Analysis
-
max time kernel
131s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe
Resource
win7-20241010-en
General
-
Target
21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe
-
Size
7.1MB
-
MD5
20deba2f6b306c1970f26bbdf0b0ef2a
-
SHA1
8ccbba8d4875ba8c9dd4213ef920068e6795d4f3
-
SHA256
21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226
-
SHA512
1b79e7f228ad4cec7448e0205d5f71114631481d9c13f189c0758fae30acb33575f14789741480f6e17475fba23414e85ff6b71d6e2a51ebe0b1b2dbfbd8ca32
-
SSDEEP
98304:Y8MRf8O229UQA/jrXJGkGezFCAM7BuyZV0SRx0p2PauQE22kMqhJ2hG8LD173:Y82829Wj7JGiFDSjn0p2UrhJCG8tL
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\D1Software\Plugins\qvlnk.dll family_blackmoon -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\D1Software\echs.dll acprotect -
Executes dropped EXE 3 IoCs
Processes:
D1Bin.exeupgrade.exeRepair.exepid process 2268 D1Bin.exe 2416 upgrade.exe 2824 Repair.exe -
Loads dropped DLL 5 IoCs
Processes:
upgrade.exeRepair.exepid process 2416 upgrade.exe 2416 upgrade.exe 2824 Repair.exe 2416 upgrade.exe 2416 upgrade.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\D1Software\echs.dll upx behavioral1/memory/2416-45-0x00000000025A0000-0x0000000002705000-memory.dmp upx behavioral1/memory/2416-61-0x00000000025A0000-0x0000000002705000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
upgrade.exeRepair.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgrade.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Repair.exe -
Modifies registry class 3 IoCs
Processes:
D1Bin.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\myjiemakey D1Bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\myjiemakey\myjiemakeydeviceId = "b7b074f53a4e4ec395e877c90c3820d0" D1Bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\myjiemakey\myjiemakeyInitInfos = "app.ejiema.com" D1Bin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
D1Bin.exepid process 2268 D1Bin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
D1Bin.exedescription pid process Token: SeDebugPrivilege 2268 D1Bin.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
upgrade.exeRepair.exepid process 2416 upgrade.exe 2416 upgrade.exe 2824 Repair.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exedescription pid process target process PID 2332 wrote to memory of 2268 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe D1Bin.exe PID 2332 wrote to memory of 2268 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe D1Bin.exe PID 2332 wrote to memory of 2268 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe D1Bin.exe PID 2332 wrote to memory of 2416 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe upgrade.exe PID 2332 wrote to memory of 2416 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe upgrade.exe PID 2332 wrote to memory of 2416 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe upgrade.exe PID 2332 wrote to memory of 2416 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe upgrade.exe PID 2332 wrote to memory of 2824 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe Repair.exe PID 2332 wrote to memory of 2824 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe Repair.exe PID 2332 wrote to memory of 2824 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe Repair.exe PID 2332 wrote to memory of 2824 2332 21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe Repair.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe"C:\Users\Admin\AppData\Local\Temp\21e9dae31345de68175b0cbc8aaf149cf4e86f9e0f11ef5bbef1af75f95b4226.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Roaming\D1Software\D1Bin.exeC:\Users\Admin\AppData\Roaming\D1Software\D1Bin.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Users\Admin\AppData\Roaming\D1Software\upgrade.exeC:\Users\Admin\AppData\Roaming\D1Software\upgrade.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2416
-
-
C:\Users\Admin\AppData\Roaming\D1Software\Repair.exeC:\Users\Admin\AppData\Roaming\D1Software\Repair.exe -Ho9LN2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5fde7a5d4a846e1f9a6f5fbd8bd968ea5
SHA1ca1b727404bb76180df8b35989845f29c740301b
SHA25695aa01457ba31bb5c5c0d9a37916caca22b6ab3c5e3b2cb7d0da9965f0bc8224
SHA512d0af43ecacd6ae7bb5769443d16067665c00c5d476d24f2e2d793465caf6852ef32afe01731191f46afe6faececaeca67c0fe1abd0fa355bbf09bb511f815f6f
-
Filesize
2.1MB
MD5c83247fac0840125db662eb3e27ac6a3
SHA16d7a24b3d1c10516232a6f3ac4aed8d69da56568
SHA2562dc7b369e5e3d8c828e2fe947e79df7d4ed60cdb1a004e8e94bf2bf38698cdb2
SHA512f3359e7ddd3fceeb442ba0b847ac9f744f9df01f02e0cda20078d4ad0af404a53e6151f8d908ad54f0c7d3469769d39c833f34d448f6b9c566a4f413ef41a50f
-
Filesize
492KB
MD5001db37c243710301a862d8dd8a025e0
SHA17e4fc33b58dae290861712e4194e855923ebde1a
SHA2565e6c4b35329f48fcf8fb7ec5dc13d6a4f41c8d58da1849ec5a761b4af86fbbeb
SHA5127edee439741daa58e6fc108e28b177f2ac87fc8492dec52f4392df095c187ddd1bace043cdc0a2c0b8c9ddb8f86e7add2f8f822f53c5e25b758b69894f576a16
-
Filesize
108KB
MD57c47b63e458fc168bb0bf6c062597b43
SHA1be13ca069d69055e7db3d6a883d08058a1f2c633
SHA256b7db785c19b5a77421cb7f2c0c64b368bc1349b336fbd1191dee877faa81eca2
SHA512a1e4d591fb58bc22c93ee2cdc04d380d6724df52e6530901d5dfa39ec869a1cf33994dcfd09d0237e00407d056a8ee84826ab40fb43fbf169ea1e6c45570f461
-
Filesize
82KB
MD5d0520569180accd7e17ed9697711d6ec
SHA146cb7e2db7efda70b9a5b75b2fe0bb6038499008
SHA25613026df002b3575564f32927b7f791d59b4cc571f30ccc28075c4edb4afef67c
SHA51286e96f5648d714914469a576693a656390291a547ea9dd5903c85853ac63c68f69129e54f95e5fc7aec781b883232ffaf0d5a536302226f4243d1f2e517e2034
-
Filesize
126B
MD5fdb1fbe7b0423799b2c2f78e214b50f3
SHA1eff0217dcb1769f310d70bdede93f3a923007215
SHA256aa9294bbdb15149badf52073c3a010ce63a8786d7b7c343d2d8acf4d80f4a1e6
SHA5126cc135a06905065ee64534ae6e9dd4fe190e3a4b92f782416609a27d7658273bd41c43411ac4cd67fedcc4d0fc1b4a281b54bed832949fcc0aacd3389afb031c
-
Filesize
421KB
MD58e5dc64def28aee0032ed0c878127c39
SHA1ad9685100b71f0fd4f2b3d65f62894beba1937de
SHA256c121eb7c37949d789f5c4b7fcd4445057f70ab23befde95929e63e3db9c43e9a
SHA512a337bb678534d93f74cdbd46728d87b3c8d4b3d5f5713f176ef4bf6d23d09c636c378fefd992e088611ec62cc559ebd4640a4ea61842a8edee39feffc8e8fab8
-
Filesize
3.9MB
MD5013d85cf626e32fbc89daa124e10f7f0
SHA1b3722239f268ee9a6d3408193081633daac6b05b
SHA25674a5437c4f76f6d88628afc8dfbe7bbd6c2fd6f846cf957ea6262156eb76163c
SHA512952c317ee5e54c2f55ec646cd1d7241f7a4270eccb8d53fdc6cd99963486bcedb9d66f46c099086de12872e95a515922f4bfc47294e6d58e202a425ef42c538a
-
Filesize
1.2MB
MD5a6a397b67ebac717e7ec095bf9b597ee
SHA180c7459654f3564c0cb74a47398d48e0f02cb82f
SHA256847fbe068ff90112d9b76c04587439ee3a3866d8c60466bb4673491d94ddfd89
SHA5120eb5528a4aad4458feddbefb5347d0e2cd84d6240a341ccc425d6ed98d15d8588d8635f21d30af389a2af5ac9537bea56a1d97530ac90e965989e296f1c5d8c8
-
Filesize
314KB
MD5dfee4c679663ffb566a7150bbc1768c7
SHA18f8144d26b141d097df742e4ef4d5c85bba685a3
SHA256f0a82dba182ef5d8fe32bd358473cc7e9ec0d07e0f4a33f50c49d7cccbb5bc7a
SHA51223ff4b55e4d01d7712a3313f9aecd69331cb4fb5fce8b2d8610332a1e7b3ced19bdab64ef37ab2d335179844e176e6bd5a2f5c6562c61451c02b37cb2e58da52