Resubmissions

22-07-2024 01:10

240722-bjs97awgml 3

22-07-2024 01:07

240722-bgnxpateqc 6

Analysis

  • max time kernel
    169s
  • max time network
    157s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-07-2024 01:07

General

  • Target

    BlazeHack.zip

  • Size

    170KB

  • MD5

    54bc12d75a2b232ca76286ed862da199

  • SHA1

    c1c9960011bb7ad898f88d8987265016eb2e8052

  • SHA256

    38b3ee1da02c8819978384fcdbf1ace7d3da6174e487e217db3605fa2dc5f1b3

  • SHA512

    44bacc047f9ab2e8643163128890bc163d24d5efc7893f2c89312c7ef6ed0034cfda0d17cd21374cd76025255707329dab3282ec60e3748010c250bf1ac4e510

  • SSDEEP

    3072:NXQIKEfQnfVTKEA+7vaGAJ+zdZ3osZSD9vUigbEGAS:NgIKEf4fTAyvaGA0pZ3osi9cioAS

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\BlazeHack.zip
    1⤵
      PID:3032
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4528
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:124
        • C:\Windows\System32\SearchProtocolHost.exe
          "C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Modifies data under HKEY_USERS
          PID:2100
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 832 2636 2632 812 {0E5DCEC5-7795-4E38-9621-94DFD9F9A421}
          2⤵
          • Modifies data under HKEY_USERS
          PID:3940
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 832 2680 2672 812 {85EE815A-7738-4808-A14A-3AD87E32A3BF}
          2⤵
            PID:488
        • C:\Users\Admin\Desktop\BlazeHack\BlazeHack.exe
          "C:\Users\Admin\Desktop\BlazeHack\BlazeHack.exe"
          1⤵
            PID:684

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/124-0-0x000002604B8E0000-0x000002604B8F0000-memory.dmp

            Filesize

            64KB

          • memory/124-16-0x000002604B9E0000-0x000002604B9F0000-memory.dmp

            Filesize

            64KB

          • memory/124-32-0x000002604FDD0000-0x000002604FDD8000-memory.dmp

            Filesize

            32KB

          • memory/124-34-0x0000026050540000-0x0000026050548000-memory.dmp

            Filesize

            32KB

          • memory/124-35-0x0000026050530000-0x0000026050531000-memory.dmp

            Filesize

            4KB

          • memory/124-37-0x0000026050550000-0x0000026050558000-memory.dmp

            Filesize

            32KB

          • memory/684-112-0x0000000000830000-0x0000000000838000-memory.dmp

            Filesize

            32KB

          • memory/3940-52-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-53-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-44-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-46-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-45-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-47-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-48-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-50-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-49-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-42-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-54-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-56-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-55-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-43-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-51-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-57-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-58-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-59-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-60-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-62-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-61-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-63-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-64-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-66-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-67-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-68-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-65-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB

          • memory/3940-41-0x000001A81DA70000-0x000001A81DA80000-memory.dmp

            Filesize

            64KB