Analysis

  • max time kernel
    116s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 19:35

General

  • Target

    a1966fa00ae577eca2476a7d89930a93ada31f36005e09c2091f6dad78615ccc.exe

  • Size

    456KB

  • MD5

    dac7eef8f750ba52bffba2bf369151bc

  • SHA1

    e0d777aec0d963bd77a892f440fd19a1d5760b52

  • SHA256

    a1966fa00ae577eca2476a7d89930a93ada31f36005e09c2091f6dad78615ccc

  • SHA512

    abd980075a13f2401ee7d39d6a5c18933cb825c7ab4897c3dea875d53c59ba06d76a6c3e54a67455315572b4f596fb454ff55ffbba40fd1258c220e733af24ac

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • suricata: ET MALWARE Win32/BlackNET CnC Requesting Command

    suricata: ET MALWARE Win32/BlackNET CnC Requesting Command

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1966fa00ae577eca2476a7d89930a93ada31f36005e09c2091f6dad78615ccc.exe
    "C:\Users\Admin\AppData\Local\Temp\a1966fa00ae577eca2476a7d89930a93ada31f36005e09c2091f6dad78615ccc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3044

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3044-130-0x00000000746B0000-0x0000000074C61000-memory.dmp
    Filesize

    5.7MB

  • memory/3044-131-0x00000000010BA000-0x00000000010BF000-memory.dmp
    Filesize

    20KB

  • memory/3044-132-0x000000000B040000-0x000000000B043000-memory.dmp
    Filesize

    12KB

  • memory/3044-133-0x000000000B043000-0x000000000B046000-memory.dmp
    Filesize

    12KB

  • memory/3044-134-0x000000000B046000-0x000000000B049000-memory.dmp
    Filesize

    12KB