Analysis

  • max time kernel
    60s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04-03-2024 02:11

General

  • Target

    662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3.exe

  • Size

    493KB

  • MD5

    ad5d8a274eaff455047d801ee9b6231f

  • SHA1

    1a43eb1ae77914cb58e6cffc8a4e8a1eebfee7d2

  • SHA256

    662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3

  • SHA512

    ceb178dbb8e913c489de2eb7cb8c3d3f16b574934155a8fe6d73ec6235e40bb76fdffb34ae33a8e38abd912e3df5efd624104db9693e929e4bd0087b2b266932

  • SSDEEP

    12288:uxjrr7F5qfMs8WdcOX+t4c08no9IaJnv+N6G/wWEh59ma4:uxLsMs8WdcMx8+I+TDV4

Malware Config

Extracted

Family

blacknet

Botnet

Windows Update

C2

wOzx3g1DVutJaIF8JkCiLDWWDUVaGVAFT9MNNbf3GHejuL8mYQHtmLByJVduHMIIMCJOTkByRDSvMbknVYDMjFMd33ucCNGRd6rsd55Kjfz5N8toWqPtUAUWFp2VPBqwDphjXZsEuRw6KPvEHxNrRtmmNF3TSPIX5em2yZySCQTum749uJG4nmFWEHI/cH1NCAx4fFkBSOcgGykeOVQl1nGRgAHWZfv9g9qNaMeeu53b56HQWR/mZ6mTILTeO979h0iF42Y1WsHlP1Cd9xLI0jeNeBHY9FCS6EZPmLXKu/X9q8n26O7UQt6xg0ujFGbbUZ8glKZ26j6atQFXHOQGag==

Mutex

BN[fEVvWhbt-6079003]

Attributes
  • antivm

    true

  • elevate_uac

    true

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    35dcbc7eb742dd4f1edfbccf7826c724

  • startup

    true

  • usb_spread

    true

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 1 IoCs
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Detects executables containing artifacts associated with disabling Widnows Defender 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3.exe
    "C:\Users\Admin\AppData\Local\Temp\662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Roaming\Updater.exe
      "C:\Users\Admin\AppData\Roaming\Updater.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
        "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2752
        • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
          "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
          4⤵
          • Executes dropped EXE
          PID:1408
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" Get-MpPreference -verbose
            5⤵
              PID:2164
          • C:\Users\Admin\AppData\Roaming\svchosts.exe
            "C:\Users\Admin\AppData\Roaming\svchosts.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2212
            • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
              "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
              5⤵
              • Executes dropped EXE
              PID:2944
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" Get-MpPreference -verbose
                6⤵
                  PID:2924
                • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
                  "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
                  6⤵
                    PID:2908
                • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
                  "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
                  5⤵
                    PID:1932

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2721934792-624042501-2768869379-1000\10d56e1366965bd082ef1ceef95be246_dbaf3979-518f-4824-86e4-f33db9fb991c

            Filesize

            2KB

            MD5

            8de91c4f830956990012f9fd1269e490

            SHA1

            5396852c5a98d586d3970638bebf52ac4d7da6b9

            SHA256

            4b1f314ed0d2dd0aedd922297f2b16cce1d5716a24469b72a9e17ea43bc40433

            SHA512

            4c0ef84683613edb6196a43e2da73c58203e080cdee1c4119ad6b3823db137fec0628eb7fa8f34a7da93aa142a13b001168959d59cb425ae858372b5d7f2d555

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            1a8c7c8ae36c09399c465ed27d37ec87

            SHA1

            ad45fa4fc346973d360d8c3a1b281b7ebc88bdd9

            SHA256

            d84d2f60ea8242952d1c36d2f46c51cc40eb484003a37656c44847cbc6755fb9

            SHA512

            91cbf42c0ee257185b70355d58818babce42900a1827aa08cd609a35ec1b1af6b123aee2e6aae4dc813cfd6eccd99eb44aceb514ab7b77b2a160cd0933b3e0ae

          • C:\Users\Admin\AppData\Roaming\svchosts.exe

            Filesize

            18KB

            MD5

            d133d370c3858c9811e70f95d554d2c6

            SHA1

            bb09b1253ce571a49b76951283883a3499588295

            SHA256

            87a1711030512dd414bcbab0659a2b51c0c16505bd8a068a282a1cc2c9fdf93b

            SHA512

            db4d41fca43e496b2b0d8d47d936a9ce204e3b6c4c669a8a9810362776a977b5337359b843fcd1d20004455d2c91f9790b3accb5352f4e55ec53c7e5d359d778

