Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-10-2023 15:32
Static task
static1
Behavioral task
behavioral1
Sample
847fb7609f53ed334d5affbb07256c21cb5e6f68b1cc14004f5502d714d2a456.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
847fb7609f53ed334d5affbb07256c21cb5e6f68b1cc14004f5502d714d2a456.exe
Resource
win10v2004-20230915-en
General
-
Target
847fb7609f53ed334d5affbb07256c21cb5e6f68b1cc14004f5502d714d2a456.exe
-
Size
14.3MB
-
MD5
db7a7403e5e248d0e96efe67cef73449
-
SHA1
11331c98855fdf42bd94a84687661c682336fea9
-
SHA256
847fb7609f53ed334d5affbb07256c21cb5e6f68b1cc14004f5502d714d2a456
-
SHA512
4fcf43cc7d337dbe17273e217acc6e98617fc153bf1e8295be6ba7b2afe3c7efca86d5e7eddc1fdf1212c74f1cd1803c5b6b0164e4322d89757cc6897b7313f0
-
SSDEEP
196608:h05ZqLIe01fXHitqWTpYCq2+2PFL+gY83fJu38IRAsgqsU8fyguPV:hQqL4i0y1K2IUYMIAsV
Malware Config
Signatures
-
BlackCat
A Rust-based ransomware sold as RaaS first seen in late 2021.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 436 PING.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2120 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2120 AUDIODG.EXE Token: 33 2120 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2120 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 588 wrote to memory of 436 588 cmd.exe 35 PID 588 wrote to memory of 436 588 cmd.exe 35 PID 588 wrote to memory of 436 588 cmd.exe 35 PID 880 wrote to memory of 2392 880 cmd.exe 38 PID 880 wrote to memory of 2392 880 cmd.exe 38 PID 880 wrote to memory of 2392 880 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\847fb7609f53ed334d5affbb07256c21cb5e6f68b1cc14004f5502d714d2a456.exe"C:\Users\Admin\AppData\Local\Temp\847fb7609f53ed334d5affbb07256c21cb5e6f68b1cc14004f5502d714d2a456.exe"1⤵PID:3048
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2848
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\system32\PING.EXEping 1.1.1.12⤵
- Runs ping.exe
PID:436
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\system32\nslookup.exenslookup2⤵PID:2392
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4981⤵
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" SYSTEM1⤵PID:2740
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2828