Analysis
-
max time kernel
99s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-02-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
General
-
Target
tmp.exe
-
Size
1.1MB
-
MD5
baa73a9b35bf02d8c56a1286bcd2d714
-
SHA1
a179259548f9e81b65126130342f5b076c8b8a77
-
SHA256
14490c9c139e9bc984781f8143a571e1f1f140c69a7cd12c34fc0bf20abb0889
-
SHA512
02f75dafbd6cabc107fd681d0cc65991b0a21b16b713fba77db4928e78f1da23474ddb4535f8280dc56186da90e41adc7ad8b10ffde2d0b18ff494273021d644
-
SSDEEP
12288:DCwHtUz0qTqcXrwV+XinIBLAx9gKupscZ0PpHTzY8QGWlCL8K7XLlq95ZPFdmUG/:DCwHybsV/IOv6scZ0BzUfCz3+zsw8YS
Malware Config
Extracted
blacknet
v3.7.0 Public
HacKed
http://190.123.44.240
BN[]
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
e162b1333458a713bc6916cc8ac4110c
-
startup
true
-
usb_spread
false
Signatures
-
BlackNET payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/556-956-0x0000000000400000-0x000000000041E000-memory.dmp family_blacknet behavioral1/memory/556-958-0x00000000047F0000-0x0000000004830000-memory.dmp family_blacknet behavioral1/memory/844-1928-0x0000000004C70000-0x0000000004CB0000-memory.dmp family_blacknet behavioral1/memory/844-1929-0x0000000004C70000-0x0000000004CB0000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/556-956-0x0000000000400000-0x000000000041E000-memory.dmp disable_win_def behavioral1/memory/556-958-0x00000000047F0000-0x0000000004830000-memory.dmp disable_win_def behavioral1/memory/844-1928-0x0000000004C70000-0x0000000004CB0000-memory.dmp disable_win_def behavioral1/memory/844-1929-0x0000000004C70000-0x0000000004CB0000-memory.dmp disable_win_def -
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral1/memory/3032-4-0x0000000004C50000-0x0000000004CEE000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-6-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-8-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-5-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-10-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-16-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-14-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-12-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-18-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-20-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-22-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-28-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-26-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-24-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-30-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-34-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-32-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-38-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-36-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-44-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-42-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-40-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-48-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-50-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-46-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-52-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-54-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-56-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-62-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-60-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-58-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-64-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-66-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 behavioral1/memory/3032-68-0x0000000004C50000-0x0000000004CE9000-memory.dmp family_zgrat_v1 -
Drops startup file 2 IoCs
Processes:
tmp.exeWindowsUpdate.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sksewdjj.vbs tmp.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Sksewdjj.vbs WindowsUpdate.exe -
Executes dropped EXE 3 IoCs
Processes:
WindowsUpdate.exeWindowsUpdate.exeWindowsUpdate.exepid Process 588 WindowsUpdate.exe 1532 WindowsUpdate.exe 844 WindowsUpdate.exe -
Loads dropped DLL 3 IoCs
Processes:
tmp.exeWindowsUpdate.exepid Process 556 tmp.exe 588 WindowsUpdate.exe 588 WindowsUpdate.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
tmp.exeWindowsUpdate.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\e162b1333458a713bc6916cc8ac4110c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp.exe" tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\e162b1333458a713bc6916cc8ac4110c = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\MyClient\\WindowsUpdate.exe" tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\e162b1333458a713bc6916cc8ac4110c = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\MyClient\\WindowsUpdate.exe" WindowsUpdate.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
tmp.exeWindowsUpdate.exedescription pid Process procid_target PID 3032 set thread context of 556 3032 tmp.exe 30 PID 588 set thread context of 844 588 WindowsUpdate.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
tmp.exeWindowsUpdate.exeWindowsUpdate.exepid Process 556 tmp.exe 556 tmp.exe 588 WindowsUpdate.exe 844 WindowsUpdate.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
tmp.exetmp.exeWindowsUpdate.exeWindowsUpdate.exedescription pid Process Token: SeDebugPrivilege 3032 tmp.exe Token: SeDebugPrivilege 556 tmp.exe Token: SeDebugPrivilege 588 WindowsUpdate.exe Token: SeDebugPrivilege 844 WindowsUpdate.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
tmp.exeWindowsUpdate.exepid Process 556 tmp.exe 556 tmp.exe 844 WindowsUpdate.exe 844 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
tmp.exetmp.exeWindowsUpdate.exedescription pid Process procid_target PID 3032 wrote to memory of 556 3032 tmp.exe 30 PID 3032 wrote to memory of 556 3032 tmp.exe 30 PID 3032 wrote to memory of 556 3032 tmp.exe 30 PID 3032 wrote to memory of 556 3032 tmp.exe 30 PID 3032 wrote to memory of 556 3032 tmp.exe 30 PID 3032 wrote to memory of 556 3032 tmp.exe 30 PID 3032 wrote to memory of 556 3032 tmp.exe 30 PID 3032 wrote to memory of 556 3032 tmp.exe 30 PID 3032 wrote to memory of 556 3032 tmp.exe 30 PID 556 wrote to memory of 588 556 tmp.exe 32 PID 556 wrote to memory of 588 556 tmp.exe 32 PID 556 wrote to memory of 588 556 tmp.exe 32 PID 556 wrote to memory of 588 556 tmp.exe 32 PID 556 wrote to memory of 588 556 tmp.exe 32 PID 556 wrote to memory of 588 556 tmp.exe 32 PID 556 wrote to memory of 588 556 tmp.exe 32 PID 588 wrote to memory of 1532 588 WindowsUpdate.exe 33 PID 588 wrote to memory of 1532 588 WindowsUpdate.exe 33 PID 588 wrote to memory of 1532 588 WindowsUpdate.exe 33 PID 588 wrote to memory of 1532 588 WindowsUpdate.exe 33 PID 588 wrote to memory of 1532 588 WindowsUpdate.exe 33 PID 588 wrote to memory of 1532 588 WindowsUpdate.exe 33 PID 588 wrote to memory of 1532 588 WindowsUpdate.exe 33 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34 PID 588 wrote to memory of 844 588 WindowsUpdate.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exeC:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe4⤵
- Executes dropped EXE
PID:1532
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exeC:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5baa73a9b35bf02d8c56a1286bcd2d714
SHA1a179259548f9e81b65126130342f5b076c8b8a77
SHA25614490c9c139e9bc984781f8143a571e1f1f140c69a7cd12c34fc0bf20abb0889
SHA51202f75dafbd6cabc107fd681d0cc65991b0a21b16b713fba77db4928e78f1da23474ddb4535f8280dc56186da90e41adc7ad8b10ffde2d0b18ff494273021d644
-
Filesize
83B
MD51bda7ff3ab57ee35f078aeb89c17198b
SHA1dd1837e07192a78e9d21ec4055dc0dcd1ac9937a
SHA25613abe05c8ea57d6976dd03a9089c744e1e156e54e4a0377580f5be181be94869
SHA512f70f52ad8a7693318bb7332dd2c9a22f8707994fe77aeb15a5694b93df33960f4dc3806a32e137c7d1544a534816e75c1b7c8fab317bb04e59c1df6d7d028723