Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 17:31
Behavioral task
behavioral1
Sample
20240913791aaf93b77c02e7d80b1517a534553bicedid.exe
Resource
win7-20240903-en
General
-
Target
20240913791aaf93b77c02e7d80b1517a534553bicedid.exe
-
Size
2.5MB
-
MD5
791aaf93b77c02e7d80b1517a534553b
-
SHA1
209ae814e06aa4cb15b4dbec2784aa205b37dd7b
-
SHA256
1dc18af52769169af8305ff33857c0f317d7c62c78fbacb76ac5fd4d9a60416d
-
SHA512
82e1bd01a95a7225285bcda8420460164e8cd7f81490f3c5e54da572822256d403314ed824fb0f74d7ad270740c018983cee9b44f09c3c64fc234b8d811baff5
-
SSDEEP
49152:YZ0v0xeSxURL9RxYMWWN5YUwT0YwWWN5YUwTBLe:6w0xeS47n
Malware Config
Signatures
-
Detect Blackmoon payload 6 IoCs
resource yara_rule behavioral1/files/0x0008000000012117-1.dat family_blackmoon behavioral1/memory/2544-9-0x0000000010000000-0x00000000101D3000-memory.dmp family_blackmoon behavioral1/memory/2904-30-0x0000000000400000-0x0000000000697000-memory.dmp family_blackmoon behavioral1/memory/2544-23-0x0000000003460000-0x0000000003514000-memory.dmp family_blackmoon behavioral1/memory/2544-17-0x0000000003350000-0x0000000003404000-memory.dmp family_blackmoon behavioral1/memory/2544-13-0x0000000003260000-0x000000000334D000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe -
Loads dropped DLL 1 IoCs
pid Process 2904 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log DxDiag.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DxDiag.exe -
Modifies registry class 34 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer\ = "DxDiag.DxDiagClassObject.1" DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\ = "DxDiagProvider Class" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ = "DxDiagClassObject Class" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\VersionIndependentProgID DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CLSID DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1 DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID\ = "DxDiag.DxDiagClassObject.1" DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove\ = "Programmable" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1 DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32 DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID\ = "DxDiag.DxDiagClassObject" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\CLSID DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7} DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\ = "DxDiagClassObject Class" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ThreadingModel = "Apartment" DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\ = "DxDiagProvider Class" DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer\ = "DxDiag.DxDiagClassObject.1" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\InprocServer32 DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\ = "DxDiagClassObject Class" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ = "C:\\Windows\\SysWOW64\\dxdiagn.dll" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\ProgID DxDiag.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2904 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 2904 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe 2544 DxDiag.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2544 DxDiag.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2904 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 2544 DxDiag.exe Token: SeRestorePrivilege 2544 DxDiag.exe Token: SeRestorePrivilege 2544 DxDiag.exe Token: SeRestorePrivilege 2544 DxDiag.exe Token: SeRestorePrivilege 2544 DxDiag.exe Token: SeRestorePrivilege 2544 DxDiag.exe Token: SeRestorePrivilege 2544 DxDiag.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 2904 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 2544 DxDiag.exe 2544 DxDiag.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3004 2904 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 30 PID 2904 wrote to memory of 3004 2904 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 30 PID 2904 wrote to memory of 3004 2904 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 30 PID 2904 wrote to memory of 3004 2904 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 30 PID 3004 wrote to memory of 2544 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 31 PID 3004 wrote to memory of 2544 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 31 PID 3004 wrote to memory of 2544 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 31 PID 3004 wrote to memory of 2544 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 31 PID 3004 wrote to memory of 2544 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 31 PID 3004 wrote to memory of 2544 3004 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240913791aaf93b77c02e7d80b1517a534553bicedid.exe"C:\Users\Admin\AppData\Local\Temp\20240913791aaf93b77c02e7d80b1517a534553bicedid.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\20240913791aaf93b77c02e7d80b1517a534553bicedid.exeC:\Users\Admin\AppData\Local\Temp\20240913791aaf93b77c02e7d80b1517a534553bicedid.exe --2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\DxDiag.exeDxDiag.exe3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5d75a19d215223d2cbe165d70b5e0574d
SHA1300a572aa0e7123ff9c708b333b6dcfd662cd379
SHA2561bd0118c6744f06ac72f3e922fc2ebe1dd2c034155268754fd41015ddc323aff
SHA512140aa75ff75acd545e847dae2b17f50a539e643805a44ec3756476a56e9ff99c48247ae0f7a36b1fdc551d247296704ad9b495a4d895dfd73270c5b804ee6556