Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 12:22
Behavioral task
behavioral1
Sample
8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe
Resource
win7-20240708-en
General
-
Target
8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe
-
Size
13.6MB
-
MD5
a46ad13e35167f886a624e60c897aeba
-
SHA1
5b5139619b9d22ef17467ebb7d22ab7b0ce346cd
-
SHA256
8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918
-
SHA512
3133d632bf7cf10a33b07c2f947b99859c9c67e24174c752791a25f95b287420397d4c7d01c0d86c988b05fe98b7fb43dd4c2a78a292e23a04d818c6512354cb
-
SSDEEP
393216:8u1L+YuY+Yiu1L+YuY+Ywu1L+YuY+Yiu1L+YuY+Yj:X
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1956-0-0x0000000000400000-0x00000000004AB000-memory.dmp family_blackmoon behavioral1/memory/1956-4-0x0000000000400000-0x00000000004AB000-memory.dmp family_blackmoon behavioral1/files/0x0008000000016ce0-5.dat family_blackmoon behavioral1/memory/2136-9-0x0000000000400000-0x00000000004AB000-memory.dmp family_blackmoon -
Executes dropped EXE 2 IoCs
Processes:
byraqci.exebyraqci.exepid Process 2136 byraqci.exe 2452 byraqci.exe -
Loads dropped DLL 4 IoCs
Processes:
cmd.exeWerFault.exepid Process 288 cmd.exe 288 cmd.exe 2928 WerFault.exe 2928 WerFault.exe -
Drops file in System32 directory 1 IoCs
Processes:
byraqci.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat byraqci.exe -
Drops file in Windows directory 2 IoCs
Processes:
8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exedescription ioc Process File created \??\c:\windows\fonts\apdhevz\byraqci.exe 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe File opened for modification \??\c:\windows\fonts\apdhevz\byraqci.exe 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2928 2452 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
PING.EXEbyraqci.exe8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byraqci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 288 cmd.exe 2448 PING.EXE -
Modifies data under HKEY_USERS 24 IoCs
Processes:
byraqci.exedescription ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix byraqci.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" byraqci.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad byraqci.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0189000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 byraqci.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F2A3952-07A3-4F3D-92F9-0DB5FA2BDA16}\ce-e2-22-04-92-a0 byraqci.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-e2-22-04-92-a0\WpadDecisionReason = "1" byraqci.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-e2-22-04-92-a0\WpadDecision = "0" byraqci.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 byraqci.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" byraqci.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ byraqci.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F2A3952-07A3-4F3D-92F9-0DB5FA2BDA16}\WpadNetworkName = "Network 3" byraqci.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-e2-22-04-92-a0\WpadDecisionTime = 80c82a49d93cdb01 byraqci.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections byraqci.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" byraqci.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F2A3952-07A3-4F3D-92F9-0DB5FA2BDA16} byraqci.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F2A3952-07A3-4F3D-92F9-0DB5FA2BDA16}\WpadDecisionTime = 80c82a49d93cdb01 byraqci.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" byraqci.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F2A3952-07A3-4F3D-92F9-0DB5FA2BDA16}\WpadDecisionReason = "1" byraqci.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8F2A3952-07A3-4F3D-92F9-0DB5FA2BDA16}\WpadDecision = "0" byraqci.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-e2-22-04-92-a0 byraqci.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings byraqci.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" byraqci.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings byraqci.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 byraqci.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exebyraqci.exebyraqci.exepid Process 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe 2136 byraqci.exe 2136 byraqci.exe 2136 byraqci.exe 2136 byraqci.exe 2136 byraqci.exe 2452 byraqci.exe 2452 byraqci.exe 2452 byraqci.exe 2452 byraqci.exe 2452 byraqci.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exepid Process 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exebyraqci.exebyraqci.exedescription pid Process Token: SeDebugPrivilege 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe Token: SeDebugPrivilege 2136 byraqci.exe Token: SeDebugPrivilege 2452 byraqci.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exebyraqci.exebyraqci.exepid Process 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe 2136 byraqci.exe 2452 byraqci.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.execmd.exebyraqci.exedescription pid Process procid_target PID 1956 wrote to memory of 288 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe 30 PID 1956 wrote to memory of 288 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe 30 PID 1956 wrote to memory of 288 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe 30 PID 1956 wrote to memory of 288 1956 8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe 30 PID 288 wrote to memory of 2448 288 cmd.exe 32 PID 288 wrote to memory of 2448 288 cmd.exe 32 PID 288 wrote to memory of 2448 288 cmd.exe 32 PID 288 wrote to memory of 2448 288 cmd.exe 32 PID 288 wrote to memory of 2136 288 cmd.exe 33 PID 288 wrote to memory of 2136 288 cmd.exe 33 PID 288 wrote to memory of 2136 288 cmd.exe 33 PID 288 wrote to memory of 2136 288 cmd.exe 33 PID 2452 wrote to memory of 2928 2452 byraqci.exe 36 PID 2452 wrote to memory of 2928 2452 byraqci.exe 36 PID 2452 wrote to memory of 2928 2452 byraqci.exe 36 PID 2452 wrote to memory of 2928 2452 byraqci.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe"C:\Users\Admin\AppData\Local\Temp\8c6d3bf3629975fccadbd21d3396879ea8bee6fd21b086d329f51b2cb2f71918.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start c:\windows\fonts\apdhevz\byraqci.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2448
-
-
\??\c:\windows\fonts\apdhevz\byraqci.exec:\windows\fonts\apdhevz\byraqci.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
-
\??\c:\windows\fonts\apdhevz\byraqci.exec:\windows\fonts\apdhevz\byraqci.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 6642⤵
- Loads dropped DLL
- Program crash
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.6MB
MD54a79be736bd1a2b207390fa5b7689761
SHA1e3ce94118ae2e51cbd3edbd1ad3da527f6d48ff7
SHA256dcf46068838ae793fd7c076696c05a252a14fb3611413a0bee660681cfdbca3c
SHA5121a73330be183c082d4d74c10e193b0c60118d91fccfb9485c1a4cdd9ef5215c3abc306df5c31cc55f025eb73c874c43c864e474bdcbdb2431b11f7a6a86f4a7f