Analysis
-
max time kernel
102s -
max time network
231s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-04-2023 08:43
Behavioral task
behavioral1
Sample
tsetup.2.4.1.exe
Resource
win7-20230220-en
General
-
Target
tsetup.2.4.1.exe
-
Size
127.7MB
-
MD5
efe1989f03f440b7a16d5ce44839a406
-
SHA1
03c6b96031cf76750cf36adbdf4c0d9a13c95b0d
-
SHA256
379710c4ff31e416071255e22dc12a42cd701c0bbe6e56b0118a6d9955b6b4dc
-
SHA512
972bb5025c552dc0b9986eb90417e4e8045b165d6cbcbbf24661f4e5d34978292ae163addec8551d0aa23b13c1084587258acb44bbcf96ff83e8b3a283a7a932
-
SSDEEP
3145728:e1JGH/t1L28a3wsppUHB7lbVtI92tIE+kspK:Ff7fa/nUHvbc92tlZOK
Malware Config
Signatures
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule C:\Users\Public\DocumentsTdxFKp35\StarBurn.dll family_blackmoon \Users\Public\DocumentsTdxFKp35\StarBurn.dll family_blackmoon -
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/588-64-0x0000000000260000-0x000000000028D000-memory.dmp family_gh0strat behavioral1/memory/588-68-0x0000000000260000-0x000000000028D000-memory.dmp family_gh0strat behavioral1/memory/588-73-0x0000000008A50000-0x0000000008B95000-memory.dmp family_gh0strat behavioral1/memory/588-74-0x0000000008A50000-0x0000000008B95000-memory.dmp family_gh0strat -
Modifies RDP port number used by Windows 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
TdxFK.exepid process 588 TdxFK.exe -
Loads dropped DLL 2 IoCs
Processes:
tsetup.2.4.1.exeTdxFK.exepid process 1364 tsetup.2.4.1.exe 588 TdxFK.exe -
Processes:
resource yara_rule behavioral1/memory/588-70-0x0000000008A50000-0x0000000008B95000-memory.dmp upx behavioral1/memory/588-73-0x0000000008A50000-0x0000000008B95000-memory.dmp upx behavioral1/memory/588-74-0x0000000008A50000-0x0000000008B95000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
tsetup.2.4.1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run tsetup.2.4.1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveSetup = "C:\\Users\\Public\\DocumentsTdxFKp35\\TdxFK.exe" tsetup.2.4.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
TdxFK.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TdxFK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TdxFK.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
TdxFK.exepid process 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe 588 TdxFK.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
tsetup.2.4.1.exepid process 1364 tsetup.2.4.1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
TdxFK.exepid process 588 TdxFK.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
tsetup.2.4.1.exedescription pid process target process PID 1364 wrote to memory of 588 1364 tsetup.2.4.1.exe TdxFK.exe PID 1364 wrote to memory of 588 1364 tsetup.2.4.1.exe TdxFK.exe PID 1364 wrote to memory of 588 1364 tsetup.2.4.1.exe TdxFK.exe PID 1364 wrote to memory of 588 1364 tsetup.2.4.1.exe TdxFK.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tsetup.2.4.1.exe"C:\Users\Admin\AppData\Local\Temp\tsetup.2.4.1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Public\DocumentsTdxFKp35\TdxFK.exeC:\Users\Public\DocumentsTdxFKp35\TdxFK.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87.9MB
MD58c475f447c622613bb600b5d93726281
SHA1e31cabc5ef628ee5c391133f683b3ee5ad8a9479
SHA256dc452e4661385c03b761712e7f86b4af1c3e05c2e16658142ccba165142c72a9
SHA512f4478c37fd4810c60dd07528d211a363338b033def5cb092026ac49492a0a237885448fed21314bb6717a3bc5527b94edd3df109e44b828b19b99f56ad2d2a1b
-
Filesize
905KB
MD5790c885de6cd9b130bbfb8332652b0fc
SHA15c9d3aaa43c7982e98d33c7d5c50e42fd84493df
SHA256c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b
SHA5127cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304
-
Filesize
905KB
MD5790c885de6cd9b130bbfb8332652b0fc
SHA15c9d3aaa43c7982e98d33c7d5c50e42fd84493df
SHA256c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b
SHA5127cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304
-
Filesize
87.9MB
MD58c475f447c622613bb600b5d93726281
SHA1e31cabc5ef628ee5c391133f683b3ee5ad8a9479
SHA256dc452e4661385c03b761712e7f86b4af1c3e05c2e16658142ccba165142c72a9
SHA512f4478c37fd4810c60dd07528d211a363338b033def5cb092026ac49492a0a237885448fed21314bb6717a3bc5527b94edd3df109e44b828b19b99f56ad2d2a1b
-
Filesize
905KB
MD5790c885de6cd9b130bbfb8332652b0fc
SHA15c9d3aaa43c7982e98d33c7d5c50e42fd84493df
SHA256c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b
SHA5127cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304