Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-06-2022 04:22
Static task
static1
Behavioral task
behavioral1
Sample
2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe
Resource
win10v2004-20220414-en
General
-
Target
2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe
-
Size
224KB
-
MD5
a533827a1afdaa39eeabf6d2fc70ab60
-
SHA1
4836be47715f5b0978bba899de0e225f1e2aafbc
-
SHA256
2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd
-
SHA512
145a0a2c2cd99760b9ffd4665f3bacba8069bd6fcc8a27850ea3c0ba8798a611d69cb97a7cb54725cce5f124aa1d42c01e9e7d3681c593f1fa7021a3f4973e04
Malware Config
Signatures
-
suricata: ET MALWARE BlackshadesRAT Reporting
suricata: ET MALWARE BlackshadesRAT Reporting
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exepid process 1724 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exepid process 1724 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe 1724 2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe"C:\Users\Admin\AppData\Local\Temp\2acc3cd85919a10811667e47eddb3556e88b84ea1dcbe998e504a3c74e74c2fd.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1724-54-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB