Analysis

  • max time kernel
    45s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18/06/2023, 07:32

General

  • Target

    HEUR-Trojan.Win32.Generic-4d178e10389731a660d.exe

  • Size

    183KB

  • MD5

    d677c626953c9ba17b3d094a83b1048e

  • SHA1

    bf78af289038b4c088b7679a3d08627dac4883bd

  • SHA256

    4d178e10389731a660d8dc1240f6d64723aae55ad953150bed2520d2c39e6644

  • SHA512

    a6089df6a109ce91644e338b98ee9de96fa1a13040315e05ccac4afd362233cbbb8057cf5bb66de606c9231059d5bde29ab6cd92fb811bf086057a311fc60418

  • SSDEEP

    1536:XgzTtxCCkI7Yq0GzAc4xYEwbJbSDzlkW3zzxV/A8:QzTeLuzAGbJUGWv/A8

Malware Config

Extracted

Family

blacknet

Attributes
  • antivm

    false

  • elevate_uac

    false

  • install_name

  • splitter

  • start_name

  • startup

    false

  • usb_spread

    false

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 2 IoCs
  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-4d178e10389731a660d.exe
    "C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-4d178e10389731a660d.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1304
    • C:\ProgramData\Microsoft\MyClient\defenderr.exe
      "C:\ProgramData\Microsoft\MyClient\defenderr.exe"
      2⤵
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1312
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1652 -s 31252
        3⤵
        • Program crash
        PID:1388

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\MyClient\defenderr.exe

    Filesize

    183KB

    MD5

    d677c626953c9ba17b3d094a83b1048e

    SHA1

    bf78af289038b4c088b7679a3d08627dac4883bd

    SHA256

    4d178e10389731a660d8dc1240f6d64723aae55ad953150bed2520d2c39e6644

    SHA512

    a6089df6a109ce91644e338b98ee9de96fa1a13040315e05ccac4afd362233cbbb8057cf5bb66de606c9231059d5bde29ab6cd92fb811bf086057a311fc60418

  • C:\ProgramData\Microsoft\MyClient\defenderr.exe

    Filesize

    183KB

    MD5

    d677c626953c9ba17b3d094a83b1048e

    SHA1

    bf78af289038b4c088b7679a3d08627dac4883bd

    SHA256

    4d178e10389731a660d8dc1240f6d64723aae55ad953150bed2520d2c39e6644

    SHA512

    a6089df6a109ce91644e338b98ee9de96fa1a13040315e05ccac4afd362233cbbb8057cf5bb66de606c9231059d5bde29ab6cd92fb811bf086057a311fc60418

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    91efbdb32f3d4a1f8f41a922da3b293c

    SHA1

    43542858d0a48cc293ab66b9b6d86bc66b20f7ca

    SHA256

    9b9c4c6ec3ec32e5d7485358e7b9ab03fcf62bd99114da723a27f87db1a1df41

    SHA512

    135edfdf6d7f54089a3da9311c44b0dbdc5a674591beeb62fe85d29b4c8d5f9a36116aab1ec13e1d366e6c329e6a7bc5ae9811ef858eb1c0421b42ed997f85ff

  • memory/1304-67-0x0000000002710000-0x0000000002790000-memory.dmp

    Filesize

    512KB

  • memory/1304-64-0x000000001B150000-0x000000001B432000-memory.dmp

    Filesize

    2.9MB

  • memory/1304-65-0x0000000002310000-0x0000000002318000-memory.dmp

    Filesize

    32KB

  • memory/1304-66-0x0000000002710000-0x0000000002790000-memory.dmp

    Filesize

    512KB

  • memory/1304-68-0x0000000002710000-0x0000000002790000-memory.dmp

    Filesize

    512KB

  • memory/1304-69-0x000000000271B000-0x0000000002752000-memory.dmp

    Filesize

    220KB

  • memory/1312-93-0x00000000024B0000-0x0000000002530000-memory.dmp

    Filesize

    512KB

  • memory/1312-91-0x000000001B2E0000-0x000000001B5C2000-memory.dmp

    Filesize

    2.9MB

  • memory/1312-94-0x00000000024B0000-0x0000000002530000-memory.dmp

    Filesize

    512KB

  • memory/1312-92-0x0000000001F40000-0x0000000001F48000-memory.dmp

    Filesize

    32KB

  • memory/1312-95-0x00000000024BB000-0x00000000024F2000-memory.dmp

    Filesize

    220KB

  • memory/1652-77-0x0000000000BE0000-0x0000000000C14000-memory.dmp

    Filesize

    208KB

  • memory/1652-107-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-122-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-121-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-120-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-119-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-83-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-84-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-85-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-118-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-117-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-116-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-115-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-114-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-113-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-96-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-97-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-98-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-99-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-102-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-101-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-100-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-103-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-104-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-105-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-106-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-108-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-109-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-110-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-111-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/1652-112-0x00000000009B0000-0x0000000000A30000-memory.dmp

    Filesize

    512KB

  • memory/2000-81-0x000000001F09D000-0x000000001F0A5000-memory.dmp

    Filesize

    32KB

  • memory/2000-55-0x00000000001A0000-0x00000000001DA000-memory.dmp

    Filesize

    232KB

  • memory/2000-56-0x000000001AF70000-0x000000001AFF0000-memory.dmp

    Filesize

    512KB

  • memory/2000-57-0x000000001AF70000-0x000000001AFF0000-memory.dmp

    Filesize

    512KB

  • memory/2000-58-0x000000001AF70000-0x000000001AFF0000-memory.dmp

    Filesize

    512KB

  • memory/2000-59-0x000000001AF70000-0x000000001AFF0000-memory.dmp

    Filesize

    512KB

  • memory/2000-54-0x0000000000160000-0x0000000000194000-memory.dmp

    Filesize

    208KB

  • memory/2000-82-0x000000001F0A5000-0x000000001F0B5000-memory.dmp

    Filesize

    64KB

  • memory/2000-78-0x000000001AFD9000-0x000000001AFDD000-memory.dmp

    Filesize

    16KB

  • memory/2000-79-0x000000001F060000-0x000000001F065000-memory.dmp

    Filesize

    20KB

  • memory/2000-80-0x000000001F08D000-0x000000001F095000-memory.dmp

    Filesize

    32KB