Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 02:29
Behavioral task
behavioral1
Sample
b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe
Resource
win7-20240508-en
General
-
Target
b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe
-
Size
14.8MB
-
MD5
b7e42c5d729af5810c633e4687bc4a2b
-
SHA1
810cd73f1db3f513df31640823baa004a8f1cf00
-
SHA256
b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988
-
SHA512
1597e958573f664b93bcfc6583c70f16bb7f388a4f8d7840daaa6c537658ec9b44c52066bb84e003f105a9063836afccdbab2bcbc3afda96e6d906a51b190f87
-
SSDEEP
393216:gPDPJepGNvUodC5g3LhAvxw5r/6Wv3bDj3dq:YBepGuR5g3LaarPLdq
Malware Config
Signatures
-
Detect Blackmoon payload 13 IoCs
Processes:
resource yara_rule behavioral1/memory/2840-3-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2840-2-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2840-1-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2840-8-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2840-10-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2840-11-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2840-9-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2840-37-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2796-41-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2796-39-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2796-40-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2796-68-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral1/memory/2796-69-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon -
Processes:
resource yara_rule \9SFÀ×öªÍò¾û\25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exepid process 2796 25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe -
Loads dropped DLL 1 IoCs
Processes:
b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exepid process 2840 b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exedescription ioc process File opened (read-only) \??\I: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\P: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\R: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\X: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\E: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\W: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\L: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\K: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\N: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\O: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\Q: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\S: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\U: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\Z: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\A: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\G: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\H: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\J: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\M: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\T: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\V: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\Y: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe File opened (read-only) \??\B: b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main 25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exepid process 2840 b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe 2840 b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe 2840 b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe 2796 25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe 2796 25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe 2796 25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exedescription pid process target process PID 2840 wrote to memory of 2796 2840 b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe 25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe PID 2840 wrote to memory of 2796 2840 b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe 25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe PID 2840 wrote to memory of 2796 2840 b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe 25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe PID 2840 wrote to memory of 2796 2840 b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe 25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe"C:\Users\Admin\AppData\Local\Temp\b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\9SFÀ×öªÍò¾û\25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exeC:\9SFÀ×öªÍò¾û\25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NVDR4C1U\errorPageStrings[1]Filesize
2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Temp\0c039c99da555107bb9419756c9e4450.txtFilesize
15B
MD5497bf022493f3514f261b6ca92377c76
SHA191c1ca15bfbef475dd62cd8a89dae3c1dd5855ea
SHA2569ae34ca360510d594d068b6eaf432159cc5902c65105ada3ba6f03bdff1b0714
SHA51243bfe70d6407962e0d9e017942ceab9dcf8925273713e17ef88acd8edd6f2a56741201cd7bfa8aa55c0f0aac488b6d5e57820b05923145ba03f149c2817e8419
-
\9SFÀ×öªÍò¾û\25880b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988.exeFilesize
14.8MB
MD5b7e42c5d729af5810c633e4687bc4a2b
SHA1810cd73f1db3f513df31640823baa004a8f1cf00
SHA256b5338a51cf4a0fc419e21ce160bfc810135c7c25fc034585c73bd380eaef0988
SHA5121597e958573f664b93bcfc6583c70f16bb7f388a4f8d7840daaa6c537658ec9b44c52066bb84e003f105a9063836afccdbab2bcbc3afda96e6d906a51b190f87
-
memory/2796-69-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2796-68-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2796-40-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2796-39-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2796-41-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2796-38-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2840-7-0x000000000091E000-0x000000000091F000-memory.dmpFilesize
4KB
-
memory/2840-37-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2840-9-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2840-11-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2840-10-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2840-8-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2840-0-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2840-1-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2840-2-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/2840-3-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB