Analysis
-
max time kernel
155s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-04-2023 10:14
Behavioral task
behavioral1
Sample
up-tset-x64.3.9.5.exe
Resource
win7-20230220-en
General
-
Target
up-tset-x64.3.9.5.exe
-
Size
127.7MB
-
MD5
e48a2e55f1a45d86668c9d8dca33a015
-
SHA1
7c84c4bb3776511c925337a550489a0a9084455b
-
SHA256
6757bdf3922a9c57be8b2b73bc875a34487e27e3f8161f7f94598e13dfab61aa
-
SHA512
5fdfcdf8fa4ad2bd4b86ff5e08d08517abb1314201f20442b3b081180414937f48c0e4d029dcd5978f3d8a9a796e985f5d6150795a1d954b9828323e0da9a341
-
SSDEEP
3145728:ntCyIAERU5gLBva3wsppUHB7lbVtI92tIE+kspv:nMyS5a/nUHvbc92tlZOv
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule C:\Users\Public\DocumentsZyowaVJt\liteav.dll family_blackmoon \Users\Public\DocumentsZyowaVJt\liteav.dll family_blackmoon -
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/904-63-0x0000000000230000-0x000000000025D000-memory.dmp family_gh0strat behavioral1/memory/904-64-0x0000000000230000-0x000000000025D000-memory.dmp family_gh0strat behavioral1/memory/904-68-0x0000000000230000-0x000000000025D000-memory.dmp family_gh0strat -
Modifies RDP port number used by Windows 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
Zyowa.exepid process 904 Zyowa.exe -
Loads dropped DLL 2 IoCs
Processes:
up-tset-x64.3.9.5.exeZyowa.exepid process 1928 up-tset-x64.3.9.5.exe 904 Zyowa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
up-tset-x64.3.9.5.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run up-tset-x64.3.9.5.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveSetup = "C:\\Users\\Public\\DocumentsZyowaVJt\\Zyowa.exe" up-tset-x64.3.9.5.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Zyowa.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Zyowa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Zyowa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Zyowa.exepid process 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe 904 Zyowa.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
up-tset-x64.3.9.5.exepid process 1928 up-tset-x64.3.9.5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
up-tset-x64.3.9.5.exedescription pid process target process PID 1928 wrote to memory of 904 1928 up-tset-x64.3.9.5.exe Zyowa.exe PID 1928 wrote to memory of 904 1928 up-tset-x64.3.9.5.exe Zyowa.exe PID 1928 wrote to memory of 904 1928 up-tset-x64.3.9.5.exe Zyowa.exe PID 1928 wrote to memory of 904 1928 up-tset-x64.3.9.5.exe Zyowa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\up-tset-x64.3.9.5.exe"C:\Users\Admin\AppData\Local\Temp\up-tset-x64.3.9.5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Public\DocumentsZyowaVJt\Zyowa.exeC:\Users\Public\DocumentsZyowaVJt\Zyowa.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:904
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694KB
MD590e3fb138dbfe3f3e9800bed07c1a4db
SHA17f394811b88d28494e5c24dbe516a5df848dec31
SHA256be40eb8f02ddb9f423e223c673c555d104cc07e046708082fd676938cdecfb6d
SHA51257cae097f559cc3237d5d7a8b24f78dc28bb22c9ca4660b8c3cb95a75f707a39d181177b724016340597391f970804433e2c280bea6bae8b73938d30737039ef
-
Filesize
87.9MB
MD5d042e95a7c68eb9c3f6b8a91ae346ad1
SHA10725dfa94d13c759abb86798e0bf228d2c7d2aa5
SHA25616b1d3d34da9f9f3eb7c166257774f717eaabe461d8d46ac460646e18b746f5f
SHA512e79e67e7f831d7109b63bbb10592f3283031cd8bde34d0490315a758514ba6dab449051a2f80f40014f2336edcb502b0364a6dbff8c76691dcd50e7da2a6cb9e
-
Filesize
694KB
MD590e3fb138dbfe3f3e9800bed07c1a4db
SHA17f394811b88d28494e5c24dbe516a5df848dec31
SHA256be40eb8f02ddb9f423e223c673c555d104cc07e046708082fd676938cdecfb6d
SHA51257cae097f559cc3237d5d7a8b24f78dc28bb22c9ca4660b8c3cb95a75f707a39d181177b724016340597391f970804433e2c280bea6bae8b73938d30737039ef
-
Filesize
87.9MB
MD5d042e95a7c68eb9c3f6b8a91ae346ad1
SHA10725dfa94d13c759abb86798e0bf228d2c7d2aa5
SHA25616b1d3d34da9f9f3eb7c166257774f717eaabe461d8d46ac460646e18b746f5f
SHA512e79e67e7f831d7109b63bbb10592f3283031cd8bde34d0490315a758514ba6dab449051a2f80f40014f2336edcb502b0364a6dbff8c76691dcd50e7da2a6cb9e