Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 10:29

General

  • Target

    45e418caa5423dff039013ff8b9b7545e624ab61f1fec583db210b5ad8386db6.exe

  • Size

    224KB

  • MD5

    c6ceee65afbcaee8851b6801e4917dfe

  • SHA1

    681d0594cbc33afdbe7fd0dab805ad1cc666301a

  • SHA256

    45e418caa5423dff039013ff8b9b7545e624ab61f1fec583db210b5ad8386db6

  • SHA512

    b4c4923923a3272ac9dfe07d985500b168670f8a45ec5aa7753088d4d66b421723243d5f90c7b9b01320b8f50611d5189f26f7e2e2b12441572983d9e037dd80

Malware Config

Signatures

  • Vobfus

    A widespread worm which spreads via network drives and removable media.

  • suricata: ET MALWARE BlackshadesRAT Reporting

    suricata: ET MALWARE BlackshadesRAT Reporting

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45e418caa5423dff039013ff8b9b7545e624ab61f1fec583db210b5ad8386db6.exe
    "C:\Users\Admin\AppData\Local\Temp\45e418caa5423dff039013ff8b9b7545e624ab61f1fec583db210b5ad8386db6.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:1904

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1904-54-0x0000000000400000-0x0000000000434000-memory.dmp
    Filesize

    208KB