Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 11:33
Static task
static1
Behavioral task
behavioral1
Sample
60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe
Resource
win10v2004-20240226-en
General
-
Target
60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe
-
Size
4.7MB
-
MD5
e8d2018514da477fc1c3e218a24125d6
-
SHA1
6d7cfc49bb0929c2eb0f4028fe97983b876516cc
-
SHA256
60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b
-
SHA512
98446881984402431b960ae7bd4faa1c420b5e2c0ebca2bb1bba01e070fc314884ce97b690f7211da76b3baabb17c1a4e773c63168bc97fbe38339babc68f303
-
SSDEEP
98304:ABTTPtxvAOlouIZdRytp5UJ8rA9s9o36B:rHm2J8rACn
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule C:\ProgramData\cande\{xpo2ctL7ppp3b}\winfsp-x86.dll family_blackmoon -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
DgjOsDW383p.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run DgjOsDW383p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DgjOsDW383p = "C:\\ProgramData\\cande\\{xpo2ctL7ppp3b}\\DgjOsDW383p.exe" DgjOsDW383p.exe -
Executes dropped EXE 1 IoCs
Processes:
DgjOsDW383p.exepid process 2748 DgjOsDW383p.exe -
Loads dropped DLL 2 IoCs
Processes:
60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exeDgjOsDW383p.exepid process 1516 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe 2748 DgjOsDW383p.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DgjOsDW383p.exepid process 2748 DgjOsDW383p.exe 2748 DgjOsDW383p.exe 2748 DgjOsDW383p.exe 2748 DgjOsDW383p.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
DgjOsDW383p.exedescription pid process Token: SeDebugPrivilege 2748 DgjOsDW383p.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
DgjOsDW383p.exepid process 2748 DgjOsDW383p.exe 2748 DgjOsDW383p.exe 2748 DgjOsDW383p.exe 2748 DgjOsDW383p.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exedescription pid process target process PID 2896 wrote to memory of 1516 2896 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe PID 2896 wrote to memory of 1516 2896 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe PID 2896 wrote to memory of 1516 2896 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe PID 2896 wrote to memory of 1516 2896 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe PID 1516 wrote to memory of 2748 1516 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe DgjOsDW383p.exe PID 1516 wrote to memory of 2748 1516 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe DgjOsDW383p.exe PID 1516 wrote to memory of 2748 1516 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe DgjOsDW383p.exe PID 1516 wrote to memory of 2748 1516 60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe DgjOsDW383p.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe"C:\Users\Admin\AppData\Local\Temp\60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exeC:\Users\Admin\AppData\Local\Temp\60f853180a79a596f490b01c554832dac7f2e469a94d8a213b1e5452c1e49d5b.exe 46053F055905550577056A05620577056405680541056405710564055905660564056B056105600559057E057D0575056A05370566057105490532057505750575053605670578055905410562056F054A0576054105520536053D0536057505--3652⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\ProgramData\cande\{xpo2ctL7ppp3b}\DgjOsDW383p.exe"C:\ProgramData\cande\{xpo2ctL7ppp3b}\DgjOsDW383p.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369B
MD54bd2afe90974a48e19b9916c7b10ef08
SHA18ffbec325a46696244f42fb13565a894bcfe3f00
SHA256af0b941914e0a9d7a65f049e9e7468dfd63e8afb465dc8849e9c56e985172ee7
SHA51259517e502f146c705cff4810ba1a2e07c37dffdf7f20352a8c8dae671333e45697387f24563553fb6d872d7396bbcf5c791c07a956caa23783721deeddaffe73
-
Filesize
3.3MB
MD5e705514b37a15fe778a12406ea309f0c
SHA1b517800efdfb174aa9ad14632e330a8043bd94e4
SHA256b00df8776e786fdb006f315bfe68c404d76758582eae0f92c6398e109cfee036
SHA51205ed9c0be82729c4219b83facb42dba6029aaff5545a1883cbcddb673ff0297b9abc69da6161b985545b7a24b9a022fe69ca506f96dc2524046dcb71ff611667
-
Filesize
41KB
MD590f1cbf523b201c20adf2e6cb5a91e2d
SHA1e485907216de02d71a127623d6d8b155fa25aafa
SHA25684ef8cba9b668bf3c2f47cfe2efc6fb4821fada314959a36419443efe41967d2
SHA5126d121b48dba3a48d7dceb0baad629b7ad195b7f47d267f8f3295cead8940836ced45abac716fd54504b603ad9d3eb57ffd2a36f2c3e183d65df051ceba694521