Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe
Resource
win10v2004-20240508-en
General
-
Target
ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe
-
Size
1.3MB
-
MD5
c4812dcb6dd986e91af0670150dc3136
-
SHA1
205dea58b7131fa8e1642476e7a6d99aac8dd31e
-
SHA256
ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05
-
SHA512
fc487d5a4c96bdaf5d2d779ccd12f0ceb73321d5315d636ba952f10c993f9c196a11760572dd50b1c4a550c3b90f8a74e4aaca0c554aed6da0592f01c28f242f
-
SSDEEP
24576:DoRK/YeUfeaaih1Qmim2hi0ROVsLuewkOWj:DoRTeUzainQXHhi0ROVsLuewkpj
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002340e-6.dat family_blackmoon -
UPX dump on OEP (original entry point) 17 IoCs
resource yara_rule behavioral2/memory/3980-8-0x0000000002D10000-0x0000000002DF9000-memory.dmp UPX behavioral2/memory/3980-9-0x0000000002D10000-0x0000000002DF9000-memory.dmp UPX behavioral2/memory/3980-11-0x0000000002D10000-0x0000000002DF9000-memory.dmp UPX behavioral2/memory/3980-12-0x0000000002D10000-0x0000000002DF9000-memory.dmp UPX behavioral2/memory/3980-13-0x0000000003F30000-0x0000000004141000-memory.dmp UPX behavioral2/memory/3980-18-0x0000000004350000-0x000000000443B000-memory.dmp UPX behavioral2/memory/3980-17-0x0000000001000000-0x0000000001056000-memory.dmp UPX behavioral2/memory/3980-19-0x0000000004350000-0x000000000443B000-memory.dmp UPX behavioral2/memory/3980-22-0x0000000004970000-0x0000000004AE5000-memory.dmp UPX behavioral2/memory/3980-21-0x0000000004460000-0x00000000044F9000-memory.dmp UPX behavioral2/memory/3980-23-0x0000000004970000-0x0000000004AE5000-memory.dmp UPX behavioral2/memory/3980-28-0x0000000003F30000-0x0000000004141000-memory.dmp UPX behavioral2/memory/3980-30-0x0000000003F30000-0x0000000004141000-memory.dmp UPX behavioral2/memory/3980-31-0x0000000001000000-0x0000000001056000-memory.dmp UPX behavioral2/memory/3980-32-0x0000000004350000-0x000000000443B000-memory.dmp UPX behavioral2/memory/3980-33-0x0000000004460000-0x00000000044F9000-memory.dmp UPX behavioral2/memory/3980-34-0x0000000004970000-0x0000000004AE5000-memory.dmp UPX -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run h4p9SqPF4m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\h4p9SqPF4m = "C:\\ProgramData\\39n39AIw6K6d7i\\h4p9SqPF4m.exe" h4p9SqPF4m.exe -
Executes dropped EXE 1 IoCs
pid Process 3980 h4p9SqPF4m.exe -
Loads dropped DLL 1 IoCs
pid Process 3980 h4p9SqPF4m.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3980 h4p9SqPF4m.exe 3980 h4p9SqPF4m.exe 3980 h4p9SqPF4m.exe 3980 h4p9SqPF4m.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3980 h4p9SqPF4m.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3980 h4p9SqPF4m.exe 3980 h4p9SqPF4m.exe 3980 h4p9SqPF4m.exe 3980 h4p9SqPF4m.exe 3980 h4p9SqPF4m.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4608 wrote to memory of 1036 4608 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 84 PID 4608 wrote to memory of 1036 4608 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 84 PID 4608 wrote to memory of 992 4608 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 86 PID 4608 wrote to memory of 992 4608 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 86 PID 992 wrote to memory of 4456 992 cmd.exe 88 PID 992 wrote to memory of 4456 992 cmd.exe 88 PID 4456 wrote to memory of 3712 4456 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 89 PID 4456 wrote to memory of 3712 4456 ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe 89 PID 3712 wrote to memory of 3980 3712 cmd.exe 91 PID 3712 wrote to memory of 3980 3712 cmd.exe 91 PID 3712 wrote to memory of 3980 3712 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe"C:\Users\Admin\AppData\Local\Temp\ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SYSTEM32\cmd.execmd /c mkdir C:\ProgramData\39n39AIw6K6d7i2⤵PID:1036
-
-
C:\Windows\SYSTEM32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe" C:\ProgramData\39n39AIw6K6d7i C:\ProgramData\39n39AIw6K6d7i2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exeC:\Users\Admin\AppData\Local\Temp\ad99cbc76ed40899ee1c49e1c8152c375a0a7aaaa2614c7f62feea3986d2ec05.exe C:\ProgramData\39n39AIw6K6d7i C:\ProgramData\39n39AIw6K6d7i3⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SYSTEM32\cmd.execmd /c C:\ProgramData\39n39AIw6K6d7i\h4p9SqPF4m.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\ProgramData\39n39AIw6K6d7i\h4p9SqPF4m.exeC:\ProgramData\39n39AIw6K6d7i\h4p9SqPF4m.exe5⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3980
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD57013543b023ddfd98c8908daa78b6473
SHA13a1176c3404faa505c1080b47163137e06df54cb
SHA25604bb798004973767f7fcdc682cc50f8a84c27aa74003f5c995fd5d00e6617c30
SHA512a6dc65515639b747c962610cf5ebadbbc047072aac05b657a2222d909295d307b01372f850fc5c603d797a59d260a4463c418f91f951fe5f4545d570f10c4c0c
-
Filesize
125KB
MD58929530afda63d45859ecbabc5e9edb4
SHA17f8a88b9d815399ee0047f8bc67c7a2a1d7c16bd
SHA256f4f76935e15ae533d47434880b455297a7b57bd45cd98e124eabf4cfe5b24723
SHA512fae7e1027de3ece5ad06b24ead5c07912c0b5c6217677d2702ebec49c968c7a6f3feffb73491a1557878c6cc5cc69045bc818abc71a48c5a2408f1359f9bd583
-
Filesize
363B
MD572ed37d10aed0e80cf7f7ad6afb9986a
SHA16b306cb386522f8f6c8722a56c7f71b20bb0a044
SHA256081f61de098d09e7237825297efb5b8f1f1900b933889746cce3203bda9ae58e
SHA51227bfd0393a1b5bb5d6663a70f200a3ee280447549369e10ca36b5694bcee9a748981f4d992a969d51d2bad3f851e298c9c8bc9bc9cd54ebeee24b254684a2c1f