Analysis

  • max time kernel
    29s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-03-2024 22:11

General

  • Target

    AD5D8A274EAFF455047D801EE9B6231F.exe

  • Size

    493KB

  • MD5

    ad5d8a274eaff455047d801ee9b6231f

  • SHA1

    1a43eb1ae77914cb58e6cffc8a4e8a1eebfee7d2

  • SHA256

    662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3

  • SHA512

    ceb178dbb8e913c489de2eb7cb8c3d3f16b574934155a8fe6d73ec6235e40bb76fdffb34ae33a8e38abd912e3df5efd624104db9693e929e4bd0087b2b266932

  • SSDEEP

    12288:uxjrr7F5qfMs8WdcOX+t4c08no9IaJnv+N6G/wWEh59ma4:uxLsMs8WdcMx8+I+TDV4

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 1 IoCs
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AD5D8A274EAFF455047D801EE9B6231F.exe
    "C:\Users\Admin\AppData\Local\Temp\AD5D8A274EAFF455047D801EE9B6231F.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Users\Admin\AppData\Roaming\Updater.exe
      "C:\Users\Admin\AppData\Roaming\Updater.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3204
      • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
        "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:800
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
            PID:2492
          • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
            "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
            4⤵
              PID:4456
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" Get-MpPreference -verbose
                5⤵
                  PID:4468
              • C:\Users\Admin\AppData\Roaming\svchosts.exe
                "C:\Users\Admin\AppData\Roaming\svchosts.exe"
                4⤵
                  PID:2808
                  • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
                    "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
                    5⤵
                      PID:4636
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "powershell" Get-MpPreference -verbose
                        6⤵
                          PID:2296
                        • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
                          "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
                          6⤵
                            PID:2320
                        • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
                          "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
                          5⤵
                            PID:508
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
                    1⤵
                      PID:1236

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Adobe Photoshop CS12.exe.log

                      Filesize

                      866B

                      MD5

                      4319b58c3bb0f95e5f63b4d85b6dfc17

                      SHA1

                      caf6bbfc1a1beb7d3c523e944ce4fe18c2f9d03e

                      SHA256

                      44f03ead664331c3f81b315a49b9b05745f3c037f39ccbe00c4820b2afedc233

                      SHA512

                      58ee8dec9fce1e768400a3c142a039c67d43048803350c39ec8e0cf0a36ba9994f7d1d72c2479c3143128479df4bf75889d0473ed653d7e54c5d936b938c4266

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                      Filesize

                      2KB

                      MD5

                      d85ba6ff808d9e5444a4b369f5bc2730

                      SHA1

                      31aa9d96590fff6981b315e0b391b575e4c0804a

                      SHA256

                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                      SHA512

                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      944B

                      MD5

                      3bb6d2c2bb9c48df0e435cba154c5fca

                      SHA1

                      9a07836ce1cbeeab28132d105d7b1f0fb453283e

                      SHA256

                      a649f357d142967f73bbccd72ca3047b9d764d6dc83bad5ec1307d2ab0a4ae69

                      SHA512

                      b8f81825eed40306d23dd3289ef94ce5074b0c866538b8441c86e3796dfc2bfe485939b20c748fb5eb4358ecc170ef02ca98f5b815b1fab786d2c92ad9b373f1

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                      Filesize

                      944B

                      MD5

                      2e907f77659a6601fcc408274894da2e

                      SHA1

                      9f5b72abef1cd7145bf37547cdb1b9254b4efe9d

                      SHA256

                      385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233

                      SHA512

                      34fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xlahffgm.o2t.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe

                      Filesize

                      195KB

                      MD5

                      d867a6939e03ff1ccf63605dddea632e

                      SHA1

                      b04f4689ac1ecd317387b28fad290f15a68878d9

                      SHA256

                      eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b

                      SHA512

                      28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3808065738-1666277613-1125846146-1000\b1c8b8e47b784521e810d16093eeb446_2397ee06-28fe-4eaa-8777-f7014368c353

                      Filesize

                      2KB

                      MD5

                      8de91c4f830956990012f9fd1269e490

                      SHA1

                      5396852c5a98d586d3970638bebf52ac4d7da6b9

                      SHA256

                      4b1f314ed0d2dd0aedd922297f2b16cce1d5716a24469b72a9e17ea43bc40433

                      SHA512

                      4c0ef84683613edb6196a43e2da73c58203e080cdee1c4119ad6b3823db137fec0628eb7fa8f34a7da93aa142a13b001168959d59cb425ae858372b5d7f2d555

                    • C:\Users\Admin\AppData\Roaming\Updater.exe

                      Filesize

                      329KB

                      MD5

                      317abf62a372c7d88088dbbfea227449

                      SHA1

                      f193753fca12f4576eec8d8d82796e13da54fd56

                      SHA256

                      6b0934e044667b39e0826d98239c96b4978fc73f2e12bab9cefa13e87cd3b2fc

                      SHA512

                      628675c573d713fda4a18548a5160aaed44ac719d07d570ceff856f425b5181b1f552c34bfb0be9bddfa14672c323923cb0c6c496a1a8608ce8f4215fb6ab8d8

