Analysis
-
max time kernel
90s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2023, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe
Resource
win7-20220812-en
General
-
Target
91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe
-
Size
873KB
-
MD5
42b8b74ec77a26c89389fa1846b14ebc
-
SHA1
53ee3acd6146cb982c0f5aa583d93ba961bd4d07
-
SHA256
91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a
-
SHA512
9572cb51e9d0b8a2175bfdcf603856d2951fc7c188ec0922b487b314cf6598a1421484338a3d0187ea0eca3a491ccd6ed19fcffea5ff553ac3119e096b9b2769
-
SSDEEP
12288:GDJFGJ1MBqv6KOtAr7ClNpHaNGIr8QTBcRG8k6QDH:GDJFDw0hlNpH05r8KBcRK6YH
Malware Config
Extracted
blacknet
v3.7.0 Public
WF6Fo4
http://185.239.242.77/fucku/getwrecked/fockbot/
BN[98f274ee7dffa0a483bf6aae80c1bed1]
-
antivm
false
-
elevate_uac
false
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
e162b1333458a713bc6916cc8ac4110c
-
startup
false
-
usb_spread
true
Signatures
-
BlackNET payload 1 IoCs
resource yara_rule behavioral2/memory/1620-142-0x00000000003E0000-0x00000000003FE000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/1620-142-0x00000000003E0000-0x00000000003FE000-memory.dmp disable_win_def -
Executes dropped EXE 1 IoCs
pid Process 1620 InstallUtil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2096 set thread context of 1620 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4980 PING.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe Token: SeDebugPrivilege 1620 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1620 InstallUtil.exe 1620 InstallUtil.exe 1620 InstallUtil.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1620 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 87 PID 2096 wrote to memory of 1620 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 87 PID 2096 wrote to memory of 1620 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 87 PID 2096 wrote to memory of 1620 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 87 PID 2096 wrote to memory of 1620 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 87 PID 2096 wrote to memory of 1620 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 87 PID 2096 wrote to memory of 1620 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 87 PID 2096 wrote to memory of 1620 2096 91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe 87 PID 1620 wrote to memory of 3508 1620 InstallUtil.exe 89 PID 1620 wrote to memory of 3508 1620 InstallUtil.exe 89 PID 1620 wrote to memory of 3508 1620 InstallUtil.exe 89 PID 3508 wrote to memory of 4980 3508 cmd.exe 91 PID 3508 wrote to memory of 4980 3508 cmd.exe 91 PID 3508 wrote to memory of 4980 3508 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe"C:\Users\Admin\AppData\Local\Temp\91c23be6780cd10b2f46371601701182302a0f214f8b01028def69aadee0410a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 1.1.1.1 -n 5 -w 5000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 5 -w 50004⤵
- Runs ping.exe
PID:4980
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159