Analysis

  • max time kernel
    119s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    01-08-2021 18:03

General

  • Target

    b30eebf734354f55373978e395c912393f3c674aaa4717748ae449b09832f6ae.exe

  • Size

    117KB

  • MD5

    b72d429d1d690165c7b0de4a074c4a58

  • SHA1

    f0704d227482a80f2f90dab79ed4acd9770fe565

  • SHA256

    b30eebf734354f55373978e395c912393f3c674aaa4717748ae449b09832f6ae

  • SHA512

    f3b565e67d5a15d5305982701bd5f0d37eec0bfe2d152556584fa1d01faf1def6e616d0addea91e0663be084450b49f99e2108cc06a9b50c9e1482f9290b6c5c

Malware Config

Extracted

Family

blacknet

Version

v3.7.0 Public

Botnet

Bot

C2

http://furyx.de/panel

Mutex

BN[c1916af6f3a468e5b6f5c7f6b9c78982]

Attributes
  • antivm

    false

  • elevate_uac

    false

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    e162b1333458a713bc6916cc8ac4110c

  • startup

    false

  • usb_spread

    true

aes.plain

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET Payload 2 IoCs
  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b30eebf734354f55373978e395c912393f3c674aaa4717748ae449b09832f6ae.exe
    "C:\Users\Admin\AppData\Local\Temp\b30eebf734354f55373978e395c912393f3c674aaa4717748ae449b09832f6ae.exe"
    1⤵
    • Windows security modification
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1492
    • C:\Windows\system32\schtasks.exe
      "schtasks" /delete /tn "WindowsUpdate.exe" /f
      2⤵
        PID:1524
      • C:\Windows\Microsoft\MyClient\WindowsUpdate.exe
        "C:\Windows\Microsoft\MyClient\WindowsUpdate.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1292
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "WindowsUpdate.exe" /sc ONLOGON /tr "C:\Windows\WindowsUpdate.exe" /rl HIGHEST /f
        2⤵
        • Creates scheduled task(s)
        PID:1828
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 760 -s 1060
        2⤵
        • Program crash
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:864

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/760-111-0x000000001B1D4000-0x000000001B1D5000-memory.dmp

      Filesize

      4KB

    • memory/760-115-0x000000001B1D8000-0x000000001B1DA000-memory.dmp

      Filesize

      8KB

    • memory/760-109-0x000000001B1D2000-0x000000001B1D3000-memory.dmp

      Filesize

      4KB

    • memory/760-100-0x000000001B1C9000-0x000000001B1CA000-memory.dmp

      Filesize

      4KB

    • memory/760-107-0x000000001B1D0000-0x000000001B1D1000-memory.dmp

      Filesize

      4KB

    • memory/760-116-0x000000001B1DA000-0x000000001B1DC000-memory.dmp

      Filesize

      8KB

    • memory/760-113-0x000000001B1D6000-0x000000001B1D7000-memory.dmp

      Filesize

      4KB

    • memory/760-106-0x000000001B1CF000-0x000000001B1D0000-memory.dmp

      Filesize

      4KB

    • memory/760-112-0x000000001B1D5000-0x000000001B1D6000-memory.dmp

      Filesize

      4KB

    • memory/760-110-0x000000001B1D3000-0x000000001B1D4000-memory.dmp

      Filesize

      4KB

    • memory/760-103-0x000000001B1CC000-0x000000001B1CD000-memory.dmp

      Filesize

      4KB

    • memory/760-108-0x000000001B1D1000-0x000000001B1D2000-memory.dmp

      Filesize

      4KB

    • memory/760-64-0x000000001B1A9000-0x000000001B1C8000-memory.dmp

      Filesize

      124KB

    • memory/760-63-0x000000001B1A4000-0x000000001B1A5000-memory.dmp

      Filesize

      4KB

    • memory/760-114-0x000000001B1D7000-0x000000001B1D8000-memory.dmp

      Filesize

      4KB

    • memory/760-104-0x000000001B1CD000-0x000000001B1CE000-memory.dmp

      Filesize

      4KB

    • memory/760-105-0x000000001B1CE000-0x000000001B1CF000-memory.dmp

      Filesize

      4KB

    • memory/760-62-0x000000001B1A2000-0x000000001B1A3000-memory.dmp

      Filesize

      4KB

    • memory/760-61-0x000000001B1A0000-0x000000001B1A2000-memory.dmp

      Filesize

      8KB

    • memory/760-102-0x000000001B1CB000-0x000000001B1CC000-memory.dmp

      Filesize

      4KB

    • memory/760-59-0x00000000013B0000-0x00000000013B1000-memory.dmp

      Filesize

      4KB

    • memory/760-101-0x000000001B1CA000-0x000000001B1CB000-memory.dmp

      Filesize

      4KB

    • memory/760-99-0x000000001B1C8000-0x000000001B1C9000-memory.dmp

      Filesize

      4KB

    • memory/864-121-0x0000000001B80000-0x0000000001B81000-memory.dmp

      Filesize

      4KB

    • memory/1292-95-0x0000000000190000-0x0000000000191000-memory.dmp

      Filesize

      4KB

    • memory/1292-118-0x000000001B312000-0x000000001B313000-memory.dmp

      Filesize

      4KB

    • memory/1292-120-0x000000001B319000-0x000000001B338000-memory.dmp

      Filesize

      124KB

    • memory/1292-119-0x000000001B314000-0x000000001B315000-memory.dmp

      Filesize

      4KB

    • memory/1292-117-0x000000001B310000-0x000000001B312000-memory.dmp

      Filesize

      8KB

    • memory/1492-71-0x00000000024C0000-0x00000000024C1000-memory.dmp

      Filesize

      4KB

    • memory/1492-67-0x0000000002480000-0x0000000002481000-memory.dmp

      Filesize

      4KB

    • memory/1492-72-0x0000000002720000-0x0000000002721000-memory.dmp

      Filesize

      4KB

    • memory/1492-69-0x000000001AC40000-0x000000001AC42000-memory.dmp

      Filesize

      8KB

    • memory/1492-70-0x000000001AC44000-0x000000001AC46000-memory.dmp

      Filesize

      8KB

    • memory/1492-68-0x000000001ACC0000-0x000000001ACC1000-memory.dmp

      Filesize

      4KB

    • memory/1492-73-0x000000001ABD0000-0x000000001ABD1000-memory.dmp

      Filesize

      4KB

    • memory/1492-66-0x000007FEFB531000-0x000007FEFB533000-memory.dmp

      Filesize

      8KB

    • memory/1492-76-0x000000001AC00000-0x000000001AC01000-memory.dmp

      Filesize

      4KB

    • memory/1492-88-0x000000001AA70000-0x000000001AA71000-memory.dmp

      Filesize

      4KB

    • memory/1492-89-0x000000001AA80000-0x000000001AA81000-memory.dmp

      Filesize

      4KB