Analysis
-
max time kernel
99s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe
Resource
win10v2004-20221111-en
General
-
Target
c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe
-
Size
179KB
-
MD5
c89be917eb11b5f09561177b4cfddff5
-
SHA1
61f7e9a65430c732bb145864fb5ea40fddbde35e
-
SHA256
c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671
-
SHA512
6717283fd645873a042f63ea95ba01455d91a046317c0011a387bbfd352b69e71a53cb15811d0ff3ac2c7682102961da68c6fc7aa729a8fc2196e9af139ce5af
-
SSDEEP
3072:zobMNvy29G/P/XP3ue33nev2W33PXPmG+ePu23PfmmO3XePmmPm3PeP3uPvu/Ovi:zobwhVi2nh3HETytaoRFYBiXB
Malware Config
Extracted
blacknet
v3.7.0 Public
HacKed
http://194.33.45.112
BN[]
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
e162b1333458a713bc6916cc8ac4110c
-
startup
false
-
usb_spread
false
Signatures
-
BlackNET payload 6 IoCs
resource yara_rule behavioral1/memory/1728-60-0x0000000000400000-0x000000000041E000-memory.dmp family_blacknet behavioral1/memory/1728-62-0x0000000000400000-0x000000000041E000-memory.dmp family_blacknet behavioral1/memory/1728-64-0x000000000041756E-mapping.dmp family_blacknet behavioral1/memory/1728-63-0x0000000000400000-0x000000000041E000-memory.dmp family_blacknet behavioral1/memory/1728-66-0x0000000000400000-0x000000000041E000-memory.dmp family_blacknet behavioral1/memory/1728-68-0x0000000000400000-0x000000000041E000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 6 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1728-60-0x0000000000400000-0x000000000041E000-memory.dmp disable_win_def behavioral1/memory/1728-62-0x0000000000400000-0x000000000041E000-memory.dmp disable_win_def behavioral1/memory/1728-64-0x000000000041756E-mapping.dmp disable_win_def behavioral1/memory/1728-63-0x0000000000400000-0x000000000041E000-memory.dmp disable_win_def behavioral1/memory/1728-66-0x0000000000400000-0x000000000041E000-memory.dmp disable_win_def behavioral1/memory/1728-68-0x0000000000400000-0x000000000041E000-memory.dmp disable_win_def -
Deletes itself 1 IoCs
pid Process 880 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.exe pOwERsHeLl.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.exe pOwERsHeLl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1060 set thread context of 1728 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 292 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1728 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 1984 pOwERsHeLl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1728 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe Token: SeDebugPrivilege 1984 pOwERsHeLl.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1728 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 1728 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1728 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 27 PID 1060 wrote to memory of 1728 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 27 PID 1060 wrote to memory of 1728 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 27 PID 1060 wrote to memory of 1728 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 27 PID 1060 wrote to memory of 1728 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 27 PID 1060 wrote to memory of 1728 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 27 PID 1060 wrote to memory of 1728 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 27 PID 1060 wrote to memory of 1728 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 27 PID 1060 wrote to memory of 1728 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 27 PID 1060 wrote to memory of 1984 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 28 PID 1060 wrote to memory of 1984 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 28 PID 1060 wrote to memory of 1984 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 28 PID 1060 wrote to memory of 1984 1060 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 28 PID 1728 wrote to memory of 880 1728 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 31 PID 1728 wrote to memory of 880 1728 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 31 PID 1728 wrote to memory of 880 1728 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 31 PID 1728 wrote to memory of 880 1728 c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe 31 PID 880 wrote to memory of 292 880 cmd.exe 33 PID 880 wrote to memory of 292 880 cmd.exe 33 PID 880 wrote to memory of 292 880 cmd.exe 33 PID 880 wrote to memory of 292 880 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe"C:\Users\Admin\AppData\Local\Temp\c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe"C:\Users\Admin\AppData\Local\Temp\c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 1.1.1.1 -n 5 -w 5000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 5 -w 50004⤵
- Runs ping.exe
PID:292
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pOwERsHeLl.exe"pOwERsHeLl.exe" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\c138d8e3110237ad4ed5dba3308a2e8a4eb685f84a55043354554b1127776671.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.exe'2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-