Analysis
-
max time kernel
142s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 10:37
Behavioral task
behavioral1
Sample
479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe
Resource
win7-20240221-en
General
-
Target
479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe
-
Size
14.7MB
-
MD5
5c6fb210d8da691453b79456b560ae90
-
SHA1
35b5b71cf2fc3293b5cce909b66fb77fa0526f7e
-
SHA256
479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da
-
SHA512
aad43980acb0ac3311301b5e7a9df6ccb09a0ebbbd3086730070480aabe7653dccd551cd5a11bd9e1d22dfefc0d789c74457c9233a44ebab928ed59cbb878f46
-
SSDEEP
393216:gPDP+pGNvLi8oIf73hW3qy/P3i6i84IH7kEjqpYFCC2:Y2pGl6If7RlEjJ4mwEjEUk
Malware Config
Signatures
-
Detect Blackmoon payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1052-1-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/1052-3-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/1052-2-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/1052-17-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/1048-21-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/1048-19-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/1048-20-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/1048-50-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon -
Processes:
resource yara_rule C:\¹Å½£×¨Êô[VDY]\36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exepid process 1048 36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exedescription ioc process File opened (read-only) \??\Y: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\B: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\G: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\O: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\Q: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\R: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\U: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\Z: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\E: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\K: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\M: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\N: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\S: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\W: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\A: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\H: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\I: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\J: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\L: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\T: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\P: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\V: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe File opened (read-only) \??\X: 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exepid process 1052 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe 1052 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe 1052 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe 1048 36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe 1048 36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe 1048 36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exedescription pid process target process PID 1052 wrote to memory of 1048 1052 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe 36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe PID 1052 wrote to memory of 1048 1052 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe 36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe PID 1052 wrote to memory of 1048 1052 479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe 36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe"C:\Users\Admin\AppData\Local\Temp\479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\¹Å½£×¨Êô[VDY]\36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exeC:\¹Å½£×¨Êô[VDY]\36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1699784ed9adee5113cb924e977ef1c2.txtFilesize
17B
MD57acec360264d8b72b4fd728179d5cf66
SHA1ab03e43c8fb570895da41ad5c68a1850d88175a9
SHA256f971f123ae58b2d69e285ec53a61ad870df4e49b16758e700d8a101170c0a0a3
SHA512eaee6c419d19827929af059fc7863b9557c9e0d79730ae99cdf6cdd6906f5789521b8792d21242d6e170649ba897ab248ef0b89ad718aa6e6186b6892443be01
-
C:\¹Å½£×¨Êô[VDY]\36441479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da.exeFilesize
14.7MB
MD55c6fb210d8da691453b79456b560ae90
SHA135b5b71cf2fc3293b5cce909b66fb77fa0526f7e
SHA256479a8e3fe4fe0d22c6fe2527ba47de243ea749d542f274a07a207714781331da
SHA512aad43980acb0ac3311301b5e7a9df6ccb09a0ebbbd3086730070480aabe7653dccd551cd5a11bd9e1d22dfefc0d789c74457c9233a44ebab928ed59cbb878f46
-
memory/1048-50-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/1048-20-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/1048-19-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/1048-21-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/1048-18-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/1052-2-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/1052-17-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/1052-7-0x0000000003F90000-0x0000000003F91000-memory.dmpFilesize
4KB
-
memory/1052-8-0x0000000003B20000-0x0000000003B21000-memory.dmpFilesize
4KB
-
memory/1052-9-0x0000000003FA0000-0x0000000003FA1000-memory.dmpFilesize
4KB
-
memory/1052-0-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/1052-3-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB
-
memory/1052-1-0x0000000000400000-0x0000000000926000-memory.dmpFilesize
5.1MB