Analysis
-
max time kernel
62s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 18:48
Behavioral task
behavioral1
Sample
BloodFMx64x.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BloodFMx64x.exe
Resource
win10v2004-20240704-en
General
-
Target
BloodFMx64x.exe
-
Size
21.9MB
-
MD5
702ab1cadcca9c85d9d3e577d28371c6
-
SHA1
606addfb7b10515f41e61e5832fdf45abc483bee
-
SHA256
9f8c98828eecab0beeb2f6db642a2820ba10160379663756cc7723d7df1f7de6
-
SHA512
7f4304ff36f1a5c9302ecd67d9bc1b3b9e3e15733819d904642856d2b740b827abb8cff7368f3c99e74520bf87fc247297bf6f4b97443a4ac5100ceb9142ce79
-
SSDEEP
393216:iu7L/sQ1DKmr2pu0tTtdQuslRl99oWOv+9ge6DRXAbejH:iCL0Q1DKmr2puI5dQuqDorvSghRwbO
Malware Config
Extracted
nanocore
1.2.2.0
45.74.8.132:1604
127.0.0.1:1604
mygabs.ddns.net:1337
127.0.0.1:1337
f8d99e2f-2572-4d85-92e4-cf383d156342
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2024-03-05T17:57:06.415874336Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1604
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
f8d99e2f-2572-4d85-92e4-cf383d156342
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
45.74.8.132
-
primary_dns_server
8.8.8.8
-
request_elevation
false
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Executes dropped EXE 9 IoCs
pid Process 1956 BLOODFMX.EXE 2904 HOME X64 BUILD.EXE 2820 REGEDIT.EXE 3048 SCHIOST.EXE 2876 SVCHOST.EXE 2824 SCHIOST.EXE 952 Client.exe 1236 Process not Found 1532 Client.exe -
Loads dropped DLL 18 IoCs
pid Process 2800 BloodFMx64x.exe 2800 BloodFMx64x.exe 2800 BloodFMx64x.exe 2800 BloodFMx64x.exe 2800 BloodFMx64x.exe 2800 BloodFMx64x.exe 2800 BloodFMx64x.exe 2800 BloodFMx64x.exe 3048 SCHIOST.EXE 2824 SCHIOST.EXE 2824 SCHIOST.EXE 2824 SCHIOST.EXE 2824 SCHIOST.EXE 2824 SCHIOST.EXE 2824 SCHIOST.EXE 2824 SCHIOST.EXE 2820 REGEDIT.EXE 1236 Process not Found -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Monitor = "C:\\Program Files (x86)\\SMTP Monitor\\smtpmon.exe" BLOODFMX.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BLOODFMX.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HOME X64 BUILD.EXE -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\SMTP Monitor\smtpmon.exe BLOODFMX.EXE File opened for modification C:\Program Files (x86)\SMTP Monitor\smtpmon.exe BLOODFMX.EXE File created C:\Program Files (x86)\SMTP Monitor\smtpmon.exe HOME X64 BUILD.EXE -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0006000000018fa0-30.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs regedit.exe 1 IoCs
pid Process 2820 REGEDIT.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2284 schtasks.exe 1352 schtasks.exe 3060 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1956 BLOODFMX.EXE 1956 BLOODFMX.EXE 1956 BLOODFMX.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 1956 BLOODFMX.EXE 1956 BLOODFMX.EXE 1956 BLOODFMX.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 1956 BLOODFMX.EXE 1956 BLOODFMX.EXE 1956 BLOODFMX.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 1956 BLOODFMX.EXE 1956 BLOODFMX.EXE 1956 BLOODFMX.