Analysis
-
max time kernel
142s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:35
Static task
static1
Behavioral task
behavioral1
Sample
af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe
Resource
win7-20240221-en
General
-
Target
af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe
-
Size
15.9MB
-
MD5
d654e7e7e0cc5eb6c947226d9db97f44
-
SHA1
77c9a230a34c0c623882ae73e8e5860aa48c7dba
-
SHA256
af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415
-
SHA512
cacf217c24f47defd6f8d8a0cb39ae53446c9253b0ac77f93ffc648beaafc6d4104ab347f6c54172feec6b710dd3c452f739659414b468d54476d3be29c0c422
-
SSDEEP
393216:iOfkbacqN0WPLWTrPPi/wjYF4DpX/cUJ3r4FP:1fiqhaXP8aYFYp0W0t
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1908-17-0x0000000000400000-0x00000000009FA000-memory.dmp family_blackmoon behavioral2/memory/2112-47-0x0000000000400000-0x00000000009FA000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
Processes:
30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exepid process 2112 30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exedescription ioc process File opened (read-only) \??\I: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\K: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\M: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\O: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\X: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\A: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\V: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\Y: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\P: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\G: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\H: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\J: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\L: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\Q: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\S: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\T: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\E: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\W: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\N: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\R: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\U: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\Z: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe File opened (read-only) \??\B: af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exepid process 1908 af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe 1908 af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe 1908 af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe 2112 30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe 2112 30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe 2112 30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exedescription pid process target process PID 1908 wrote to memory of 2112 1908 af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe 30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe PID 1908 wrote to memory of 2112 1908 af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe 30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe PID 1908 wrote to memory of 2112 1908 af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe 30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe"C:\Users\Admin\AppData\Local\Temp\af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\¡¶ÂåÑþרÊô¡·\30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exeC:\¡¶ÂåÑþרÊô¡·\30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\864369dde4e7c2fc9ed08c0ff162768a.txtFilesize
16B
MD5367128b34d713ace2ec909a731cb1861
SHA124c978593959b7c7ee45c40a5c1ac8dce3417374
SHA256f0e67d2b451e7f95889cfd73d1fc76e6cc1011eb62049550fb480ff4d168d7fa
SHA512a2ae80381ed539dbcc79b1f577ea0bcab7d0387759b026f0cc0327594a1f8d61475948fc1f4e0d8e9e075a20b86241f1c34f9c89f91fc2b380cbc82ada5b473a
-
C:\¡¶ÂåÑþרÊô¡·\30165af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415.exeFilesize
15.9MB
MD5d654e7e7e0cc5eb6c947226d9db97f44
SHA177c9a230a34c0c623882ae73e8e5860aa48c7dba
SHA256af2d10183adf141618f88f8f7a046b1b1a7f1aa53b3e93515360cf24ad233415
SHA512cacf217c24f47defd6f8d8a0cb39ae53446c9253b0ac77f93ffc648beaafc6d4104ab347f6c54172feec6b710dd3c452f739659414b468d54476d3be29c0c422
-
memory/1908-16-0x0000000000C70000-0x0000000000C73000-memory.dmpFilesize
12KB
-
memory/1908-6-0x0000000003C30000-0x0000000003C31000-memory.dmpFilesize
4KB
-
memory/1908-5-0x0000000003D70000-0x0000000003D71000-memory.dmpFilesize
4KB
-
memory/1908-7-0x0000000003D80000-0x0000000003D81000-memory.dmpFilesize
4KB
-
memory/1908-1-0x0000000000C70000-0x0000000000C73000-memory.dmpFilesize
12KB
-
memory/1908-17-0x0000000000400000-0x00000000009FA000-memory.dmpFilesize
6.0MB
-
memory/1908-0-0x0000000000400000-0x00000000009FA000-memory.dmpFilesize
6.0MB
-
memory/2112-18-0x0000000000B30000-0x0000000000B33000-memory.dmpFilesize
12KB
-
memory/2112-13-0x0000000000400000-0x00000000009FA000-memory.dmpFilesize
6.0MB
-
memory/2112-47-0x0000000000400000-0x00000000009FA000-memory.dmpFilesize
6.0MB
-
memory/2112-49-0x0000000000B30000-0x0000000000B33000-memory.dmpFilesize
12KB