»÷.exeFilesize
4.7MB
MD5f96754818d770694ce2ee5116f2540e1
SHA1831a7ae3a870b1e26b175975f7107dd2d753b79b
SHA256b2a709c49dd9221e4d78d54e369de7a8510a32cb2193c2a52e95e33cc1810c05
SHA51275f0b043835fa7f2d16113e5b5a45b113a85750197720c85768196467175c0a29d570ff884b3fd868428446743e481d8d5e01b592070435b5db548a5a6635d8a
-
memory/792-37-0x0000000003F10000-0x0000000003F1B000-memory.dmpFilesize
44KB
-
memory/792-42-0x0000000003FF0000-0x0000000003FF8000-memory.dmpFilesize
32KB
-
memory/792-63-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/792-26-0x0000000002200000-0x0000000002201000-memory.dmpFilesize
4KB
-
memory/792-27-0x0000000002260000-0x0000000002261000-memory.dmpFilesize
4KB
-
memory/792-44-0x0000000004000000-0x0000000004007000-memory.dmpFilesize
28KB
-
memory/792-41-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/792-40-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/792-36-0x0000000003F00000-0x0000000003F0B000-memory.dmpFilesize
44KB
-
memory/792-38-0x0000000003FF0000-0x0000000003FF8000-memory.dmpFilesize
32KB
-
memory/792-28-0x0000000002270000-0x0000000002271000-memory.dmpFilesize
4KB
-
memory/792-34-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/792-35-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/792-32-0x00000000025E0000-0x00000000025E1000-memory.dmpFilesize
4KB
-
memory/792-29-0x0000000002390000-0x0000000002391000-memory.dmpFilesize
4KB
-
memory/792-30-0x00000000025C0000-0x00000000025C1000-memory.dmpFilesize
4KB
-
memory/792-24-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/792-31-0x00000000025D0000-0x00000000025D1000-memory.dmpFilesize
4KB
-
memory/2584-12-0x0000000004210000-0x000000000421B000-memory.dmpFilesize
44KB
-
memory/2584-14-0x0000000010000000-0x0000000010024000-memory.dmpFilesize
144KB
-
memory/2584-17-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/2584-25-0x000000000138E000-0x00000000016A8000-memory.dmpFilesize
3.1MB
-
memory/2584-23-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/2584-2-0x0000000002690000-0x0000000002691000-memory.dmpFilesize
4KB
-
memory/2584-16-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/2584-11-0x0000000004200000-0x000000000420B000-memory.dmpFilesize
44KB
-
memory/2584-1-0x000000000138E000-0x00000000016A8000-memory.dmpFilesize
3.1MB
-
memory/2584-13-0x0000000004220000-0x0000000004228000-memory.dmpFilesize
32KB
-
memory/2584-0-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/2584-7-0x0000000003FD0000-0x0000000003FD1000-memory.dmpFilesize
4KB
-
memory/2584-9-0x0000000000400000-0x00000000020D5000-memory.dmpFilesize
28.8MB
-
memory/2584-8-0x0000000003FE0000-0x0000000003FE1000-memory.dmpFilesize
4KB
-
memory/2584-4-0x00000000027C0000-0x00000000027C1000-memory.dmpFilesize
4KB
-
memory/2584-5-0x0000000003FB0000-0x0000000003FB1000-memory.dmpFilesize
4KB
-
memory/2584-3-0x00000000027B0000-0x00000000027B1000-memory.dmpFilesize
4KB
-
memory/2584-6-0x0000000003FC0000-0x0000000003FC1000-memory.dmpFilesize
4KB
-
memory/2592-55-0x0000000000400000-0x0000000001027000-memory.dmpFilesize
12.2MB
-
memory/2592-54-0x0000000000400000-0x0000000001027000-memory.dmpFilesize
12.2MB
-
memory/2592-57-0x0000000000400000-0x0000000001027000-memory.dmpFilesize
12.2MB