Analysis
-
max time kernel
86s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 21:13
Behavioral task
behavioral1
Sample
stub.exe
Resource
win7-20230220-en
5 signatures
150 seconds
General
-
Target
stub.exe
-
Size
102KB
-
MD5
e162b1333458a713bc6916cc8ac4110c
-
SHA1
7053e1ae3e60b42f9fb8850f8a727099530c8fcd
-
SHA256
2b3b8c1083bb3e4524b758a755cf17fbb352aa92d272912997bd0674365d6d02
-
SHA512
9a508117a757e4fcf192916641c77e26769e5939b6c3fa078fedad9a2821e24e69de0da74dd0cbff0309aa28cd813599dc261ded932a711dfdbb80c7ea3b353a
-
SSDEEP
3072:BW8APjq+thIi0nPFhBbxCTomsVQYcU363K75rVzQgWzeuyb1X4Lt/VYLl4ECizQh:A8APwPFhBbxCTomsVQYc463K75rVzNW1
Malware Config
Extracted
Family
blacknet
Version
v3.7.0 Public
Botnet
[ID]
C2
[HOST]
Mutex
[MUTEX]
Attributes
-
antivm
false
-
elevate_uac
false
-
install_name
[Install_Name]
-
splitter
[Splitter]
-
start_name
[StartupName]
-
startup
false
-
usb_spread
false
aes.plain
Signatures
-
BlackNET payload 1 IoCs
resource yara_rule behavioral2/memory/3960-133-0x0000000000E40000-0x0000000000E60000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/3960-133-0x0000000000E40000-0x0000000000E60000-memory.dmp disable_win_def -
Program crash 1 IoCs
pid pid_target Process procid_target 2244 3960 WerFault.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe"1⤵PID:3960
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3960 -s 9762⤵
- Program crash
PID:2244
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 3960 -ip 39601⤵PID:856