Analysis
-
max time kernel
143s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 08:07
Static task
static1
Behavioral task
behavioral1
Sample
a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe
Resource
win7-20240903-en
General
-
Target
a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe
-
Size
3.3MB
-
MD5
9864f180fe6ba36961d20acb9f61ea62
-
SHA1
dae87fe5dac27c7340be6ee9928720af8c22b9df
-
SHA256
a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb
-
SHA512
c053c61035231752a409dffe4da1a9af2b0f8ceb0fcf265be685d7949f5c16f2424704b49a08e8d0e62d2355d1bbacd5fe92ebe7bc4cf894fcd5f8697f8dcac4
-
SSDEEP
98304:7S5ZkBnLE4okpzJOGESh8v67fPY6bGo1xElDiVZr0TDpP:S+LE4okpzJESOv6zYSGtDiVI
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral1/memory/2580-3-0x0000000003050000-0x0000000003091000-memory.dmp family_blackmoon behavioral1/memory/2580-21-0x0000000003050000-0x0000000003091000-memory.dmp family_blackmoon behavioral1/memory/2428-22-0x0000000002AE0000-0x0000000002B21000-memory.dmp family_blackmoon behavioral1/memory/2428-57-0x0000000002AE0000-0x0000000002B21000-memory.dmp family_blackmoon -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" TGazUb.exe -
Deletes itself 1 IoCs
pid Process 2428 TGazUb.exe -
Executes dropped EXE 1 IoCs
pid Process 2428 TGazUb.exe -
Loads dropped DLL 2 IoCs
pid Process 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" TGazUb.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe -
resource yara_rule behavioral1/memory/2580-4-0x00000000003F0000-0x00000000003FB000-memory.dmp upx behavioral1/memory/2580-2-0x00000000003F0000-0x00000000003FB000-memory.dmp upx behavioral1/memory/2428-18-0x0000000002BC0000-0x0000000002BCB000-memory.dmp upx behavioral1/memory/2428-23-0x0000000002BC0000-0x0000000002BCB000-memory.dmp upx behavioral1/memory/2428-26-0x0000000002BD0000-0x0000000002BDB000-memory.dmp upx behavioral1/memory/2428-27-0x0000000002BD0000-0x0000000002BDB000-memory.dmp upx behavioral1/memory/2428-58-0x0000000002BC0000-0x0000000002BCB000-memory.dmp upx behavioral1/memory/2428-60-0x0000000002BD0000-0x0000000002BDB000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TGazUb.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TGazUb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TGazUb.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RgCnXL Nqmgg\Shell\Open\Command\ = "\"C:\\Users\\Public\\Downloads\\TGazUb.exe\"KmilTKOd MzrcNnZS ijqNxyuQ" TGazUb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.GTtx TGazUb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.GTtx\ = "RgCnXL Nqmgg" TGazUb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RgCnXL Nqmgg\Shell\Open\Command TGazUb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RgCnXL Nqmgg TGazUb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RgCnXL Nqmgg\Shell TGazUb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RgCnXL Nqmgg\Shell\Open TGazUb.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2428 TGazUb.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe 2428 TGazUb.exe 2428 TGazUb.exe 2428 TGazUb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2428 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe 30 PID 2580 wrote to memory of 2428 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe 30 PID 2580 wrote to memory of 2428 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe 30 PID 2580 wrote to memory of 2428 2580 a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" TGazUb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe"C:\Users\Admin\AppData\Local\Temp\a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Public\Downloads\TGazUb.exeWxIFxwSnFNCzrQfC2⤵
- UAC bypass
- Deletes itself
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD59864f180fe6ba36961d20acb9f61ea62
SHA1dae87fe5dac27c7340be6ee9928720af8c22b9df
SHA256a25a7ea81fe613939c111e833e3f6335406f788c2c73220d893d65b8919e61bb
SHA512c053c61035231752a409dffe4da1a9af2b0f8ceb0fcf265be685d7949f5c16f2424704b49a08e8d0e62d2355d1bbacd5fe92ebe7bc4cf894fcd5f8697f8dcac4