Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2023 01:55
Behavioral task
behavioral1
Sample
2b3b8c1083bb3e4524b758a755cf17fbb352aa92d272912997bd0674365d6d02.exe
Resource
win7-20230220-en
General
-
Target
2b3b8c1083bb3e4524b758a755cf17fbb352aa92d272912997bd0674365d6d02.exe
-
Size
102KB
-
MD5
e162b1333458a713bc6916cc8ac4110c
-
SHA1
7053e1ae3e60b42f9fb8850f8a727099530c8fcd
-
SHA256
2b3b8c1083bb3e4524b758a755cf17fbb352aa92d272912997bd0674365d6d02
-
SHA512
9a508117a757e4fcf192916641c77e26769e5939b6c3fa078fedad9a2821e24e69de0da74dd0cbff0309aa28cd813599dc261ded932a711dfdbb80c7ea3b353a
-
SSDEEP
3072:BW8APjq+thIi0nPFhBbxCTomsVQYcU363K75rVzQgWzeuyb1X4Lt/VYLl4ECizQh:A8APwPFhBbxCTomsVQYc463K75rVzNW1
Malware Config
Extracted
blacknet
v3.7.0 Public
[ID]
[HOST]
[MUTEX]
-
antivm
false
-
elevate_uac
false
-
install_name
[Install_Name]
-
splitter
[Splitter]
-
start_name
[StartupName]
-
startup
false
-
usb_spread
false
Signatures
-
BlackNET payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4288-133-0x0000000000990000-0x00000000009B0000-memory.dmp family_blacknet behavioral2/memory/4288-134-0x000000001B5A0000-0x000000001B5B0000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/4288-133-0x0000000000990000-0x00000000009B0000-memory.dmp disable_win_def behavioral2/memory/4288-134-0x000000001B5A0000-0x000000001B5B0000-memory.dmp disable_win_def -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3708 4288 WerFault.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b3b8c1083bb3e4524b758a755cf17fbb352aa92d272912997bd0674365d6d02.exe"C:\Users\Admin\AppData\Local\Temp\2b3b8c1083bb3e4524b758a755cf17fbb352aa92d272912997bd0674365d6d02.exe"1⤵PID:4288
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4288 -s 9762⤵
- Program crash
PID:3708
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 404 -p 4288 -ip 42881⤵PID:5016