Analysis

  • max time kernel
    142s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 14:16

General

  • Target

    D5EA5EC6D3DD740D1D8B6B817A667094.exe

  • Size

    75KB

  • MD5

    d5ea5ec6d3dd740d1d8b6b817a667094

  • SHA1

    f75cffadf0cb8c7afac041d42d7beb416474e96a

  • SHA256

    c9bd849cb30e63f3fa72d83b52303b21f3a880a5e7c6236e38a92dc078467e8d

  • SHA512

    c4cc9305e6d10ef16860c6f3c1a29dd0377d2946e5c17dd7cb4d8ec56d262840ee9530c542e82ac337e0abe558e0fe3c58465d11652a9feb1a6fba6494e2d2a8

  • SSDEEP

    1536:5ZuhD5z28TC2qM/AEc7s1PsYTgbSUPH4Lb0tY4:eNoEc7suugbSKHaboY4

Score
10/10

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D5EA5EC6D3DD740D1D8B6B817A667094.exe
    "C:\Users\Admin\AppData\Local\Temp\D5EA5EC6D3DD740D1D8B6B817A667094.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4548

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4548-0-0x000000001B210000-0x000000001B2B6000-memory.dmp

    Filesize

    664KB

  • memory/4548-1-0x00007FFB9CDC0000-0x00007FFB9D761000-memory.dmp

    Filesize

    9.6MB

  • memory/4548-2-0x0000000000D00000-0x0000000000D10000-memory.dmp

    Filesize

    64KB

  • memory/4548-3-0x000000001B790000-0x000000001BC5E000-memory.dmp

    Filesize

    4.8MB

  • memory/4548-4-0x00007FFB9CDC0000-0x00007FFB9D761000-memory.dmp

    Filesize

    9.6MB

  • memory/4548-5-0x000000001BDA0000-0x000000001BE3C000-memory.dmp

    Filesize

    624KB

  • memory/4548-6-0x0000000000E10000-0x0000000000E18000-memory.dmp

    Filesize

    32KB

  • memory/4548-7-0x000000001BF00000-0x000000001BF4C000-memory.dmp

    Filesize

    304KB

  • memory/4548-8-0x0000000000D00000-0x0000000000D10000-memory.dmp

    Filesize

    64KB

  • memory/4548-9-0x000000001C980000-0x000000001C9E2000-memory.dmp

    Filesize

    392KB

  • memory/4548-10-0x0000000000D00000-0x0000000000D10000-memory.dmp

    Filesize

    64KB

  • memory/4548-11-0x00007FFB9CDC0000-0x00007FFB9D761000-memory.dmp

    Filesize

    9.6MB

  • memory/4548-12-0x0000000000D00000-0x0000000000D10000-memory.dmp

    Filesize

    64KB

  • memory/4548-13-0x0000000000D00000-0x0000000000D10000-memory.dmp

    Filesize

    64KB