Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    30-07-2021 23:07

General

  • Target

    ACEA5FB0F0DD0AD6E33CEDBAED6FDBD9.exe

  • Size

    45KB

  • MD5

    acea5fb0f0dd0ad6e33cedbaed6fdbd9

  • SHA1

    b8c8d170b78ba0f117fc13ddb1ace03efd2a8b0b

  • SHA256

    76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa

  • SHA512

    adb12002574276b0357e5971d3fd9c7a9e57a3d34800693ce5f357d09f548051819376f669a1727db363566aa9574b11edb0fec89e55ac5c7df88275ac0f179b

Score
10/10

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ACEA5FB0F0DD0AD6E33CEDBAED6FDBD9.exe
    "C:\Users\Admin\AppData\Local\Temp\ACEA5FB0F0DD0AD6E33CEDBAED6FDBD9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4004-114-0x000002656E5E0000-0x000002656E5E1000-memory.dmp
    Filesize

    4KB

  • memory/4004-116-0x00000265714C0000-0x00000265714C2000-memory.dmp
    Filesize

    8KB

  • memory/4004-118-0x00000265714C2000-0x00000265714C3000-memory.dmp
    Filesize

    4KB

  • memory/4004-117-0x00000265714C3000-0x00000265714C4000-memory.dmp
    Filesize

    4KB

  • memory/4004-119-0x00000265714C5000-0x00000265714C7000-memory.dmp
    Filesize

    8KB