Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/01/2023, 13:05
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
99KB
-
MD5
b20ffab6a6a911d2d38a24350ca38e07
-
SHA1
623bd87603950e847f25121e153412ed704aaae7
-
SHA256
c0446b5d8723595bb4bee68a6a9cac370471bdc5d9afeafc6b9894cbb5378497
-
SHA512
7ce65974cb18d31f67f255a3e167a9b6a01c49210e14ac65ae11bcbb6e3b2cd538cc4605a494a28e5cf02e547a14c5495d3b007051d8b6087d7b18fcb5a85616
-
SSDEEP
3072:z//SI+iHJ/80TYB+eztx3be/EKyVFfa+:76OHC8YB+eztlbo1
Malware Config
Extracted
Family
blacknet
Version
v3.7.0 Public
Botnet
bot01
C2
http://18.117.193.148/
Mutex
BN[]
Attributes
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
e162b1333458a713bc6916cc8ac4110c
-
startup
false
-
usb_spread
false
Signatures
-
BlackNET payload 1 IoCs
resource yara_rule behavioral1/memory/2020-54-0x0000000000D70000-0x0000000000D8E000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2020-54-0x0000000000D70000-0x0000000000D8E000-memory.dmp disable_win_def -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2020 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2020 file.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2020 file.exe 2020 file.exe