Analysis Overview
SHA256
b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09
Threat Level: Known bad
The file b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe was found to be: Known bad.
Malicious Activity Summary
Blacknet family
BlackNET Payload
Contains code to disable Windows Defender
BlackNET
Adds Run key to start application
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-04-17 07:24
Signatures
BlackNET Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Blacknet family
Contains code to disable Windows Defender
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2022-04-17 07:24
Reported
2022-04-17 07:56
Platform
win7-20220414-en
Max time kernel
18s
Max time network
152s
Command Line
Signatures
BlackNET
BlackNET Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Contains code to disable Windows Defender
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\df7427b5e05183e625345c3c37ef31c0 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe" | C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"
C:\Users\Admin\AppData\Local\Temp\svchosts.exe
"C:\Users\Admin\AppData\Local\Temp\svchosts.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | finalb.xyz | udp |
Files
memory/1012-54-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1012-55-0x0000000000C10000-0x0000000000C12000-memory.dmp
memory/1012-56-0x0000000000C16000-0x0000000000C35000-memory.dmp
memory/1012-57-0x0000000000C4C000-0x0000000000C4E000-memory.dmp
memory/1012-58-0x0000000000C4E000-0x0000000000C50000-memory.dmp
memory/1012-59-0x0000000000C51000-0x0000000000C53000-memory.dmp
memory/1012-60-0x0000000000C53000-0x0000000000C55000-memory.dmp
memory/1012-61-0x0000000000C55000-0x0000000000C57000-memory.dmp
memory/1012-62-0x0000000000C57000-0x0000000000C59000-memory.dmp
memory/1012-63-0x0000000000C59000-0x0000000000C5B000-memory.dmp
memory/1012-64-0x0000000000C5B000-0x0000000000C5D000-memory.dmp
memory/1012-65-0x0000000000C5D000-0x0000000000C61000-memory.dmp
memory/1012-66-0x0000000000C61000-0x0000000000C65000-memory.dmp
memory/1012-67-0x0000000000C65000-0x0000000000C69000-memory.dmp
memory/1012-68-0x0000000000C69000-0x0000000000C6D000-memory.dmp
memory/1012-69-0x0000000000C6D000-0x0000000000C71000-memory.dmp
memory/1012-70-0x0000000000C71000-0x0000000000C75000-memory.dmp
memory/1012-71-0x0000000000C79000-0x0000000000C7D000-memory.dmp
memory/1012-72-0x0000000000C7D000-0x0000000000C85000-memory.dmp
memory/1012-73-0x0000000000C85000-0x0000000000C90000-memory.dmp
memory/1012-75-0x000000001F3B1000-0x000000001F3B9000-memory.dmp
memory/1012-74-0x000000001F3A0000-0x000000001F3A9000-memory.dmp
memory/1012-76-0x000000001F3C1000-0x000000001F3C9000-memory.dmp
memory/1012-77-0x0000000000C75000-0x0000000000C78000-memory.dmp
memory/1776-78-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1776-81-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1908-82-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\svchosts.exe
| MD5 | 89dd6e72358a669b7d6e2348307a7af7 |
| SHA1 | 0db348f3c6114a45d71f4d218e0e088b71c7bb0a |
| SHA256 | ad34794058212006ae974fcc6a0242598e6d020f08044439e3512773cd402b7e |
| SHA512 | 93b8a47686d7491281a0809b138a6244a535302ba0d6b2146849e9888632c72b6223ae8eb7a24f1006aaf57ab947a8f43719cff4837df559e7bf42f52c63856b |
C:\Users\Admin\AppData\Local\Temp\svchosts.exe
| MD5 | 89dd6e72358a669b7d6e2348307a7af7 |
| SHA1 | 0db348f3c6114a45d71f4d218e0e088b71c7bb0a |
| SHA256 | ad34794058212006ae974fcc6a0242598e6d020f08044439e3512773cd402b7e |
| SHA512 | 93b8a47686d7491281a0809b138a6244a535302ba0d6b2146849e9888632c72b6223ae8eb7a24f1006aaf57ab947a8f43719cff4837df559e7bf42f52c63856b |
memory/1908-85-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1908-87-0x0000000000C30000-0x0000000000C32000-memory.dmp
memory/1776-86-0x0000000000A90000-0x0000000000A92000-memory.dmp
memory/1776-88-0x0000000000A96000-0x0000000000AB5000-memory.dmp
memory/1908-89-0x0000000000C36000-0x0000000000C55000-memory.dmp
