Analysis

  • max time kernel
    122s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    22-04-2021 00:02

General

  • Target

    c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868.exe

  • Size

    116KB

  • MD5

    17e73f5c5a7ffa3797a0bdc1816d347b

  • SHA1

    1f7266ab6bd84cb14c9ea97f03260aa4cc363135

  • SHA256

    c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868

  • SHA512

    66eea79ef843663ef26596c56f3a98119b2aa7ed3d302ddcb56a523cd61bb392de7276a7d8a63b23d2daa3685ab87d1910e4c5e35ace1458fa74c8b1baf8afd3

Malware Config

Extracted

Family

blacknet

Version

v3.7.0 Public

Botnet

94qF3s

C2

http://www.rtmmodz.a2hosted.com/

Mutex

BN[dbdb82ae7c8fe0]

Attributes
  • antivm

    false

  • elevate_uac

    false

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    e162b1333458a713bc6916cc8ac4110c

  • startup

    false

  • usb_spread

    false

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET Payload 2 IoCs
  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868.exe
    "C:\Users\Admin\AppData\Local\Temp\c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:756

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
    MD5

    17e73f5c5a7ffa3797a0bdc1816d347b

    SHA1

    1f7266ab6bd84cb14c9ea97f03260aa4cc363135

    SHA256

    c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868

    SHA512

    66eea79ef843663ef26596c56f3a98119b2aa7ed3d302ddcb56a523cd61bb392de7276a7d8a63b23d2daa3685ab87d1910e4c5e35ace1458fa74c8b1baf8afd3

  • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
    MD5

    17e73f5c5a7ffa3797a0bdc1816d347b

    SHA1

    1f7266ab6bd84cb14c9ea97f03260aa4cc363135

    SHA256

    c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868

    SHA512

    66eea79ef843663ef26596c56f3a98119b2aa7ed3d302ddcb56a523cd61bb392de7276a7d8a63b23d2daa3685ab87d1910e4c5e35ace1458fa74c8b1baf8afd3

  • memory/756-71-0x000000001B162000-0x000000001B163000-memory.dmp
    Filesize

    4KB

  • memory/756-65-0x0000000000000000-mapping.dmp
  • memory/756-68-0x0000000001300000-0x0000000001301000-memory.dmp
    Filesize

    4KB

  • memory/756-70-0x000000001B160000-0x000000001B162000-memory.dmp
    Filesize

    8KB

  • memory/756-72-0x000000001B164000-0x000000001B165000-memory.dmp
    Filesize

    4KB

  • memory/756-73-0x000000001B169000-0x000000001B188000-memory.dmp
    Filesize

    124KB

  • memory/1888-63-0x000000001B224000-0x000000001B225000-memory.dmp
    Filesize

    4KB

  • memory/1888-64-0x000000001B229000-0x000000001B248000-memory.dmp
    Filesize

    124KB

  • memory/1888-62-0x000000001B222000-0x000000001B223000-memory.dmp
    Filesize

    4KB

  • memory/1888-61-0x000000001B220000-0x000000001B222000-memory.dmp
    Filesize

    8KB

  • memory/1888-59-0x0000000001020000-0x0000000001021000-memory.dmp
    Filesize

    4KB