Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 17:31
Behavioral task
behavioral1
Sample
20240913791aaf93b77c02e7d80b1517a534553bicedid.exe
Resource
win7-20240903-en
General
-
Target
20240913791aaf93b77c02e7d80b1517a534553bicedid.exe
-
Size
2.5MB
-
MD5
791aaf93b77c02e7d80b1517a534553b
-
SHA1
209ae814e06aa4cb15b4dbec2784aa205b37dd7b
-
SHA256
1dc18af52769169af8305ff33857c0f317d7c62c78fbacb76ac5fd4d9a60416d
-
SHA512
82e1bd01a95a7225285bcda8420460164e8cd7f81490f3c5e54da572822256d403314ed824fb0f74d7ad270740c018983cee9b44f09c3c64fc234b8d811baff5
-
SSDEEP
49152:YZ0v0xeSxURL9RxYMWWN5YUwT0YwWWN5YUwTBLe:6w0xeS47n
Malware Config
Signatures
-
Detect Blackmoon payload 7 IoCs
resource yara_rule behavioral2/files/0x000a000000023bd5-2.dat family_blackmoon behavioral2/memory/3264-5-0x0000000010000000-0x00000000101D3000-memory.dmp family_blackmoon behavioral2/memory/3264-13-0x0000000004930000-0x00000000049E4000-memory.dmp family_blackmoon behavioral2/memory/3264-9-0x0000000004840000-0x000000000492D000-memory.dmp family_blackmoon behavioral2/memory/3264-20-0x0000000004C00000-0x0000000004CB4000-memory.dmp family_blackmoon behavioral2/memory/1876-26-0x0000000000400000-0x0000000000697000-memory.dmp family_blackmoon behavioral2/memory/3756-27-0x0000000000400000-0x0000000000697000-memory.dmp family_blackmoon -
Executes dropped EXE 1 IoCs
pid Process 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF DxDiag.exe File created C:\Windows\System32\DriverStore\FileRepository\keyboard.inf_amd64_5938c699b80ebb8f\keyboard.PNF DxDiag.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF DxDiag.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF DxDiag.exe File created C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF DxDiag.exe File created C:\Windows\System32\DriverStore\FileRepository\machine.inf_amd64_b748590104fe1c15\machine.PNF DxDiag.exe File created C:\Windows\System32\DriverStore\FileRepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF DxDiag.exe File created C:\Windows\System32\DriverStore\FileRepository\input.inf_amd64_adeb6424513f60a2\input.PNF DxDiag.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DxDiag.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DxDiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DxDiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DxDiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DxDiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DxDiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DxDiag.exe -
Modifies registry class 36 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\CLSID DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\VersionIndependentProgID DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\ = "DxDiagClassObject Class" DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ = "C:\\Windows\\SysWOW64\\dxdiagn.dll" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\ProgID DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1 DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ = "DxDiagClassObject Class" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32 DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1 DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\ = "DxDiagProvider Class" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID DxDiag.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2629364133-3182087385-364449604-1000\{819993AA-A818-4886-927B-AE81046A56CD} DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\ = "DxDiagClassObject Class" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID\ = "DxDiag.DxDiagClassObject.1" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer\ = "DxDiag.DxDiagClassObject.1" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer\ = "DxDiag.DxDiagClassObject.1" DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\ = "DxDiagProvider Class" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\InprocServer32 DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID\ = "DxDiag.DxDiagClassObject" DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ThreadingModel = "Apartment" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7} DxDiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove\ = "Programmable" DxDiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CLSID DxDiag.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2629364133-3182087385-364449604-1000\{8C766BC1-59BF-4BAE-8E8C-73C339F7EBDC} DxDiag.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3756 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3756 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3756 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3756 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe 3264 DxDiag.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3264 DxDiag.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3756 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3756 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3756 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 3264 DxDiag.exe 3264 DxDiag.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3756 wrote to memory of 1876 3756 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 85 PID 3756 wrote to memory of 1876 3756 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 85 PID 3756 wrote to memory of 1876 3756 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 85 PID 1876 wrote to memory of 3264 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 86 PID 1876 wrote to memory of 3264 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 86 PID 1876 wrote to memory of 3264 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 86 PID 1876 wrote to memory of 3264 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 86 PID 1876 wrote to memory of 3264 1876 20240913791aaf93b77c02e7d80b1517a534553bicedid.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240913791aaf93b77c02e7d80b1517a534553bicedid.exe"C:\Users\Admin\AppData\Local\Temp\20240913791aaf93b77c02e7d80b1517a534553bicedid.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\20240913791aaf93b77c02e7d80b1517a534553bicedid.exeC:\Users\Admin\AppData\Local\Temp\20240913791aaf93b77c02e7d80b1517a534553bicedid.exe --2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\DxDiag.exeDxDiag.exe3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD524185e7e4823c71950f404cdb8c23682
SHA192ad241a0e45b74f610e65b4efb71b7ae756835f
SHA25651580eb14f659431f7b2d6b49a6b84792604ab180be07ec1687543fae90f251f
SHA5124467d75bbdac5831680142692e21925685e6b43e330858c4bc88d32a7c25e1351140bf780ec15ad8b0b7b8a7b5a73f3fc7bfa141538263250ee4db4967be4aca