memory/1232-90-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1232-92-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1232-94-0x00000000003B6000-0x00000000003D5000-memory.dmp
memory/1232-93-0x00000000003B0000-0x00000000003B2000-memory.dmp
memory/924-95-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/924-97-0x00000000009B0000-0x00000000009B2000-memory.dmp
memory/1776-98-0x0000000000ACC000-0x0000000000ACE000-memory.dmp
memory/1776-99-0x0000000000ACE000-0x0000000000AD0000-memory.dmp
memory/1776-100-0x0000000000AD1000-0x0000000000AD3000-memory.dmp
memory/1776-101-0x0000000000AC7000-0x0000000000ACD000-memory.dmp
memory/1776-103-0x0000000000ADD000-0x0000000000AE1000-memory.dmp
memory/924-102-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1776-105-0x0000000000AFD000-0x0000000000B0F000-memory.dmp
memory/1776-104-0x0000000000AE1000-0x0000000000AE5000-memory.dmp
memory/1776-106-0x0000000000AE5000-0x0000000000AE9000-memory.dmp
memory/1776-107-0x0000000000AF5000-0x0000000000AF9000-memory.dmp
memory/1776-108-0x0000000000AF9000-0x0000000000AFD000-memory.dmp
memory/1776-109-0x0000000000AFD000-0x0000000000B05000-memory.dmp
memory/1776-110-0x0000000000AC7000-0x0000000000ACA000-memory.dmp
memory/1776-111-0x0000000000AFD000-0x0000000000B0F000-memory.dmp
memory/1776-112-0x000000001CF50000-0x000000001CF59000-memory.dmp
memory/1776-113-0x0000000000AC6000-0x0000000000AC9000-memory.dmp
memory/1776-114-0x0000000000AFD000-0x0000000000B0F000-memory.dmp
memory/1776-115-0x0000000000ABB000-0x0000000000ABD000-memory.dmp
memory/1776-116-0x0000000000AC0000-0x0000000000AC3000-memory.dmp
memory/1776-117-0x0000000000AFD000-0x0000000000B0F000-memory.dmp
memory/1776-119-0x0000000000ACA000-0x0000000000ACD000-memory.dmp
memory/1776-118-0x0000000000ABB000-0x0000000000ABD000-memory.dmp
memory/1776-120-0x0000000000AFD000-0x0000000000B0F000-memory.dmp
memory/924-121-0x00000000009B6000-0x00000000009D5000-memory.dmp
memory/1776-122-0x0000000000ACA000-0x0000000000ACC000-memory.dmp
memory/1776-124-0x0000000000AFE000-0x0000000000B0F000-memory.dmp
memory/1776-126-0x0000000000AC0000-0x0000000000AC6000-memory.dmp
memory/1776-125-0x0000000000ACB000-0x0000000000ACD000-memory.dmp
memory/1776-123-0x0000000000AC3000-0x0000000000AC7000-memory.dmp
memory/1776-127-0x000000001CF59000-0x000000001CF61000-memory.dmp
memory/1776-128-0x000000001CF69000-0x000000001CF71000-memory.dmp
memory/1776-129-0x000000001CF71000-0x000000001CF79000-memory.dmp
memory/1776-130-0x000000001CF79000-0x000000001CF81000-memory.dmp
memory/1776-131-0x000000001CF81000-0x000000001CF91000-memory.dmp
memory/1776-132-0x000000001CF91000-0x000000001CFA1000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1164-142-0x0000000000000000-mapping.dmp
memory/1164-144-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1608-147-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1608-149-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1592-152-0x0000000000000000-mapping.dmp
memory/1592-154-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1840-157-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1840-159-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/468-162-0x0000000000000000-mapping.dmp
memory/468-164-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1060-167-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1060-170-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1352-172-0x0000000000000000-mapping.dmp
memory/1352-174-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1232-177-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1232-179-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1952-181-0x0000000000000000-mapping.dmp
memory/1952-183-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1280-185-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1280-187-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1180-192-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1180-190-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/924-195-0x0000000000000000-mapping.dmp
