Analysis
-
max time kernel
202s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 04:46
Static task
static1
Behavioral task
behavioral1
Sample
41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe
Resource
win10v2004-20220414-en
General
-
Target
41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe
-
Size
224KB
-
MD5
af142237283dc80f2956103f5f671b88
-
SHA1
823228a9978247e803a4b3e0b4a3517b9065b741
-
SHA256
41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0
-
SHA512
82374490f0e130c2660a788ec58abe682f00123c9b849fefb5cdf8abd78a0ee572cab94a62653780848ca3dbe1584ec0b92cebaa5207fc0e7a6c4154aefb8bd7
Malware Config
Signatures
-
suricata: ET MALWARE BlackshadesRAT Reporting
suricata: ET MALWARE BlackshadesRAT Reporting
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\VLXHCMT5KJ = "C:\\Users\\Admin\\AppData\\Roaming\\AG58FPQON.exe" 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exepid process 2008 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exepid process 2008 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe 2008 41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe"C:\Users\Admin\AppData\Local\Temp\41bcc6e4e4ce538872c67fc10c9c5ee895ddc1f19b92d6cb8553c04ff6feb9f0.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2008-54-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB