Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 07:31
Static task
static1
Behavioral task
behavioral1
Sample
068fb7605542cd8350ed34ec2d767856.exe
Resource
win7-20240221-en
General
-
Target
068fb7605542cd8350ed34ec2d767856.exe
-
Size
3.8MB
-
MD5
068fb7605542cd8350ed34ec2d767856
-
SHA1
0c3edb958e306394cd1203e731dc781155ab2e70
-
SHA256
977e96e9ae5faa6f44902dadddec67871aede5d7edef4e4be60b70146269b23d
-
SHA512
70328066f04c2a5250de300e8ca4445cee381c13e417f2516fc3dc739b56808971ef622afb962fbefc19689e079b78080065c653aaf28c1cbb0e5f398380f29d
-
SSDEEP
98304:ykLI1vX2oBOOsQ0UfDZ5IyvJZxeaxt29s4C1eH94:dI1vnyUfDZ5nhZvxt5o94
Malware Config
Signatures
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/3528-88-0x00000000028E0000-0x00000000029CC000-memory.dmp family_blackmoon behavioral2/memory/3528-86-0x00000000028E0000-0x00000000029CC000-memory.dmp family_blackmoon behavioral2/memory/3528-134-0x00000000028E0000-0x00000000029CC000-memory.dmp family_blackmoon behavioral2/memory/3528-136-0x00000000028E0000-0x00000000029CC000-memory.dmp family_blackmoon -
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3528-120-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat behavioral2/memory/3528-121-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat behavioral2/memory/3528-119-0x0000000010001000-0x000000001000F000-memory.dmp family_gh0strat behavioral2/memory/3528-133-0x0000000010000000-0x0000000010003000-memory.dmp family_gh0strat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 068fb7605542cd8350ed34ec2d767856.tmp Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation isnnf.exe -
Executes dropped EXE 2 IoCs
pid Process 4796 068fb7605542cd8350ed34ec2d767856.tmp 3528 isnnf.exe -
Loads dropped DLL 1 IoCs
pid Process 3528 isnnf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qdatem = "C:\\Users\\Public\\89471853\\Applicationgmxfu.exe" isnnf.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: isnnf.exe File opened (read-only) \??\Y: isnnf.exe File opened (read-only) \??\Q: isnnf.exe File opened (read-only) \??\V: isnnf.exe File opened (read-only) \??\X: isnnf.exe File opened (read-only) \??\B: isnnf.exe File opened (read-only) \??\E: isnnf.exe File opened (read-only) \??\M: isnnf.exe File opened (read-only) \??\O: isnnf.exe File opened (read-only) \??\P: isnnf.exe File opened (read-only) \??\Z: isnnf.exe File opened (read-only) \??\K: isnnf.exe File opened (read-only) \??\N: isnnf.exe File opened (read-only) \??\R: isnnf.exe File opened (read-only) \??\S: isnnf.exe File opened (read-only) \??\G: isnnf.exe File opened (read-only) \??\H: isnnf.exe File opened (read-only) \??\I: isnnf.exe File opened (read-only) \??\J: isnnf.exe File opened (read-only) \??\T: isnnf.exe File opened (read-only) \??\U: isnnf.exe File opened (read-only) \??\W: isnnf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 isnnf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz isnnf.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings isnnf.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 940 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4796 068fb7605542cd8350ed34ec2d767856.tmp 4796 068fb7605542cd8350ed34ec2d767856.tmp 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3528 isnnf.exe Token: SeIncBasePriorityPrivilege 3528 isnnf.exe Token: 33 3528 isnnf.exe Token: SeIncBasePriorityPrivilege 3528 isnnf.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4796 068fb7605542cd8350ed34ec2d767856.tmp -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe 3528 isnnf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 232 wrote to memory of 4796 232 068fb7605542cd8350ed34ec2d767856.exe 83 PID 232 wrote to memory of 4796 232 068fb7605542cd8350ed34ec2d767856.exe 83 PID 232 wrote to memory of 4796 232 068fb7605542cd8350ed34ec2d767856.exe 83 PID 4796 wrote to memory of 1144 4796 068fb7605542cd8350ed34ec2d767856.tmp 84 PID 4796 wrote to memory of 1144 4796 068fb7605542cd8350ed34ec2d767856.tmp 84 PID 4796 wrote to memory of 1144 4796 068fb7605542cd8350ed34ec2d767856.tmp 84 PID 1144 wrote to memory of 3528 1144 cmd.exe 86 PID 1144 wrote to memory of 3528 1144 cmd.exe 86 PID 1144 wrote to memory of 3528 1144 cmd.exe 86 PID 3528 wrote to memory of 940 3528 isnnf.exe 89 PID 3528 wrote to memory of 940 3528 isnnf.exe 89 PID 3528 wrote to memory of 940 3528 isnnf.