Resubmissions
24/12/2024, 19:13
241224-xw3kaavlen 724/12/2024, 19:08
241224-xtltravlam 724/12/2024, 19:06
241224-xr869strgt 7Analysis
-
max time kernel
43s -
max time network
44s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
24/12/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
Archive.zip
Resource
win10ltsc2021-20241211-en
General
-
Target
Archive.zip
-
Size
2.3MB
-
MD5
03a1ddc324751540b1e293051c630c0c
-
SHA1
8659e8049aa13d81189a0ffb13e36dcdf4d31f71
-
SHA256
ebdce938512e6338a6e0101e006e9a22237bced741086cc932eebecc03e9a820
-
SHA512
25b2ed837d4f824701fb9d24ef472c7f6963acbeef423a396568f947f671c6458cffaef09004dfb16f88acfb1cb9fef50f627e40aa6948a951a584563d30dbab
-
SSDEEP
49152:emRvJShtDbHj9XAGSwFRuYuTIkqXfd+/9A2aDxbb0k71+FIg4/vj8d5E+PpfLUZ1:RS/DbD+o8TIkqXf0FFM/03FIgcCfxC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4520 BlackRock.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4520 BlackRock.exe 4520 BlackRock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 7zFM.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2640 7zFM.exe Token: 35 2640 7zFM.exe Token: SeSecurityPrivilege 2640 7zFM.exe Token: SeDebugPrivilege 4520 BlackRock.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2640 7zFM.exe 2640 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Archive.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2640
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4604
-
C:\Users\Admin\Desktop\New folder\BlackRock.exe"C:\Users\Admin\Desktop\New folder\BlackRock.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4520
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD5fb74ea83b0013db659ecaf1ea222b7f4
SHA117330d6bdd9ab973d8a0a0293202a8343a2440d3
SHA256c413dbc4dc71a512432bfe2d64b3aa0e8344000a0daa88d6020a76e01018d1a7
SHA512e22c2f582babb9e76917903e1df60f76c0c8d30604ccc2c87e56e875aab2ae584e9afcee4575c449abd030e8613b17b4b8ce14fb15fcd3cdd4dd22f1ff3bb238
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
1.3MB
MD546c84ded17d245234617918c27afd4f7
SHA13619b22c33e6146c3d3c4f1e76ff61cdf35e5bb4
SHA2564779af90d40a141a6fa9ac8e75611fccc5e240f20f34d560df7a8bdc05ca27bd
SHA51204948e1e3e99d769054f318a7637740012c75c0b2b0dd1618e94acea308c871a7fc2902ca3fe4b83902a1a86e986e2849f7341c37f8ae1cd99c6529b49328a25