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 2904 HOME X64 BUILD.EXE 1956 BLOODFMX.EXE 1956 BLOODFMX.EXE 1956 BLOODFMX.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1956 BLOODFMX.EXE 2904 HOME X64 BUILD.EXE -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 2904 HOME X64 BUILD.EXE -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1956 BLOODFMX.EXE Token: SeDebugPrivilege 2904 HOME X64 BUILD.EXE Token: SeDebugPrivilege 952 Client.exe Token: 33 952 Client.exe Token: SeIncBasePriorityPrivilege 952 Client.exe Token: 33 952 Client.exe Token: SeIncBasePriorityPrivilege 952 Client.exe Token: 33 952 Client.exe Token: SeIncBasePriorityPrivilege 952 Client.exe Token: 33 952 Client.exe Token: SeIncBasePriorityPrivilege 952 Client.exe Token: 33 952 Client.exe Token: SeIncBasePriorityPrivilege 952 Client.exe Token: 33 952 Client.exe Token: SeIncBasePriorityPrivilege 952 Client.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2800 wrote to memory of 1956 2800 BloodFMx64x.exe 30 PID 2800 wrote to memory of 1956 2800 BloodFMx64x.exe 30 PID 2800 wrote to memory of 1956 2800 BloodFMx64x.exe 30 PID 2800 wrote to memory of 1956 2800 BloodFMx64x.exe 30 PID 2800 wrote to memory of 2904 2800 BloodFMx64x.exe 31 PID 2800 wrote to memory of 2904 2800 BloodFMx64x.exe 31 PID 2800 wrote to memory of 2904 2800 BloodFMx64x.exe 31 PID 2800 wrote to memory of 2904 2800 BloodFMx64x.exe 31 PID 2800 wrote to memory of 2820 2800 BloodFMx64x.exe 32 PID 2800 wrote to memory of 2820 2800 BloodFMx64x.exe 32 PID 2800 wrote to memory of 2820 2800 BloodFMx64x.exe 32 PID 2800 wrote to memory of 2820 2800 BloodFMx64x.exe 32 PID 2800 wrote to memory of 3048 2800 BloodFMx64x.exe 33 PID 2800 wrote to memory of 3048 2800 BloodFMx64x.exe 33 PID 2800 wrote to memory of 3048 2800 BloodFMx64x.exe 33 PID 2800 wrote to memory of 3048 2800 BloodFMx64x.exe 33 PID 2800 wrote to memory of 2876 2800 BloodFMx64x.exe 34 PID 2800 wrote to memory of 2876 2800 BloodFMx64x.exe 34 PID 2800 wrote to memory of 2876 2800 BloodFMx64x.exe 34 PID 2800 wrote to memory of 2876 2800 BloodFMx64x.exe 34 PID 2820 wrote to memory of 1648 2820 REGEDIT.EXE 35 PID 2820 wrote to memory of 1648 2820 REGEDIT.EXE 35 PID 2820 wrote to memory of 1648 2820 REGEDIT.EXE 35 PID 2820 wrote to memory of 1648 2820 REGEDIT.EXE 35 PID 2820 wrote to memory of 2284 2820 REGEDIT.EXE 37 PID 2820 wrote to memory of 2284 2820 REGEDIT.EXE 37 PID 2820 wrote to memory of 2284 2820 REGEDIT.EXE 37 PID 2820 wrote to memory of 2284 2820 REGEDIT.EXE 37 PID 3048 wrote to memory of 2824 3048 SCHIOST.EXE 39 PID 3048 wrote to memory of 2824 3048 SCHIOST.EXE 39 PID 3048 wrote to memory of 2824 3048 SCHIOST.EXE 39 PID 2820 wrote to memory of 952 2820 REGEDIT.EXE 40 PID 2820 wrote to memory of 952 2820 REGEDIT.EXE 40 PID 2820 wrote to memory of 952 2820 REGEDIT.EXE 40 PID 2820 wrote to memory of 952 2820 REGEDIT.EXE 40 PID 952 wrote to memory of 2424 952 Client.exe 41 PID 952 wrote to memory of 2424 952 Client.exe 41 PID 952 wrote to memory of 2424 952 Client.exe 41 PID 952 wrote to memory of 2424 952 Client.exe 41 PID 952 wrote to