Analysis
-
max time kernel
102s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
26-07-2021 20:40
Behavioral task
behavioral1
Sample
Launcher.bin.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Launcher.bin.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
Launcher.bin.exe
-
Size
124KB
-
MD5
40c9946204cea15489c3a70b81b5efc4
-
SHA1
a0471872910573f1bb166dd69f3e11ed9eb04ed2
-
SHA256
e39546fbb5714be7f87be265c98286366b4d2cc6cbafe0d4c71bf95da856f118
-
SHA512
04f07054611c2be0a8f36cf6805eb8a39cce0c7c3f1a3ec255569e3fbbf2d4cc89081b579184405ffcc215a7429ba1108736d8ae6841ea380050c0828653ef05
Score
10/10
Malware Config
Extracted
Family
blacknet
Version
v3.6.0 Public
Botnet
Hello
C2
http://141.95.21.84
Mutex
BN[lEBYtSLH-5805348]
Attributes
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
68b4a4f47850fb62cd2157162048241c
-
startup
true
-
usb_spread
false
Signatures
-
BlackNET Payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000001ab3c-120.dat family_blacknet behavioral2/files/0x000400000001ab3c-121.dat family_blacknet -
Executes dropped EXE 1 IoCs
pid Process 3932 WindowsUpdate.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\68b4a4f47850fb62cd2157162048241c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\MyClient\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\68b4a4f47850fb62cd2157162048241c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Launcher.bin.exe" Launcher.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\68b4a4f47850fb62cd2157162048241c = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\MyClient\\WindowsUpdate.exe" Launcher.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 644 Launcher.bin.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 644 Launcher.bin.exe Token: SeDebugPrivilege 3932 WindowsUpdate.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 644 Launcher.bin.exe 644 Launcher.bin.exe 3932 WindowsUpdate.exe 3932 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 644 wrote to memory of 3932 644 Launcher.bin.exe 79 PID 644 wrote to memory of 3932 644 Launcher.bin.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\Launcher.bin.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.bin.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3932
-