Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 09:48
Behavioral task
behavioral1
Sample
9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe
Resource
win7-20240903-en
General
-
Target
9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe
-
Size
3.4MB
-
MD5
33d06725feb361eebf2642a397c6496b
-
SHA1
1a7ecbfcf2cb6656efe907e4c51c3def95dc0305
-
SHA256
9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a
-
SHA512
ff386511e59a2337020b4667793b556f768d81b8be62ed015f7fa7ae72d25c21cd94a168f2ca8cbbb0bf53046e84832d9c88a80f5bda12300dc48058c04a934b
-
SSDEEP
49152:ltI2W5b62TNfiQuHoXUF+cZp3iWcvct3get:TWV62zVUF+cZp3iWcvcnt
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 13 IoCs
resource yara_rule behavioral2/memory/3116-2-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-46-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-45-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-47-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-48-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-49-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-50-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-51-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-52-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-53-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-54-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-55-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon behavioral2/memory/3116-80-0x0000000000400000-0x0000000000787000-memory.dmp family_blackmoon -
resource yara_rule behavioral2/memory/3116-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3116-3-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main 9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "www.2345.com/?keyybc" 9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 1048 msedge.exe 1048 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3116 9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe 3116 9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe 3116 9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3116 wrote to memory of 1048 3116 9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe 84 PID 3116 wrote to memory of 1048 3116 9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe 84 PID 1048 wrote to memory of 2504 1048 msedge.exe 85 PID 1048 wrote to memory of 2504 1048 msedge.exe 85 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 3236 1048 msedge.exe 86 PID 1048 wrote to memory of 4480 1048 msedge.exe 87 PID 1048 wrote to memory of 4480 1048 msedge.exe 87 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88 PID 1048 wrote to memory of 3432 1048 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe"C:\Users\Admin\AppData\Local\Temp\9674a426da58821b1a356f1927feb7fca51f1a41b0059a8bf970c0ef470b840a.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://qm.qq.com/q/h0VH5a81462⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb50d46f8,0x7fffb50d4708,0x7fffb50d47183⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,12173616456131485520,14407434360859556998,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:23⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,12173616456131485520,14407434360859556998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,12173616456131485520,14407434360859556998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:83⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,12173616456131485520,14407434360859556998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,12173616456131485520,14407434360859556998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,12173616456131485520,14407434360859556998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:13⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,12173616456131485520,14407434360859556998,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
6KB
MD52cfd400c8dbdfd6f77a03fab70ea8276
SHA12aaec209ed67ddf4a8f344a6c16b7be94e5906ae
SHA2563dd6c4d98c8c87397674e9bfa6db2156800aa96a02cec4b1a7e0cdb872062f52
SHA51242a34e8e4e08108bb205c2a453a7512de0de91390ca52370869e52a0e2ad0f16377ca3ad991aa4934e8e2c3f2e918f4092e377769ca97be97ef09c049c611663
-
Filesize
5KB
MD56b6a76d63a9d65cfd4f927898564b026
SHA1eb9e01a9b6aed009f821605a3a301db1ce41a70e
SHA256fd1730f2ba1f7c6310eb0d6967092b408f45b61af3c55ac8452ec13613efc3b0
SHA51250a97713801ba57a4a482013fdeebc7cb0dce9cae0cfce31103405afec1221ec362b256da6bd8288178f3eeeaa29b810457262ce468e402432c4c633f04fd377
-
Filesize
10KB
MD52c0a3a5b0fa5e409c2b26f7b270030f7
SHA135ee38bbace31d5026a246e3684a28f519967715
SHA256c2815054efe2e5958bbe4cb9a754cda65d9d2efbe141b7060392dbd2db0377a1
SHA5126483226a07ee9447274809a405d682b998feebe4498a1c4d9484b709750ccc58210d1e7dee9707229138d3bd31973da5cfcd6da804124e7acabde02cd9eba9d4