Analysis

  • max time kernel
    134s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 14:17

General

  • Target

    D5EA5EC6D3DD740D1D8B6B817A667094.exe

  • Size

    75KB

  • MD5

    d5ea5ec6d3dd740d1d8b6b817a667094

  • SHA1

    f75cffadf0cb8c7afac041d42d7beb416474e96a

  • SHA256

    c9bd849cb30e63f3fa72d83b52303b21f3a880a5e7c6236e38a92dc078467e8d

  • SHA512

    c4cc9305e6d10ef16860c6f3c1a29dd0377d2946e5c17dd7cb4d8ec56d262840ee9530c542e82ac337e0abe558e0fe3c58465d11652a9feb1a6fba6494e2d2a8

  • SSDEEP

    1536:5ZuhD5z28TC2qM/AEc7s1PsYTgbSUPH4Lb0tY4:eNoEc7suugbSKHaboY4

Score
10/10

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D5EA5EC6D3DD740D1D8B6B817A667094.exe
    "C:\Users\Admin\AppData\Local\Temp\D5EA5EC6D3DD740D1D8B6B817A667094.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1060-0-0x000000001AF20000-0x000000001AFC6000-memory.dmp

    Filesize

    664KB

  • memory/1060-1-0x00007FF91F6A0000-0x00007FF920041000-memory.dmp

    Filesize

    9.6MB

  • memory/1060-2-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/1060-4-0x000000001B590000-0x000000001BA5E000-memory.dmp

    Filesize

    4.8MB

  • memory/1060-3-0x00007FF91F6A0000-0x00007FF920041000-memory.dmp

    Filesize

    9.6MB

  • memory/1060-5-0x000000001BB00000-0x000000001BB9C000-memory.dmp

    Filesize

    624KB

  • memory/1060-6-0x0000000000A30000-0x0000000000A38000-memory.dmp

    Filesize

    32KB

  • memory/1060-7-0x000000001BC30000-0x000000001BC7C000-memory.dmp

    Filesize

    304KB

  • memory/1060-8-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/1060-9-0x000000001C750000-0x000000001C7B2000-memory.dmp

    Filesize

    392KB

  • memory/1060-10-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/1060-11-0x00007FF91F6A0000-0x00007FF920041000-memory.dmp

    Filesize

    9.6MB

  • memory/1060-12-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/1060-13-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB