Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2023 13:05

General

  • Target

    file.exe

  • Size

    99KB

  • MD5

    b20ffab6a6a911d2d38a24350ca38e07

  • SHA1

    623bd87603950e847f25121e153412ed704aaae7

  • SHA256

    c0446b5d8723595bb4bee68a6a9cac370471bdc5d9afeafc6b9894cbb5378497

  • SHA512

    7ce65974cb18d31f67f255a3e167a9b6a01c49210e14ac65ae11bcbb6e3b2cd538cc4605a494a28e5cf02e547a14c5495d3b007051d8b6087d7b18fcb5a85616

  • SSDEEP

    3072:z//SI+iHJ/80TYB+eztx3be/EKyVFfa+:76OHC8YB+eztlbo1

Score
10/10

Malware Config

Extracted

Family

blacknet

Version

v3.7.0 Public

Botnet

bot01

C2

http://18.117.193.148/

Mutex

BN[]

Attributes
  • antivm

    false

  • elevate_uac

    false

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    e162b1333458a713bc6916cc8ac4110c

  • startup

    false

  • usb_spread

    false

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 1 IoCs
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2020

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2020-54-0x0000000000D70000-0x0000000000D8E000-memory.dmp
    Filesize

    120KB

  • memory/2020-55-0x000007FEFB5F1000-0x000007FEFB5F3000-memory.dmp
    Filesize

    8KB

  • memory/2020-56-0x000000001ADF9000-0x000000001AE18000-memory.dmp
    Filesize

    124KB

  • memory/2020-57-0x000000001ADF9000-0x000000001AE18000-memory.dmp
    Filesize

    124KB