Analysis
-
max time kernel
8s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2022, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe
Resource
win10v2004-20221111-en
General
-
Target
0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe
-
Size
356KB
-
MD5
354d20e21be15dd24eb8a9b2b18a8407
-
SHA1
f3c9182f5a8a45ee8f9cbcf2e4584c38ff670533
-
SHA256
0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44
-
SHA512
7bcfd0d2bca8a7bc3f0836c012438125cabdac11e7978f3d8a55ace928fe98ceac8ddf7cab146847ad9c9299c9231711df5b52cb0e429bcb5f519fae7353edb5
-
SSDEEP
6144:XBlALeoB8aMc2d4XPRSdUGACTse5kjVPqpc2NgqDIZYm8dDb1tqisSc85AjPdA4/:XkqGofP/HRLRoveIP95TDKkg30XS
Malware Config
Extracted
blacknet
v3.7.0 Public
Round3
http://zee.zight.ru
BN[d396d077ee81b07d64cc8bbff27bbccb]
-
antivm
true
-
elevate_uac
false
-
install_name
GPUpdate.exe
-
splitter
|BN|
-
start_name
e162b1333458a713bc6916cc8ac4110c
-
startup
false
-
usb_spread
false
Signatures
-
BlackNET payload 1 IoCs
resource yara_rule behavioral1/memory/2300-138-0x0000000000770000-0x0000000000792000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2300-138-0x0000000000770000-0x0000000000792000-memory.dmp disable_win_def -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e162b1333458a713bc6916cc8ac4110c = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\MyClient\\GPUpdate.exe" 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3384 set thread context of 2300 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4148 2300 WerFault.exe 82 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4064 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 1352 powershell.exe 1352 powershell.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe Token: SeDebugPrivilege 1352 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3384 wrote to memory of 2300 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 82 PID 3384 wrote to memory of 2300 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 82 PID 3384 wrote to memory of 2300 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 82 PID 3384 wrote to memory of 2300 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 82 PID 3384 wrote to memory of 2300 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 82 PID 3384 wrote to memory of 2300 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 82 PID 3384 wrote to memory of 2300 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 82 PID 3384 wrote to memory of 2300 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 82 PID 3384 wrote to memory of 4676 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 83 PID 3384 wrote to memory of 4676 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 83 PID 3384 wrote to memory of 4676 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 83 PID 3384 wrote to memory of 1712 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 85 PID 3384 wrote to memory of 1712 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 85 PID 3384 wrote to memory of 1712 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 85 PID 3384 wrote to memory of 3260 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 88 PID 3384 wrote to memory of 3260 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 88 PID 3384 wrote to memory of 3260 3384 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 88 PID 1712 wrote to memory of 4064 1712 cmd.exe 89 PID 1712 wrote to memory of 4064 1712 cmd.exe 89 PID 1712 wrote to memory of 4064 1712 cmd.exe 89 PID 2300 wrote to memory of 1352 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 90 PID 2300 wrote to memory of 1352 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 90 PID 2300 wrote to memory of 1352 2300 0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe"C:\Users\Admin\AppData\Local\Temp\0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe"C:\Users\Admin\AppData\Local\Temp\0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 16443⤵
- Program crash
PID:4148
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\RegStart"2⤵PID:4676
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\RegStart\RegStart.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\RegStart\RegStart.exe'" /f3⤵
- Creates scheduled task(s)
PID:4064
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44.exe" "C:\Users\Admin\AppData\Roaming\RegStart\RegStart.exe"2⤵PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2300 -ip 23001⤵PID:3508