memory of 1352 952 Client.exe 43 PID 952 wrote to memory of 1352 952 Client.exe 43 PID 952 wrote to memory of 1352 952 Client.exe 43 PID 952 wrote to memory of 1352 952 Client.exe 43 PID 2388 wrote to memory of 1532 2388 taskeng.exe 46 PID 2388 wrote to memory of 1532 2388 taskeng.exe 46 PID 2388 wrote to memory of 1532 2388 taskeng.exe 46 PID 2388 wrote to memory of 1532 2388 taskeng.exe 46 PID 1532 wrote to memory of 2088 1532 Client.exe 47 PID 1532 wrote to memory of 2088 1532 Client.exe 47 PID 1532 wrote to memory of 2088 1532 Client.exe 47 PID 1532 wrote to memory of 2088 1532 Client.exe 47 PID 1532 wrote to memory of 3060 1532 Client.exe 49 PID 1532 wrote to memory of 3060 1532 Client.exe 49 PID 1532 wrote to memory of 3060 1532 Client.exe 49 PID 1532 wrote to memory of 3060 1532 Client.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\BloodFMx64x.exe"C:\Users\Admin\AppData\Local\Temp\BloodFMx64x.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\BLOODFMX.EXE"C:\Users\Admin\AppData\Local\Temp\BLOODFMX.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\HOME X64 BUILD.EXE"C:\Users\Admin\AppData\Local\Temp\HOME X64 BUILD.EXE"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\REGEDIT.EXE"C:\Users\Admin\AppData\Local\Temp\REGEDIT.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Runs regedit.exe
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:1648
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\REGEDIT.EXE" /sc minute /mo 13⤵
- Scheduled Task/Job: Scheduled Task
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F4⤵PID:2424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 14⤵
- Scheduled Task/Job: Scheduled Task
PID:1352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE"C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE"C:\Users\Admin\AppData\Local\Temp\SCHIOST.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2824
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"2⤵
- Executes dropped EXE
PID:2876
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {07BBFEE0-04EE-4DFB-9A76-C5D51630CB8A} S-1-5-21-2212144002-1172735686-1556890956-1000:MVFYZPLM\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Client.exeC:\Users\Admin\AppData\Local\Temp\Client.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:2088
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 13⤵
- Scheduled Task/Job: Scheduled Task
PID:3060
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a8b0327931fd2c863693634b3081e6a0
SHA1d66cd78c124e931667b6079d5bc5adf55a644293
SHA2561fa836b3704b29e7ad1ea1b0b457f62aae4435c6a1d745707631552a2f83d5f6
SHA5121b8331ac9b17d3553a5c7b4572f826bb232b339c28f6c9a31a870097c7612587cd1dbe59fe294501ce11cf5bba973d83784108309617b6f7104f2aae8f723961
-
Filesize
11KB
MD5eb4c279c8386d4f30aab6d76feec3e5a
SHA10c611e8f56591f64841b846df7d5c07fd75b55a4
SHA25656bc7d3dd48d9cb209195f71be67d0a90ca929a8d4e6ae5a481f3ab0345da294
SHA5121869b0c843df05ba849e79aa15b25855aa5c2c2e5a932c0de650b83c8abe2371585731b0213061b8f4d781a87b352ad3a09bf8555fcf0f9422a0bcc1a9062781
-
Filesize
14KB
