Analysis
-
max time kernel
92s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 07:53
Behavioral task
behavioral1
Sample
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe
Resource
win7-20241010-en
General
-
Target
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe
-
Size
13.4MB
-
MD5
cf941555a37a8e746db60544ca4b61a1
-
SHA1
cf097b6731d0544772bd5a4595b54c11b631d3ea
-
SHA256
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684
-
SHA512
4ededa1eeb05a96f0c8621049426a419cc3815d0ab22aa1994c257bb922ac44cf16c9ac743af6e0ba2fd0f647e701aa0e7b0605840a346dd280ed29deef8a851
-
SSDEEP
393216:8u1LuYwYuYgu1LuYwYuYIu1LuYwYuYgu1LuYwYuYb:/
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1676-0-0x0000000000400000-0x00000000004AB000-memory.dmp family_blackmoon behavioral2/memory/1676-4-0x0000000000400000-0x00000000004AB000-memory.dmp family_blackmoon C:\Windows\Fonts\eibhcsy\bijuoqx.exe family_blackmoon behavioral2/memory/1216-8-0x0000000000400000-0x00000000004AB000-memory.dmp family_blackmoon -
Executes dropped EXE 2 IoCs
Processes:
bijuoqx.exebijuoqx.exepid process 1216 bijuoqx.exe 4860 bijuoqx.exe -
Drops file in System32 directory 4 IoCs
Processes:
bijuoqx.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 bijuoqx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE bijuoqx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies bijuoqx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 bijuoqx.exe -
Drops file in Windows directory 2 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exedescription ioc process File created \??\c:\windows\fonts\eibhcsy\bijuoqx.exe 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe File opened for modification \??\c:\windows\fonts\eibhcsy\bijuoqx.exe 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 216 4860 WerFault.exe bijuoqx.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.execmd.exePING.EXEbijuoqx.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bijuoqx.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 2088 cmd.exe 4840 PING.EXE -
Modifies data under HKEY_USERS 8 IoCs
Processes:
bijuoqx.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" bijuoqx.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" bijuoqx.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" bijuoqx.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" bijuoqx.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix bijuoqx.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" bijuoqx.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" bijuoqx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ bijuoqx.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exebijuoqx.exebijuoqx.exepid process 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1216 bijuoqx.exe 1216 bijuoqx.exe 1216 bijuoqx.exe 1216 bijuoqx.exe 1216 bijuoqx.exe 1216 bijuoqx.exe 1216 bijuoqx.exe 1216 bijuoqx.exe 1216 bijuoqx.exe 1216 bijuoqx.exe 4860 bijuoqx.exe 4860 bijuoqx.exe 4860 bijuoqx.exe 4860 bijuoqx.exe 4860 bijuoqx.exe 4860 bijuoqx.exe 4860 bijuoqx.exe 4860 bijuoqx.exe 4860 bijuoqx.exe 4860 bijuoqx.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exepid process 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exebijuoqx.exebijuoqx.exedescription pid process Token: SeDebugPrivilege 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe Token: SeDebugPrivilege 1216 bijuoqx.exe Token: SeDebugPrivilege 4860 bijuoqx.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exebijuoqx.exebijuoqx.exepid process 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe 1216 bijuoqx.exe 4860 bijuoqx.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.execmd.exedescription pid process target process PID 1676 wrote to memory of 2088 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe cmd.exe PID 1676 wrote to memory of 2088 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe cmd.exe PID 1676 wrote to memory of 2088 1676 0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe cmd.exe PID 2088 wrote to memory of 4840 2088 cmd.exe PING.EXE PID 2088 wrote to memory of 4840 2088 cmd.exe PING.EXE PID 2088 wrote to memory of 4840 2088 cmd.exe PING.EXE PID 2088 wrote to memory of 1216 2088 cmd.exe bijuoqx.exe PID 2088 wrote to memory of 1216 2088 cmd.exe bijuoqx.exe PID 2088 wrote to memory of 1216 2088 cmd.exe bijuoqx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe"C:\Users\Admin\AppData\Local\Temp\0162b9646481939bfadca3f7c88175a1fa3a22cf13d34b04905ff350c4310684.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start c:\windows\fonts\eibhcsy\bijuoqx.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4840
-
-
\??\c:\windows\fonts\eibhcsy\bijuoqx.exec:\windows\fonts\eibhcsy\bijuoqx.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1216
-
-
-
\??\c:\windows\fonts\eibhcsy\bijuoqx.exec:\windows\fonts\eibhcsy\bijuoqx.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 13242⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4860 -ip 48601⤵PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.5MB
MD5f3427bf8198d4fdcfde811d2bec729c6
SHA10077a2048854dd82c462ac99a9e38b01a8a8c512
SHA2563a89b50d7e72251d51ecd562d76869d0b67ddb26e178f70fc99a4c483c63141d
SHA512d78a87390eb5ed7a67529c025dba03551b728018a3ec01d0956614f376c5a3f711fc68a9562f52964d3b1f3523009db944571581d571e144645eab131a1000ab