Analysis
-
max time kernel
90s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
General
-
Target
tmp.exe
-
Size
1.1MB
-
MD5
baa73a9b35bf02d8c56a1286bcd2d714
-
SHA1
a179259548f9e81b65126130342f5b076c8b8a77
-
SHA256
14490c9c139e9bc984781f8143a571e1f1f140c69a7cd12c34fc0bf20abb0889
-
SHA512
02f75dafbd6cabc107fd681d0cc65991b0a21b16b713fba77db4928e78f1da23474ddb4535f8280dc56186da90e41adc7ad8b10ffde2d0b18ff494273021d644
-
SSDEEP
12288:DCwHtUz0qTqcXrwV+XinIBLAx9gKupscZ0PpHTzY8QGWlCL8K7XLlq95ZPFdmUG/:DCwHybsV/IOv6scZ0BzUfCz3+zsw8YS
Malware Config
Extracted
blacknet
v3.7.0 Public
HacKed
http://190.123.44.240
BN[]
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
e162b1333458a713bc6916cc8ac4110c
-
startup
true
-
usb_spread
false
Signatures
-
BlackNET payload 2 IoCs
resource yara_rule behavioral1/memory/2528-958-0x0000000000400000-0x000000000041E000-memory.dmp family_blacknet behavioral1/memory/2172-1929-0x0000000000430000-0x0000000000470000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2528-958-0x0000000000400000-0x000000000041E000-memory.dmp disable_win_def behavioral1/memory/2172-1929-0x0000000000430000-0x0000000000470000-memory.dmp disable_win_def -
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2536-4-0x00000000047F0000-0x000000000488E000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-5-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-6-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-8-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-10-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-12-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-14-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-16-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-18-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-20-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-22-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-24-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-26-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-28-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-30-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-32-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-34-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-36-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-38-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-40-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-42-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-44-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-46-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-48-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-50-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-52-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-54-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-56-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-58-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-60-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-62-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-64-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-66-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 behavioral1/memory/2536-68-0x00000000047F0000-0x0000000004889000-memory.dmp family_zgrat_v1 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sksewdjj.vbs tmp.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sksewdjj.vbs WindowsUpdate.exe -
Executes dropped EXE 2 IoCs
pid Process 2312 WindowsUpdate.exe 2172 WindowsUpdate.exe -
Loads dropped DLL 2 IoCs
pid Process 2528 tmp.exe 2312 WindowsUpdate.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\e162b1333458a713bc6916cc8ac4110c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp.exe" tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\e162b1333458a713bc6916cc8ac4110c = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\MyClient\\WindowsUpdate.exe" tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\e162b1333458a713bc6916cc8ac4110c = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\MyClient\\WindowsUpdate.exe" WindowsUpdate.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2536 set thread context of 2528 2536 tmp.exe 28 PID 2312 set thread context of 2172 2312 WindowsUpdate.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2528 tmp.exe 2528 tmp.exe 2172 WindowsUpdate.exe 2172 WindowsUpdate.exe 2172 WindowsUpdate.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2536 tmp.exe Token: SeDebugPrivilege 2528 tmp.exe Token: SeDebugPrivilege 2312 WindowsUpdate.exe Token: SeDebugPrivilege 2172 WindowsUpdate.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2528 tmp.exe 2528 tmp.exe 2172 WindowsUpdate.exe 2172 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2528 2536 tmp.exe 28 PID 2536 wrote to memory of 2528 2536 tmp.exe 28 PID 2536 wrote to memory of 2528 2536 tmp.exe 28 PID 2536 wrote to memory of 2528 2536 tmp.exe 28 PID 2536 wrote to memory of 2528 2536 tmp.exe 28 PID 2536 wrote to memory of 2528 2536 tmp.exe 28 PID 2536 wrote to memory of 2528 2536 tmp.exe 28 PID 2536 wrote to memory of 2528 2536 tmp.exe 28 PID 2536 wrote to memory of 2528 2536 tmp.exe 28 PID 2528 wrote to memory of 2312 2528 tmp.exe 32 PID 2528 wrote to memory of 2312 2528 tmp.exe 32 PID 2528 wrote to memory of 2312 2528 tmp.exe 32 PID 2528 wrote to memory of 2312 2528 tmp.exe 32 PID 2528 wrote to memory of 2312 2528 tmp.exe 32 PID 2528 wrote to memory of 2312 2528 tmp.exe 32 PID 2528 wrote to memory of 2312 2528 tmp.exe 32 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33 PID 2312 wrote to memory of 2172 2312 WindowsUpdate.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exeC:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2172
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83B
MD51bda7ff3ab57ee35f078aeb89c17198b
SHA1dd1837e07192a78e9d21ec4055dc0dcd1ac9937a
SHA25613abe05c8ea57d6976dd03a9089c744e1e156e54e4a0377580f5be181be94869
SHA512f70f52ad8a7693318bb7332dd2c9a22f8707994fe77aeb15a5694b93df33960f4dc3806a32e137c7d1544a534816e75c1b7c8fab317bb04e59c1df6d7d028723
-
Filesize
1.1MB
MD5baa73a9b35bf02d8c56a1286bcd2d714
SHA1a179259548f9e81b65126130342f5b076c8b8a77
SHA25614490c9c139e9bc984781f8143a571e1f1f140c69a7cd12c34fc0bf20abb0889
SHA51202f75dafbd6cabc107fd681d0cc65991b0a21b16b713fba77db4928e78f1da23474ddb4535f8280dc56186da90e41adc7ad8b10ffde2d0b18ff494273021d644