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\068fb7605542cd8350ed34ec2d767856.exe"C:\Users\Admin\AppData\Local\Temp\068fb7605542cd8350ed34ec2d767856.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\is-DIH7O.tmp\068fb7605542cd8350ed34ec2d767856.tmp"C:\Users\Admin\AppData\Local\Temp\is-DIH7O.tmp\068fb7605542cd8350ed34ec2d767856.tmp" /SL5="$6020A,3138430,832512,C:\Users\Admin\AppData\Local\Temp\068fb7605542cd8350ed34ec2d767856.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\hnsstei\shhd.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
\??\c:\hnsstei\isnnf.exeisnnf.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\isnnf.txt5⤵
- Opens file in notepad (likely ransom note)
PID:940
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5d3c02246c96a2fdd800b3f087f166c99
SHA19a711be14f30769e0156558f680199f30291d846
SHA256b89b0c9764496cd69ed3686cfa0128cf05acf7c73077828bebb5ef9db0271fa7
SHA512495e25823ba560bf0f6e943ae5d79b027ad920db5166cf397f44a616e44e4e7f2d69d84232779cde919117c234a55a8056f7c371e23d76b38334d05f82d02dc3
-
Filesize
649KB
MD5d504f3e79833f38f69ab0696a9ed8205
SHA188ca3e8ec7886048102125539b22b2e7d3ec3dc5
SHA256174c0c0d80346d35c31674baf20f06040341ebd6b5103c762e64fb7e1b4a244c
SHA512bc28d5566b5569f3a69ceb6b7c6db200aa22d6fcc41d4c03b18472143a44b58e8e4afa7d445c573d75f2cd3d375ae3cf568bc23f13e342cc80ee9f84c74638c1
-
Filesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
Filesize
207B
MD5303cc9c7f1866add89099fc05e3e98a8
SHA1489d0d26ff21a7edfa23e5c0d9c6e29f53beb64a
SHA2566f9cd1706832c77baf404a46a4ff0d8353122b7795438c3314bfec373ea3cdd9
SHA5127d9df4f2a8f02329bb3a4c004e41e46bcff0e1638dc7cf02525b6ccaed3914d509f2cb94d8859d5c17baa9d4f899d08517fcc21b75db95825c8ee5af06a6b6e9
-
Filesize
1.0MB
MD5bcba8ef8b4270277d00052389a55bb2c
SHA1b519b25a6e7ada9aa9ecda80551cf4a24c137f6f
SHA25621fbc2c9bf15508c778bdbc4d4c1bae0232c5a87a02322dab3039ebeb24a0bc6
SHA51215443f90968b0c3e9b0d277d7d72a45bd6f180a1ecdab869042d0b0dd45de0b17e26c0f2eb147fd47b776914640754198c830587872b892a68c144488b51fd82
-
Filesize
293KB
MD5b885742712636ca83ea600ed3d28204e
SHA1eb8a7d45767d5aa9ce915851fc1d2175d026aa20
SHA2566259f60a25b765e00c8841213a4d6dde209f479dbe0cb0aee6efdee3b0ad477d
SHA5126b9a3c0722c2a17e6b724d7fb1dd5fc3fd4363bb8b4c3dad565be1556e596975d57bd9b17532aa1e03ff9d0b4c40ee59ceafb7653d2599c5225e4cf03fcc9e63
-
Filesize
2B
MD5ac6ad5d9b99757c3a878f2d275ace198
SHA1439baa1b33514fb81632aaf44d16a9378c5664fc
SHA2569b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d
SHA512bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b
-
Filesize
301B
MD59b6781897497ff28846d414b8429e861
SHA1074427de2cb11afc3827ff57dcc0c6c0da574cd4
SHA256d9ce56bb859d7cd337d715b231e37662e7072c332ea6d03c8d25cbd9462fc6c0
SHA5121c0806c9173b19e6d738683d1468fe247ff99881e45519d9dd97d5efd290e55ef0ae43f4939bc3b74fa0e2e407f1dccabcf8af6e56be9bd0ffd27d11df6d8b12
-
Filesize
91KB
MD5cc9c899532a615399aa07b081aefebfd
SHA1412f92e1ea43cc56afaecd81f789b7b178968d2c
SHA25638bf2cd7b502208c03d67a2b34d72d2a538769a3a5b11007c79d355c331213e8
SHA5125190c51c77d83b772aeb60dffd2899f2fdbc4ee7ec2a1dae0e76c5aa6fa649dfebb7cd11585ad4803797fe91265d41bccfb3e246f916fbe998e5f69e2cc61958
-
Filesize
293KB
MD5c865c1ee1d569b8c9878509be159d582
SHA135f071918a4c663ee730efe1894a540b1f368c72
SHA2567f8ec1c1a9e1310ec502b8b6a1f9d18ece4b03e1080a6622d68239f88434205e
SHA51208211437a5d4bdca476a0eb173f7cf48ff26d6b6e9988f18cae3e296a834475c0558213a490efa3585def8bf899e632a81f30e6c07fdb05cccf80d370b8fc08e