Analysis

  • max time kernel
    18s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-04-2021 00:02

General

  • Target

    c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868.exe

  • Size

    116KB

  • MD5

    17e73f5c5a7ffa3797a0bdc1816d347b

  • SHA1

    1f7266ab6bd84cb14c9ea97f03260aa4cc363135

  • SHA256

    c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868

  • SHA512

    66eea79ef843663ef26596c56f3a98119b2aa7ed3d302ddcb56a523cd61bb392de7276a7d8a63b23d2daa3685ab87d1910e4c5e35ace1458fa74c8b1baf8afd3

Malware Config

Extracted

Family

blacknet

Version

v3.7.0 Public

Botnet

94qF3s

C2

http://www.rtmmodz.a2hosted.com/

Mutex

BN[dbdb82ae7c8fe0]

Attributes
  • antivm

    false

  • elevate_uac

    false

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    e162b1333458a713bc6916cc8ac4110c

  • startup

    false

  • usb_spread

    false

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET Payload 2 IoCs
  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868.exe
    "C:\Users\Admin\AppData\Local\Temp\c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3684

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
    MD5

    17e73f5c5a7ffa3797a0bdc1816d347b

    SHA1

    1f7266ab6bd84cb14c9ea97f03260aa4cc363135

    SHA256

    c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868

    SHA512

    66eea79ef843663ef26596c56f3a98119b2aa7ed3d302ddcb56a523cd61bb392de7276a7d8a63b23d2daa3685ab87d1910e4c5e35ace1458fa74c8b1baf8afd3

  • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
    MD5

    17e73f5c5a7ffa3797a0bdc1816d347b

    SHA1

    1f7266ab6bd84cb14c9ea97f03260aa4cc363135

    SHA256

    c3cad420d5e8e63d11b2b00d198db8cdf12018ab7080f870b21e29f89a897868

    SHA512

    66eea79ef843663ef26596c56f3a98119b2aa7ed3d302ddcb56a523cd61bb392de7276a7d8a63b23d2daa3685ab87d1910e4c5e35ace1458fa74c8b1baf8afd3

  • memory/640-114-0x0000000000380000-0x0000000000381000-memory.dmp
    Filesize

    4KB

  • memory/640-116-0x000000001AF10000-0x000000001AF12000-memory.dmp
    Filesize

    8KB

  • memory/640-117-0x000000001AF13000-0x000000001AF14000-memory.dmp
    Filesize

    4KB

  • memory/640-118-0x000000001AF12000-0x000000001AF13000-memory.dmp
    Filesize

    4KB

  • memory/640-124-0x000000001AF15000-0x000000001AF17000-memory.dmp
    Filesize

    8KB

  • memory/3684-119-0x0000000000000000-mapping.dmp
  • memory/3684-125-0x000000001B110000-0x000000001B112000-memory.dmp
    Filesize

    8KB

  • memory/3684-127-0x000000001B112000-0x000000001B113000-memory.dmp
    Filesize

    4KB

  • memory/3684-126-0x000000001B113000-0x000000001B114000-memory.dmp
    Filesize

    4KB