Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 06:59
Behavioral task
behavioral1
Sample
2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe
Resource
win7-20240611-en
General
-
Target
2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe
-
Size
2.2MB
-
MD5
84a241afa01c1e480c0278403db07d25
-
SHA1
c3edf0f61f8a0c0a156b8aa9eb0b0cdd95673bfd
-
SHA256
b1837584c0c687269c22d1c542e2a0001f0d2c3f26c0bd86aea49977c0a593f9
-
SHA512
3d08a19fe22683d16ed956c0bd6c039a2febb57823941fbcaa489f4e9af402a45b26f16b09986b32dbc5160913d57e8f97949a703444755d9ffc6d48f790eda3
-
SSDEEP
49152:HIxynid1wJQwK/I07SaNaPN+p0sUPYu7Uq7C2:CynLSI07RawpMAip
Malware Config
Signatures
-
Detect Blackmoon payload 8 IoCs
resource yara_rule behavioral1/memory/1916-13-0x0000000000200000-0x000000000044E000-memory.dmp family_blackmoon behavioral1/memory/1916-16-0x0000000000200000-0x000000000044E000-memory.dmp family_blackmoon behavioral1/memory/1916-18-0x0000000000200000-0x000000000044E000-memory.dmp family_blackmoon behavioral1/memory/1916-17-0x0000000000200000-0x000000000044E000-memory.dmp family_blackmoon behavioral1/memory/1916-21-0x0000000000200000-0x000000000044E000-memory.dmp family_blackmoon behavioral1/memory/1916-20-0x0000000000200000-0x000000000044E000-memory.dmp family_blackmoon behavioral1/memory/1916-23-0x0000000000200000-0x000000000044E000-memory.dmp family_blackmoon behavioral1/memory/1916-26-0x0000000000200000-0x000000000044E000-memory.dmp family_blackmoon -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WPS.lnk 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe -
Loads dropped DLL 1 IoCs
pid Process 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe -
resource yara_rule behavioral1/memory/1916-14-0x0000000000650000-0x0000000000668000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe Token: SeLockMemoryPrivilege 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe Token: SeCreateGlobalPrivilege 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe Token: SeBackupPrivilege 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe Token: SeRestorePrivilege 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe Token: SeShutdownPrivilege 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe Token: SeCreateTokenPrivilege 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe Token: SeTakeOwnershipPrivilege 1916 2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-29_84a241afa01c1e480c0278403db07d25_mafia.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5051d69a619adca3472e8d7c9b0c0eb5c
SHA16cc795ac90e43e408919e19ba6f5633863560459
SHA256feefc12464985e2057a4cbd54117e9414f2e00a284106fa38b62d63052a1f7dd
SHA51250daa3344aa4d86cdd22cf5736eec993467e6574c5e341cd0fd95757c739e167b6e76c744b29ae302d08c88d469fea0767640a9257f54f9dec2c5fbb87c23b71