Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
BlackLauncher.bin.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BlackLauncher.bin.exe
Resource
win10v2004-20240709-en
General
-
Target
BlackLauncher.bin.exe
-
Size
66.0MB
-
MD5
9af3e6d9cde373f8f514fc69439c5cab
-
SHA1
8349cdcfcdb3b081253e733b93e71f0e7c94d0ef
-
SHA256
1d80f6a688af15e12116f444d8da85be020a3393aeaab885e4d0f8589ac23dc0
-
SHA512
b66c9878cce829eea3467eaa8255f2752de8db2de33b8a525f2cbd886728a95d16173ed0132bc30e69da6a352952b437e1953ba84786ad3b178293abcce49550
-
SSDEEP
393216:1qCKJWr646m8GH5y4SVFY+L/I5glN7tFL+fzqdqhuQjPLzXq:1qCKJWr36PGZpSVFh/aglNpg7jPq
Malware Config
Signatures
-
pid Process 3872 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3872 powershell.exe 3872 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 1884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1884 AUDIODG.EXE Token: SeDebugPrivilege 3872 powershell.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 BlackLauncher.bin.exe 2160 BlackLauncher.bin.exe 2160 BlackLauncher.bin.exe 1488 BlackLauncher.bin.exe 1488 BlackLauncher.bin.exe 1488 BlackLauncher.bin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 3872 2160 BlackLauncher.bin.exe 88 PID 2160 wrote to memory of 3872 2160 BlackLauncher.bin.exe 88 PID 3872 wrote to memory of 1488 3872 powershell.exe 90 PID 3872 wrote to memory of 1488 3872 powershell.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlackLauncher.bin.exe"C:\Users\Admin\AppData\Local\Temp\BlackLauncher.bin.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command " Start-Process -FilePath 'C:/Users/Admin/AppData/Local/Temp/BlackLauncher.bin.exe' -ArgumentList '--rendering-driver opengl3 --admin-requested' -Verb RunAs "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\BlackLauncher.bin.exe"C:\Users\Admin\AppData\Local\Temp\BlackLauncher.bin.exe" --rendering-driver opengl3 --admin-requested3⤵
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f4 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Godot\app_userdata\NewLauncher\shader_cache\CanvasShaderGLES3\4e9e83ef92cfe6b6881057f0e41e775d2f0a3ea470fb34af487edaa273c90c2c\fa7b62523470356194bdf709eb2639ab149a07cc.cache
Filesize128KB
MD531493e258a21680bcb8e57ae1db77eaa
SHA1bdef2bb9c4d5118bf65206e2109ba9af47a7c2bb
SHA256f9807566566182192ee7f47955d9e2cde5aecda8380e4923c860afe75ac82127
SHA5120254415318c4e90fb5c88b900939ce546be2964860be6fe117cd8c3ca8d53379dd21f512cf3aa8d5027debb61685cd6739b63dc1f52b6e0e862f2c1cdac921fa
-
C:\Users\Admin\AppData\Roaming\Godot\app_userdata\NewLauncher\shader_cache\CopyShaderGLES3\f8827df5e23db5bc636a3d6c081f1b5ec27655db61c9d942fd9b2364a6b58de7\fa7b62523470356194bdf709eb2639ab149a07cc.cache
Filesize60KB
MD5b5e157aabf1ad8173f58afc808372572
SHA1686897130946b9fc563fcbaf43ecf4ddff130648
SHA256808932f74dbcf687842cbfa4428b80d2f9fe51a9ce4f829700f5e104f1245393
SHA5124c199408bb17cd31b9ee9945cb1ace5ab6898bf0f9ada2f903867a96736097def1c1bcdf030b7d5f7545ab0086bf70e0fb61de9df727e180704322b73cd3727e
-
C:\Users\Admin\AppData\Roaming\Godot\app_userdata\NewLauncher\shader_cache\SceneShaderGLES3\fde6c2cbcc2ec71d9bf0aaa797b35a71635bb92f1057da48e6e13d5058805d9c\fa7b62523470356194bdf709eb2639ab149a07cc.cache
Filesize343KB
MD5858c90cf6f469533fa56359a33e91580
SHA197811818c89d34fe907bac6f49690b88b4d43a66
SHA2560ec2129e8e633e289ec86ea0ebe1537067cb3f153aa13a58aaadfec1f9c1a9a5
SHA5121cb99b324a4b4ee389afa8ca5428a49c03ed73159509697d5e380763f40e1abece7a130aff7e8e486316c69ffca6e00d6c5184957a9e12d916dca26394f71c53