Analysis

  • max time kernel
    5s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    26-07-2021 20:40

General

  • Target

    Launcher.bin.exe

  • Size

    124KB

  • MD5

    40c9946204cea15489c3a70b81b5efc4

  • SHA1

    a0471872910573f1bb166dd69f3e11ed9eb04ed2

  • SHA256

    e39546fbb5714be7f87be265c98286366b4d2cc6cbafe0d4c71bf95da856f118

  • SHA512

    04f07054611c2be0a8f36cf6805eb8a39cce0c7c3f1a3ec255569e3fbbf2d4cc89081b579184405ffcc215a7429ba1108736d8ae6841ea380050c0828653ef05

Score
10/10

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Launcher.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Launcher.bin.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:452

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/452-60-0x000007FEF2C10000-0x000007FEF3CA6000-memory.dmp

    Filesize

    16.6MB

  • memory/452-61-0x0000000000400000-0x0000000000402000-memory.dmp

    Filesize

    8KB

  • memory/452-62-0x0000000000406000-0x0000000000425000-memory.dmp

    Filesize

    124KB

  • memory/452-63-0x0000000000426000-0x0000000000427000-memory.dmp

    Filesize

    4KB

  • memory/452-64-0x000000000042A000-0x000000000042B000-memory.dmp

    Filesize

    4KB

  • memory/452-65-0x0000000000427000-0x0000000000428000-memory.dmp

    Filesize

    4KB