Resubmissions

24/12/2024, 19:13

241224-xw3kaavlen 7

24/12/2024, 19:08

241224-xtltravlam 7

24/12/2024, 19:06

241224-xr869strgt 7

Analysis

  • max time kernel
    43s
  • max time network
    44s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    24/12/2024, 19:06

General

  • Target

    Archive.zip

  • Size

    2.3MB

  • MD5

    03a1ddc324751540b1e293051c630c0c

  • SHA1

    8659e8049aa13d81189a0ffb13e36dcdf4d31f71

  • SHA256

    ebdce938512e6338a6e0101e006e9a22237bced741086cc932eebecc03e9a820

  • SHA512

    25b2ed837d4f824701fb9d24ef472c7f6963acbeef423a396568f947f671c6458cffaef09004dfb16f88acfb1cb9fef50f627e40aa6948a951a584563d30dbab

  • SSDEEP

    49152:emRvJShtDbHj9XAGSwFRuYuTIkqXfd+/9A2aDxbb0k71+FIg4/vj8d5E+PpfLUZ1:RS/DbD+o8TIkqXf0FFM/03FIgcCfxC

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Archive.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2640
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4604
    • C:\Users\Admin\Desktop\New folder\BlackRock.exe
      "C:\Users\Admin\Desktop\New folder\BlackRock.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:4520

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\New folder\BlackRock.exe

      Filesize

      933KB

      MD5

      fb74ea83b0013db659ecaf1ea222b7f4

      SHA1

      17330d6bdd9ab973d8a0a0293202a8343a2440d3

      SHA256

      c413dbc4dc71a512432bfe2d64b3aa0e8344000a0daa88d6020a76e01018d1a7

      SHA512

      e22c2f582babb9e76917903e1df60f76c0c8d30604ccc2c87e56e875aab2ae584e9afcee4575c449abd030e8613b17b4b8ce14fb15fcd3cdd4dd22f1ff3bb238

    • C:\Users\Admin\Desktop\New folder\Newtonsoft.Json.dll

      Filesize

      695KB

      MD5

      195ffb7167db3219b217c4fd439eedd6

      SHA1

      1e76e6099570ede620b76ed47cf8d03a936d49f8

      SHA256

      e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

      SHA512

      56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

    • C:\Users\Admin\Desktop\New folder\ScintillaNET.dll

      Filesize

      1.3MB

      MD5

      46c84ded17d245234617918c27afd4f7

      SHA1

      3619b22c33e6146c3d3c4f1e76ff61cdf35e5bb4

      SHA256

      4779af90d40a141a6fa9ac8e75611fccc5e240f20f34d560df7a8bdc05ca27bd

      SHA512

      04948e1e3e99d769054f318a7637740012c75c0b2b0dd1618e94acea308c871a7fc2902ca3fe4b83902a1a86e986e2849f7341c37f8ae1cd99c6529b49328a25

    • memory/4520-14-0x00007FFD661A3000-0x00007FFD661A5000-memory.dmp

      Filesize

      8KB

    • memory/4520-15-0x00000258C3B90000-0x00000258C3D3C000-memory.dmp

      Filesize

      1.7MB

    • memory/4520-16-0x00000258C5990000-0x00000258C5991000-memory.dmp

      Filesize

      4KB

    • memory/4520-17-0x00007FFD661A0000-0x00007FFD66C62000-memory.dmp

      Filesize

      10.8MB

    • memory/4520-18-0x00000258DE240000-0x00000258DE2B6000-memory.dmp

      Filesize

      472KB

    • memory/4520-20-0x00000258DE580000-0x00000258DE6D4000-memory.dmp

      Filesize

      1.3MB

    • memory/4520-22-0x00000258DE420000-0x00000258DE4D2000-memory.dmp

      Filesize

      712KB

    • memory/4520-23-0x00000258C5B10000-0x00000258C5B4C000-memory.dmp

      Filesize

      240KB

    • memory/4520-24-0x00007FFD661A0000-0x00007FFD66C62000-memory.dmp

      Filesize

      10.8MB