Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 07:51
Behavioral task
behavioral1
Sample
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe
Resource
win7-20241010-en
General
-
Target
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe
-
Size
13.4MB
-
MD5
cf941555a37a8e746db60544ca4b61a1
-
SHA1
cf097b6731d0544772bd5a4595b54c11b631d3ea
-
SHA256
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684
-
SHA512
4ededa1eeb05a96f0c8621049426a419cc3815d0ab22aa1994c257bb922ac44cf16c9ac743af6e0ba2fd0f647e701aa0e7b0605840a346dd280ed29deef8a851
-
SSDEEP
393216:8u1LuYwYuYgu1LuYwYuYIu1LuYwYuYgu1LuYwYuYb:/
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1088-0-0x0000000000400000-0x00000000004AB000-memory.dmp family_blackmoon behavioral2/memory/1088-4-0x0000000000400000-0x00000000004AB000-memory.dmp family_blackmoon C:\Windows\Fonts\zucfao\jqcmafs.exe family_blackmoon behavioral2/memory/2644-8-0x0000000000400000-0x00000000004AB000-memory.dmp family_blackmoon -
Executes dropped EXE 2 IoCs
Processes:
jqcmafs.exejqcmafs.exepid process 2644 jqcmafs.exe 3916 jqcmafs.exe -
Drops file in System32 directory 4 IoCs
Processes:
jqcmafs.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 jqcmafs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE jqcmafs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies jqcmafs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 jqcmafs.exe -
Drops file in Windows directory 2 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exedescription ioc process File created \??\c:\windows\fonts\zucfao\jqcmafs.exe 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe File opened for modification \??\c:\windows\fonts\zucfao\jqcmafs.exe 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1772 3916 WerFault.exe jqcmafs.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
jqcmafs.exe0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.execmd.exePING.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jqcmafs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 1924 cmd.exe 208 PING.EXE -
Modifies data under HKEY_USERS 8 IoCs
Processes:
jqcmafs.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" jqcmafs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix jqcmafs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" jqcmafs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" jqcmafs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ jqcmafs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" jqcmafs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" jqcmafs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" jqcmafs.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exejqcmafs.exejqcmafs.exepid process 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 2644 jqcmafs.exe 2644 jqcmafs.exe 2644 jqcmafs.exe 2644 jqcmafs.exe 2644 jqcmafs.exe 2644 jqcmafs.exe 2644 jqcmafs.exe 2644 jqcmafs.exe 2644 jqcmafs.exe 2644 jqcmafs.exe 3916 jqcmafs.exe 3916 jqcmafs.exe 3916 jqcmafs.exe 3916 jqcmafs.exe 3916 jqcmafs.exe 3916 jqcmafs.exe 3916 jqcmafs.exe 3916 jqcmafs.exe 3916 jqcmafs.exe 3916 jqcmafs.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exepid process 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exejqcmafs.exejqcmafs.exedescription pid process Token: SeDebugPrivilege 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe Token: SeDebugPrivilege 2644 jqcmafs.exe Token: SeDebugPrivilege 3916 jqcmafs.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exejqcmafs.exejqcmafs.exepid process 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 2644 jqcmafs.exe 3916 jqcmafs.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.execmd.exedescription pid process target process PID 1088 wrote to memory of 1924 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe cmd.exe PID 1088 wrote to memory of 1924 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe cmd.exe PID 1088 wrote to memory of 1924 1088 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe cmd.exe PID 1924 wrote to memory of 208 1924 cmd.exe PING.EXE PID 1924 wrote to memory of 208 1924 cmd.exe PING.EXE PID 1924 wrote to memory of 208 1924 cmd.exe PING.EXE PID 1924 wrote to memory of 2644 1924 cmd.exe jqcmafs.exe PID 1924 wrote to memory of 2644 1924 cmd.exe jqcmafs.exe PID 1924 wrote to memory of 2644 1924 cmd.exe jqcmafs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe"C:\Users\Admin\AppData\Local\Temp\0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start c:\windows\fonts\zucfao\jqcmafs.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:208
-
-
\??\c:\windows\fonts\zucfao\jqcmafs.exec:\windows\fonts\zucfao\jqcmafs.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
-
\??\c:\windows\fonts\zucfao\jqcmafs.exec:\windows\fonts\zucfao\jqcmafs.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 13282⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3916 -ip 39161⤵PID:4660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.5MB
MD5ecc3732bf61b3e4dffc9b7f37dbeca3c
SHA1a469aca39cb7ca9de5ebb152e47ba43c4f6118ff
SHA256cbe6aaec0c3ab4cc5c3da5f1354bf3a8bfddbd36deb1a463ff2011d19f9b4b23
SHA512a59faea4c7a459f3450e6a8ae6a901685638d3c81d78bb0f41e0720d49abd6c4d50a7222bb39417a69653f6ca81310de03e763de6af148e320aa4bf1bb199b57