Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2023 09:36
Behavioral task
behavioral1
Sample
邮箱升级补丁.exe
Resource
win7-20230220-en
General
-
Target
邮箱升级补丁.exe
-
Size
532KB
-
MD5
01edc3a3885e09d53064331159173217
-
SHA1
6dfbc89921b6f73aea6a71f367173dc284c2ab6d
-
SHA256
cc86d62510abdeea2b7162d0e1db859a6be677e3585099678f3d9d8683df81aa
-
SHA512
879e53c271dbcffd28ad0e227c9e2ed1cf6a4b3ad915a46ef5460b298415db64068d9001743965e9511e398040187f29ed8e0dbec94440547365876764bd64cc
-
SSDEEP
3072:QkvZbBLzNa6haoKpaagaNSTtu1xF0DN+ew3q6IL99pGU2PlwFaEFkVUX:QkvZbBLzNa6I5xNSYxuN+e7xSlQS+
Malware Config
Signatures
-
Detect Blackmoon payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/100-147-0x00000000035A0000-0x00000000035D9000-memory.dmp family_blackmoon behavioral2/memory/100-148-0x00000000035A0000-0x00000000035D9000-memory.dmp family_blackmoon behavioral2/memory/100-151-0x00000000035A0000-0x00000000035D9000-memory.dmp family_blackmoon behavioral2/memory/100-173-0x0000000003740000-0x000000000378B000-memory.dmp family_blackmoon behavioral2/memory/100-193-0x0000000003740000-0x000000000378B000-memory.dmp family_blackmoon behavioral2/memory/100-194-0x0000000003740000-0x000000000378B000-memory.dmp family_blackmoon behavioral2/memory/100-199-0x00000000035A0000-0x00000000035D9000-memory.dmp family_blackmoon -
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/100-181-0x0000000010000000-0x0000000010003000-memory.dmp family_gh0strat behavioral2/memory/100-180-0x0000000010001000-0x000000001000F000-memory.dmp family_gh0strat behavioral2/memory/100-182-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat -
Loads dropped DLL 3 IoCs
Processes:
邮箱升级补丁.exepid process 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
邮箱升级补丁.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Software\Microsoft\Windows\CurrentVersion\Run 邮箱升级补丁.exe Set value (str) \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qdatem = "C:\\Users\\Public\\Documents\\Applicationrpsen.exe" 邮箱升级补丁.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
邮箱升级补丁.exetaskmgr.exepid process 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 3212 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
taskmgr.exe邮箱升级补丁.exedescription pid process Token: SeDebugPrivilege 3212 taskmgr.exe Token: SeSystemProfilePrivilege 3212 taskmgr.exe Token: SeCreateGlobalPrivilege 3212 taskmgr.exe Token: 33 100 邮箱升级补丁.exe Token: SeIncBasePriorityPrivilege 100 邮箱升级补丁.exe Token: 33 100 邮箱升级补丁.exe Token: SeIncBasePriorityPrivilege 100 邮箱升级补丁.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe 3212 taskmgr.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
邮箱升级补丁.exepid process 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe 100 邮箱升级补丁.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\邮箱升级补丁.exe"C:\Users\Admin\AppData\Local\Temp\邮箱升级补丁.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:100
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3212
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
Filesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
Filesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
Filesize
2KB
MD57943effe67a4647e06def2348949020e
SHA1eabd561f0639a975de259633f63896d82c3f878d
SHA2563fac47db92d581b2daef7a4f9493be2fe441041e5158101d80873d05808d5cfa
SHA512c9db1962e7457c94426c2a5c7f439736697d4399db6982c45357459d58805daa4a9d297912135488b6990e265ffa59d687fd5ba43717aab46ccc212083ef5003
-
Filesize
172B
MD5e16a3505366aa1ef004814b9af7defa0
SHA11c0bc113ba289163aa9bd8bba0063518cd0a7982
SHA2564247b7404f01a9ef859aaf9279794ac2cd7c9de07fc3f02f7e24fc92886978b0
SHA512adb6a83b13eaeccf10dbf046712feb88e604982694a3fc0370558509e0543a4955d869798fd851b615345919317c9e31f09cb63ce75576cb03e14f5cce15ffca