                    • C:\Users\Admin\AppData\Roaming\svchosts.exe

                      Filesize

                      18KB

                      MD5

                      d133d370c3858c9811e70f95d554d2c6

                      SHA1

                      bb09b1253ce571a49b76951283883a3499588295

                      SHA256

                      87a1711030512dd414bcbab0659a2b51c0c16505bd8a068a282a1cc2c9fdf93b

                      SHA512

                      db4d41fca43e496b2b0d8d47d936a9ce204e3b6c4c669a8a9810362776a977b5337359b843fcd1d20004455d2c91f9790b3accb5352f4e55ec53c7e5d359d778

                    • memory/800-27-0x0000000000C60000-0x0000000000C68000-memory.dmp

                      Filesize

                      32KB

                    • memory/800-81-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/800-34-0x000000001F1D0000-0x000000001F232000-memory.dmp

                      Filesize

                      392KB

                    • memory/800-41-0x0000000000D40000-0x0000000000D50000-memory.dmp

                      Filesize

                      64KB

                    • memory/800-42-0x0000000000D40000-0x0000000000D50000-memory.dmp

                      Filesize

                      64KB

                    • memory/800-52-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/800-69-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/800-28-0x000000001C030000-0x000000001C07C000-memory.dmp

                      Filesize

                      304KB

                    • memory/800-21-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/800-26-0x000000001BE60000-0x000000001BEFC000-memory.dmp

                      Filesize

                      624KB

                    • memory/800-53-0x0000000000D40000-0x0000000000D50000-memory.dmp

                      Filesize

                      64KB

                    • memory/800-22-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/800-23-0x0000000000D40000-0x0000000000D50000-memory.dmp

                      Filesize

                      64KB

                    • memory/800-77-0x0000000000D40000-0x0000000000D50000-memory.dmp

                      Filesize

                      64KB

                    • memory/800-24-0x000000001B2D0000-0x000000001B376000-memory.dmp

                      Filesize

                      664KB

                    • memory/800-25-0x000000001B8F0000-0x000000001BDBE000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/800-29-0x0000000000D40000-0x0000000000D50000-memory.dmp

                      Filesize

                      64KB

                    • memory/800-82-0x0000000021080000-0x0000000021084000-memory.dmp

                      Filesize

                      16KB

                    • memory/2296-10514-0x00000174776F0000-0x0000017477700000-memory.dmp

                      Filesize

                      64KB

                    • memory/2296-10485-0x00000174776F0000-0x0000017477700000-memory.dmp

                      Filesize

                      64KB

                    • memory/2320-10455-0x0000000001310000-0x0000000001320000-memory.dmp

                      Filesize

                      64KB

                    • memory/2320-10482-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2320-10625-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2492-99-0x000001CB299F0000-0x000001CB29A00000-memory.dmp

                      Filesize

                      64KB

                    • memory/2492-84-0x000001CB299F0000-0x000001CB29A00000-memory.dmp

                      Filesize

                      64KB

                    • memory/2492-98-0x000001CB299F0000-0x000001CB29A00000-memory.dmp

                      Filesize

                      64KB

                    • memory/2492-106-0x00007FF89EAE0000-0x00007FF89F5A1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2492-83-0x00007FF89EAE0000-0x00007FF89F5A1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2492-93-0x000001CB114F0000-0x000001CB11512000-memory.dmp

                      Filesize

                      136KB

                    • memory/2492-85-0x000001CB299F0000-0x000001CB29A00000-memory.dmp

                      Filesize

                      64KB

                    • memory/2808-76-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2808-231-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2808-75-0x0000000000C90000-0x0000000000CA0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2808-80-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2808-117-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2808-121-0x0000000000C90000-0x0000000000CA0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-119-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-10560-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-116-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/4456-122-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-123-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/4456-10412-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-78-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/4456-74-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/4456-70-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-118-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-86-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-1088-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4456-87-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4468-244-0x00000199D04F0000-0x00000199D0500000-memory.dmp

                      Filesize

                      64KB

                    • memory/4468-6039-0x00007FF89EAE0000-0x00007FF89F5A1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4468-1127-0x00000199D04F0000-0x00000199D0500000-memory.dmp

                      Filesize

                      64KB

                    • memory/4468-196-0x00000199D04F0000-0x00000199D0500000-memory.dmp

                      Filesize

                      64KB

                    • memory/4468-173-0x00007FF89EAE0000-0x00007FF89F5A1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/4636-267-0x0000000000E60000-0x0000000000E70000-memory.dmp

                      Filesize

                      64KB

                    • memory/4636-10431-0x0000000000E60000-0x0000000000E70000-memory.dmp

                      Filesize

                      64KB

                    • memory/4636-10430-0x0000000000E60000-0x0000000000E70000-memory.dmp

                      Filesize

                      64KB

                    • memory/4636-10413-0x0000000000E60000-0x0000000000E70000-memory.dmp

                      Filesize

                      64KB

                    • memory/4636-10379-0x0000000000E60000-0x0000000000E70000-memory.dmp

                      Filesize

                      64KB

                    • memory/4636-10376-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/4636-10547-0x0000000000E60000-0x0000000000E70000-memory.dmp

                      Filesize

                      64KB

                    • memory/4636-111-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/4636-110-0x0000000000E60000-0x0000000000E70000-memory.dmp

                      Filesize

                      64KB

                    • memory/4636-109-0x00007FF8A0EE0000-0x00007FF8A1881000-memory.dmp

                      Filesize

                      9.6MB