Analysis
-
max time kernel
142s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 19:12
Behavioral task
behavioral1
Sample
3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe
Resource
win7-20240419-en
General
-
Target
3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe
-
Size
13.8MB
-
MD5
1d9cea8e9d6c540927031efa5eb68b1b
-
SHA1
d01258fa92d1243df15d1d136ed025dae446a283
-
SHA256
3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145
-
SHA512
5a250900732415b3776490304136b951b3e1fecfce87cfe531e26e75637bef31d2884fd754dee144c562bc0cc8da23771c34e574b5f2969b4974df1461a40868
-
SSDEEP
393216:gPDPOTleBcdgmmJdSaLdc91I44291UbffF:YGVdg5JdSOdch429qx
Malware Config
Signatures
-
Detect Blackmoon payload 9 IoCs
resource yara_rule behavioral2/memory/968-2-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/968-0-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/968-3-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/968-20-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/4976-21-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/4976-18-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/4976-17-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/4976-19-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon behavioral2/memory/4976-50-0x0000000000400000-0x0000000000926000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/files/0x00030000000006df-14.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 4976 115193a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\S: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\T: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\A: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\H: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\L: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\O: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\X: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\I: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\J: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\K: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\Y: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\Z: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\E: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\Q: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\V: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\P: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\R: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\U: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\W: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\B: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\G: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe File opened (read-only) \??\N: 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 968 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe 968 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe 968 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe 4976 115193a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe 4976 115193a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe 4976 115193a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 968 wrote to memory of 4976 968 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe 81 PID 968 wrote to memory of 4976 968 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe 81 PID 968 wrote to memory of 4976 968 3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe"C:\Users\Admin\AppData\Local\Temp\3a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:968 -
C:\ÐÒ¸£¾Æ¹í\115193a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exeC:\ÐÒ¸£¾Æ¹í\115193a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD50bc96d94406f28b439b69720f340ca07
SHA1b44f175f97d3db6e96b202225b585837417c79d1
SHA2561d72086f56f6ec79439c60c82577fbd181eef1f4f734ab4f51875a3e0a3afc6b
SHA512ef9c849d77a27d5371571cf8b9d73c2d2c85e6d172f6565e9426ece773234223aa78ae4a26280f6f2f91cfa109182ed9faa0428a2e3c10dde0ff2f1efd0e6409
-
Filesize
13.8MB
MD51d9cea8e9d6c540927031efa5eb68b1b
SHA1d01258fa92d1243df15d1d136ed025dae446a283
SHA2563a0dfcad73d46e987045ef02f2a0b811c66b6f9ae223c6d78ea5d3442fcca145
SHA5125a250900732415b3776490304136b951b3e1fecfce87cfe531e26e75637bef31d2884fd754dee144c562bc0cc8da23771c34e574b5f2969b4974df1461a40868