Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 21:19
Behavioral task
behavioral1
Sample
stub.exe
Resource
win7-20230220-en
5 signatures
150 seconds
General
-
Target
stub.exe
-
Size
102KB
-
MD5
e162b1333458a713bc6916cc8ac4110c
-
SHA1
7053e1ae3e60b42f9fb8850f8a727099530c8fcd
-
SHA256
2b3b8c1083bb3e4524b758a755cf17fbb352aa92d272912997bd0674365d6d02
-
SHA512
9a508117a757e4fcf192916641c77e26769e5939b6c3fa078fedad9a2821e24e69de0da74dd0cbff0309aa28cd813599dc261ded932a711dfdbb80c7ea3b353a
-
SSDEEP
3072:BW8APjq+thIi0nPFhBbxCTomsVQYcU363K75rVzQgWzeuyb1X4Lt/VYLl4ECizQh:A8APwPFhBbxCTomsVQYc463K75rVzNW1
Malware Config
Extracted
Family
blacknet
Version
v3.7.0 Public
Botnet
[ID]
C2
[HOST]
Mutex
[MUTEX]
Attributes
-
antivm
false
-
elevate_uac
false
-
install_name
[Install_Name]
-
splitter
[Splitter]
-
start_name
[StartupName]
-
startup
false
-
usb_spread
false
aes.plain
Signatures
-
BlackNET payload 2 IoCs
resource yara_rule behavioral2/memory/4264-133-0x0000000000590000-0x00000000005B0000-memory.dmp family_blacknet behavioral2/memory/4264-134-0x000000001B250000-0x000000001B260000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/4264-133-0x0000000000590000-0x00000000005B0000-memory.dmp disable_win_def behavioral2/memory/4264-134-0x000000001B250000-0x000000001B260000-memory.dmp disable_win_def -
Program crash 1 IoCs
pid pid_target Process procid_target 2248 4264 WerFault.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe"1⤵PID:4264
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4264 -s 9762⤵
- Program crash
PID:2248
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 4264 -ip 42641⤵PID:3724