Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 20:43
Behavioral task
behavioral1
Sample
758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe
Resource
win7-20240903-en
General
-
Target
758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe
-
Size
560KB
-
MD5
cbf54780cdd334b9caf10f4980172192
-
SHA1
50a2ee1b0e15b5a39f9ec7a826ccb4f98c465995
-
SHA256
758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57
-
SHA512
f7b2aedb9f3130ed976da7ca583f66fe38e3d48909055c9af309d4b12325216958f406b9afc1ee3ae71c9b60e1789e748c6f4d7262e00ac5265f65e446a53941
-
SSDEEP
6144:Ig3oBabKfY+R9VGLj10B7F8zekO+nZd2G4cLUh2q/+Km//v0o+:VogOfY+R9VGLj10B7F8ywZdX45H+Kmn
Malware Config
Signatures
-
Detect Blackmoon payload 14 IoCs
resource yara_rule behavioral2/memory/1352-8-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-9-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-10-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-11-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-12-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-13-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-14-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-15-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-16-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-17-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-18-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-19-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-20-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon behavioral2/memory/1352-21-0x0000000000400000-0x00000000004A5000-memory.dmp family_blackmoon -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2864 attrib.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe Token: SeDebugPrivilege 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1352 wrote to memory of 4656 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe 85 PID 1352 wrote to memory of 4656 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe 85 PID 1352 wrote to memory of 4656 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe 85 PID 4656 wrote to memory of 2184 4656 cmd.exe 88 PID 4656 wrote to memory of 2184 4656 cmd.exe 88 PID 4656 wrote to memory of 2184 4656 cmd.exe 88 PID 4656 wrote to memory of 2820 4656 cmd.exe 89 PID 4656 wrote to memory of 2820 4656 cmd.exe 89 PID 4656 wrote to memory of 2820 4656 cmd.exe 89 PID 2820 wrote to memory of 5112 2820 cmd.exe 91 PID 2820 wrote to memory of 5112 2820 cmd.exe 91 PID 2820 wrote to memory of 5112 2820 cmd.exe 91 PID 1352 wrote to memory of 2868 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe 92 PID 1352 wrote to memory of 2868 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe 92 PID 1352 wrote to memory of 2868 1352 758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe 92 PID 2868 wrote to memory of 4212 2868 cmd.exe 94 PID 2868 wrote to memory of 4212 2868 cmd.exe 94 PID 2868 wrote to memory of 4212 2868 cmd.exe 94 PID 2868 wrote to memory of 2864 2868 cmd.exe 95 PID 2868 wrote to memory of 2864 2868 cmd.exe 95 PID 2868 wrote to memory of 2864 2868 cmd.exe 95 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2864 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe"C:\Users\Admin\AppData\Local\Temp\758c2c807802282b562ce8b7174709292d7cb5aee2aa13195a3080d5412b7b57.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1122.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\mode.commode con cols=15 lines=33⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\1122.bat p3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\mode.commode con cols=15 lines=34⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1133.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\mode.commode con cols=15 lines=33⤵
- System Location Discovery: System Language Discovery
PID:4212
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +a +h +r "C:\test"3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197B
MD5b4292e00eff53ec1da95e7225285e779
SHA1695289b0ffaa5ee7b4084304c976045806687ddd
SHA256dc4a1e18e67015e250c8bd71dcbce8d2234e73219b7dfcf8fd13d0733e4c2030
SHA51200dc64420d7b8fda21873e4dfe9ec5fc0aec15a296385ca801641f6a8894692f6aeada71445ef54330f1acf4be6ab436e4ad99f24933e844baa6055efd02f1b6
-
Filesize
146B
MD5d61001211982ac769bbb185be1950976
SHA1c856d74768d978bed799edfc07819fc28ba8f604
SHA25603d8643c798c6d1f7c25e3dde6f9a3cb17015295456e099af2681b4ba7895b27
SHA5127080a7d2c54d927960d42063eeea3514ada396c680108d3345660b69149daa446c38848f64138ec075cc7bc9c39112147fabda3fdd7826e763e1b6d1b87f23f1