Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe
Resource
win10v2004-20240508-en
General
-
Target
ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe
-
Size
1.3MB
-
MD5
c4812dcb6dd986e91af0670150dc3136
-
SHA1
205dea58b7131fa8e1642476e7a6d99aac8dd31e
-
SHA256
ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05
-
SHA512
fc487d5a4c96bdaf5d2d779ccd12f0ceb73321d5315d636ba952f10c993f9c196a11760572dd50b1c4a550c3b90f8a74e4aaca0c554aed6da0592f01c28f242f
-
SSDEEP
24576:DoRK/YeUfeaaih1Qmim2hi0ROVsLuewkOWj:DoRTeUzainQXHhi0ROVsLuewkpj
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000013acb-5.dat family_blackmoon -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral1/memory/2136-7-0x0000000002170000-0x0000000002259000-memory.dmp UPX behavioral1/memory/2136-8-0x0000000002170000-0x0000000002259000-memory.dmp UPX behavioral1/memory/2136-10-0x0000000002170000-0x0000000002259000-memory.dmp UPX behavioral1/memory/2136-11-0x0000000002170000-0x0000000002259000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 2136 5v6l84aG.exe -
Loads dropped DLL 6 IoCs
pid Process 2136 5v6l84aG.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2692 2136 WerFault.exe 35 -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2136 5v6l84aG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2136 5v6l84aG.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1660 1940 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 28 PID 1940 wrote to memory of 1660 1940 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 28 PID 1940 wrote to memory of 1660 1940 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 28 PID 1940 wrote to memory of 2900 1940 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 30 PID 1940 wrote to memory of 2900 1940 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 30 PID 1940 wrote to memory of 2900 1940 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 30 PID 2900 wrote to memory of 2364 2900 cmd.exe 32 PID 2900 wrote to memory of 2364 2900 cmd.exe 32 PID 2900 wrote to memory of 2364 2900 cmd.exe 32 PID 2364 wrote to memory of 2740 2364 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 33 PID 2364 wrote to memory of 2740 2364 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 33 PID 2364 wrote to memory of 2740 2364 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 33 PID 2740 wrote to memory of 2136 2740 cmd.exe 35 PID 2740 wrote to memory of 2136 2740 cmd.exe 35 PID 2740 wrote to memory of 2136 2740 cmd.exe 35 PID 2740 wrote to memory of 2136 2740 cmd.exe 35 PID 2136 wrote to memory of 2692 2136 5v6l84aG.exe 38 PID 2136 wrote to memory of 2692 2136 5v6l84aG.exe 38 PID 2136 wrote to memory of 2692 2136 5v6l84aG.exe 38 PID 2136 wrote to memory of 2692 2136 5v6l84aG.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe"C:\Users\Admin\AppData\Local\Temp\ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\system32\cmd.execmd /c mkdir C:\ProgramData\9W3qe34gk452⤵PID:1660
-
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe" C:\ProgramData\9W3qe34gk45 C:\ProgramData\9W3qe34gk452⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exeC:\Users\Admin\AppData\Local\Temp\ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe C:\ProgramData\9W3qe34gk45 C:\ProgramData\9W3qe34gk453⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\cmd.execmd /c C:\ProgramData\9W3qe34gk45\5v6l84aG.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\ProgramData\9W3qe34gk45\5v6l84aG.exeC:\ProgramData\9W3qe34gk45\5v6l84aG.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 5086⤵
- Loads dropped DLL
- Program crash
PID:2692
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD58929530afda63d45859ecbabc5e9edb4
SHA17f8a88b9d815399ee0047f8bc67c7a2a1d7c16bd
SHA256f4f76935e15ae533d47434880b455297a7b57bd45cd98e124eabf4cfe5b24723
SHA512fae7e1027de3ece5ad06b24ead5c07912c0b5c6217677d2702ebec49c968c7a6f3feffb73491a1557878c6cc5cc69045bc818abc71a48c5a2408f1359f9bd583
-
Filesize
363B
MD572ed37d10aed0e80cf7f7ad6afb9986a
SHA16b306cb386522f8f6c8722a56c7f71b20bb0a044
SHA256081f61de098d09e7237825297efb5b8f1f1900b933889746cce3203bda9ae58e
SHA51227bfd0393a1b5bb5d6663a70f200a3ee280447549369e10ca36b5694bcee9a748981f4d992a969d51d2bad3f851e298c9c8bc9bc9cd54ebeee24b254684a2c1f
-
Filesize
744KB
MD57013543b023ddfd98c8908daa78b6473
SHA13a1176c3404faa505c1080b47163137e06df54cb
SHA25604bb798004973767f7fcdc682cc50f8a84c27aa74003f5c995fd5d00e6617c30
SHA512a6dc65515639b747c962610cf5ebadbbc047072aac05b657a2222d909295d307b01372f850fc5c603d797a59d260a4463c418f91f951fe5f4545d570f10c4c0c