MD5a94626cbc9c0e1b62619a8cf49504ff8
SHA1047e2b1f21f1258242238043143f1d892538bbc3
SHA256a36792281c0aaab929635bb1f40ee3627225e7e35e6a199c188f3f782c7e6c27
SHA512b208602f33f02c92df718e4c009e6e8055e538c9451ef6f9682ce21db5258d799c09f689aae2879470a934b60b4f3d44ea82704933fa40f2ff408cf42bd1c534
-
Filesize
12KB
MD5b16e6798ad40000698a09276961fc2c3
SHA1b5184d9bdb1f5e7cfe17b2ec305c8554362067de
SHA256f8b7122ca5e1d473818940fea4d1155af429463038ba61953908fbbbb7a8d613
SHA512a4737a2236eb35e1b4935a5e333c7f1c51588852a8daf654fd2e7ca6e945e40df9d001394c2f3e3a9d023b8d4e34e9753f6472ed58df245b104623d7dbde7423
-
Filesize
11KB
MD5f0f891d08e0e358327b323b38f3ffca2
SHA1eb20f147c53f86c59603f5edbf60f936f768fb1b
SHA2569c8461929b61e0fd269ce735d699e7e3b6c0159d3e2659f60d681290abf9eac5
SHA51294e13c4d09ff35c2ded7fd2649b3542aade1414f05772e2034af7723f2622e662e8c0bb67e1eb288e230f8ae183d8f1296c2a134b7ae061a452fa3f7423d7694
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
Filesize
1011KB
MD57e39d82adf5da0b51a968c764e0e15c1
SHA179e75ccde95798f21a34e5650b29dbebe79c1b43
SHA256d67926328a72816d2944d7c88df6ff4bfccd41a9ce39af0309a0639829d0e7fb
SHA5121c58d53c40535f80f482a5f406ef5bf9c2f963b9db5969c37ef47b0c59522a1a9bde3f3589538a7ae7d99d567a43170b384761e572c740010feb86894ce7322a
-
Filesize
8B
MD5c634e7efa50612ddac85025614245ed3
SHA12abd9a58bf4cd3e6a5428e33e2c7c9356812c6b2
SHA2561ae30be5b28a8a3edd489730a5b115b02b23a7667e3497bfe4710bdf75ef6480
SHA51275eeef19b79eee1ca0c74e55486ea982c87b3df6389c98b965956c1112d2760fc256896b6844e2cc70449c6fa8bbc861d0af46581639884f338158498eadfa9b
-
Filesize
202KB
MD5e73a6209451022ef1697860fe3a67753
SHA198b7e9f68167a3e6d768a50c2b4610ced53d1c6d
SHA256b35f2d047c35b3f0d6feefade7cd1e69d9bf25340ddbd7be937cba0ee68317a7
SHA5122f61121005d1283ee37569ffb491f4de0cc882cfa95b38b1c585b0a421455b469e041d14341d0bc086638dd44c6a57486c6776f373dea441bf819cd75fda411b
-
Filesize
202KB
MD56048ded327cec10d49240206f6eeea39
SHA1a1f4905f99654d0042e03b1eb85f190055cb5862
SHA25652e993009984fb3cbd9189b44d25e24e1cc27f7042b132a6d5691a34a64ac8b9
SHA512b2c77b1d2a614c75110c57e2c56d8dbe0b9db4f9b9fe6bc65eda57c3b4eadc9ce36d8a41fd65cfbeb583641837b53b33c1a95246d9a765707cbc7c8663fff3ce
-
Filesize
165KB
MD58853d52e63139ea98d401aedaca361dc
SHA19052fa1383930da8fe69b1d85ad06050cef0ed8e
SHA256e23251179fc24709c6909763d9db607fc035fcfd38fd429c04a7f2d2d395a779
SHA5123081595b34c0294525c3573ae81537b36b6cda1e5dce7af000baeea6c2a6f25adb122079117417fe48f77d010f8566222e0ae6200b8f2e1db3e8a9b5c61fa86f
-
Filesize
18.0MB
MD54817b3f9ced0d3aa3322b3a764fdccb5
SHA11bac5e7f5b8122fa89f595ae60dd7b4c00c86a48
SHA256354c7dba94787431be1f65c97499055980ffd96acf99e2f77616150515c3e1d0
SHA512dd4a4ba244ac49b3eb9540fd02c9e10f5bdf774abc0f2f7d5f180084060ee878239340a7b80e265ee6ed926d7357ff00d999ef80e936f3fc7ccfb15d08d0d639
-
Filesize
3.1MB
MD579e7f4a70bb7966605e64367da0d4839
SHA10f0c54bfac6933d3e7ecef5f5d40b00d7faeb1f5
SHA25697c27121a07217e52d701604bf3f5ec33125fbb7cc5cff58571007f2054f775f
SHA51237a9dffe3c3fe677d8ce967ec2138f3d04f6fa4ce7d3ac04bf8867e88ba5b739521cc69f37467f596626d8f08fa3ed0bf3f0556c9f2e5164189a6bc6d088523d