memory/924-197-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/268-202-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/268-200-0x0000000000000000-mapping.dmp
memory/1360-205-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1360-207-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1608-210-0x0000000000000000-mapping.dmp
memory/1608-212-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1464-215-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1464-217-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1332-220-0x0000000000000000-mapping.dmp
memory/1332-222-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/760-224-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/760-226-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/1720-229-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1720-231-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/984-234-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/984-236-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1620-239-0x0000000000000000-mapping.dmp
memory/1620-241-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
memory/108-244-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/108-246-0x000007FEF3630000-0x000007FEF46C6000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-04-17 07:24
Reported
2022-04-17 07:57
Platform
win10v2004-20220414-en
Max time kernel
28s
Max time network
148s
Command Line
Signatures
BlackNET
BlackNET Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Contains code to disable Windows Defender
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\df7427b5e05183e625345c3c37ef31c0 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe" | C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\df7427b5e05183e625345c3c37ef31c0 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\MyClient\\WindowsUpdate.exe" | C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe
"C:\Users\Admin\AppData\Local\Temp\b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\svchosts.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\svchosts.exe"
Network
| Country | Destination | Domain | Proto |
| US | 13.89.178.26:443 | tcp | |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.253.208.112:80 | tcp | |
| US | 8.253.208.112:80 | tcp | |
| US | 8.253.208.112:80 | tcp | |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
| US | 8.8.8.8:53 | finalb.xyz | udp |
Files
memory/3604-130-0x000000000063A000-0x000000000063F000-memory.dmp
memory/1132-131-0x0000000000000000-mapping.dmp
memory/3604-132-0x00000000217B0000-0x00000000217B3000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\WindowsUpdate.exe
| MD5 | c4f79edc4498c5570495bb36fc942134 |
| SHA1 | 00046b588252502480e8e708a22d25ae1d9b05fa |
| SHA256 | b33d569af5e490875d6473c6402797ddb4ce639bb1f1cf7f67698eeafa625f09 |
| SHA512 | 07bdeb39b35835a752886c2d308a68d263b36e8372d2bf320ede5b85252d14e284985d0889dfa9fcffec7ede7c3585a46cb0165b00be903755ffe63cacb21cef |
memory/1132-135-0x0000000000C4A000-0x0000000000C4F000-memory.dmp
memory/3100-136-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\svchosts.exe
| MD5 | 89dd6e72358a669b7d6e2348307a7af7 |
| SHA1 | 0db348f3c6114a45d71f4d218e0e088b71c7bb0a |
| SHA256 | ad34794058212006ae974fcc6a0242598e6d020f08044439e3512773cd402b7e |
| SHA512 | 93b8a47686d7491281a0809b138a6244a535302ba0d6b2146849e9888632c72b6223ae8eb7a24f1006aaf57ab947a8f43719cff4837df559e7bf42f52c63856b |
C:\Users\Admin\AppData\Roaming\Microsoft\MyClient\svchosts.exe
| MD5 | 89dd6e72358a669b7d6e2348307a7af7 |
| SHA1 | 0db348f3c6114a45d71f4d218e0e088b71c7bb0a |
| SHA256 | ad34794058212006ae974fcc6a0242598e6d020f08044439e3512773cd402b7e |
| SHA512 | 93b8a47686d7491281a0809b138a6244a535302ba0d6b2146849e9888632c72b6223ae8eb7a24f1006aaf57ab947a8f43719cff4837df559e7bf42f52c63856b |