          • \Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe

            Filesize

            195KB

            MD5

            d867a6939e03ff1ccf63605dddea632e

            SHA1

            b04f4689ac1ecd317387b28fad290f15a68878d9

            SHA256

            eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b

            SHA512

            28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2

          • \Users\Admin\AppData\Roaming\Updater.exe

            Filesize

            329KB

            MD5

            317abf62a372c7d88088dbbfea227449

            SHA1

            f193753fca12f4576eec8d8d82796e13da54fd56

            SHA256

            6b0934e044667b39e0826d98239c96b4978fc73f2e12bab9cefa13e87cd3b2fc

            SHA512

            628675c573d713fda4a18548a5160aaed44ac719d07d570ceff856f425b5181b1f552c34bfb0be9bddfa14672c323923cb0c6c496a1a8608ce8f4215fb6ab8d8

          • memory/1408-87-0x0000000002040000-0x00000000020C0000-memory.dmp

            Filesize

            512KB

          • memory/1408-78-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/1408-115-0x0000000002040000-0x00000000020C0000-memory.dmp

            Filesize

            512KB

          • memory/1408-120-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/1408-121-0x0000000002040000-0x00000000020C0000-memory.dmp

            Filesize

            512KB

          • memory/1408-82-0x0000000002040000-0x00000000020C0000-memory.dmp

            Filesize

            512KB

          • memory/1408-84-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2212-122-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2212-90-0x00000000009F0000-0x0000000000A70000-memory.dmp

            Filesize

            512KB

          • memory/2212-93-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2212-95-0x00000000009F0000-0x0000000000A70000-memory.dmp

            Filesize

            512KB

          • memory/2212-100-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2212-116-0x00000000009F0000-0x0000000000A70000-memory.dmp

            Filesize

            512KB

          • memory/2212-128-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2616-63-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-41-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-30-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-31-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2616-29-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2616-72-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-75-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-32-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-37-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2616-64-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-54-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-38-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-55-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-58-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-52-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-40-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-91-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-92-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-50-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-94-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-42-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-96-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-97-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-98-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-99-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-113-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2616-101-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-102-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-103-0x0000000020890000-0x0000000020A90000-memory.dmp

            Filesize

            2.0MB

          • memory/2616-104-0x0000000020890000-0x0000000020A90000-memory.dmp

            Filesize

            2.0MB

          • memory/2616-105-0x0000000020890000-0x0000000020A90000-memory.dmp

            Filesize

            2.0MB

          • memory/2616-106-0x0000000020890000-0x0000000020A90000-memory.dmp

            Filesize

            2.0MB

          • memory/2616-107-0x0000000020890000-0x0000000020A90000-memory.dmp

            Filesize

            2.0MB

          • memory/2616-108-0x0000000020890000-0x0000000020A90000-memory.dmp

            Filesize

            2.0MB

          • memory/2616-109-0x0000000020890000-0x0000000020A90000-memory.dmp

            Filesize

            2.0MB

          • memory/2616-110-0x000000001F3A0000-0x000000001F4A0000-memory.dmp

            Filesize

            1024KB

          • memory/2616-111-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2616-112-0x0000000001ED0000-0x0000000001F50000-memory.dmp

            Filesize

            512KB

          • memory/2752-69-0x0000000002D60000-0x0000000002DE0000-memory.dmp

            Filesize

            512KB

          • memory/2752-51-0x000000001B620000-0x000000001B902000-memory.dmp

            Filesize

            2.9MB

          • memory/2752-83-0x0000000002D6B000-0x0000000002DD2000-memory.dmp

            Filesize

            412KB

          • memory/2752-79-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2752-76-0x0000000002D60000-0x0000000002DE0000-memory.dmp

            Filesize

            512KB

          • memory/2752-71-0x0000000002D60000-0x0000000002DE0000-memory.dmp

            Filesize

            512KB

          • memory/2752-70-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2752-53-0x0000000001D60000-0x0000000001D68000-memory.dmp

            Filesize

            32KB

          • memory/2944-123-0x0000000000A80000-0x0000000000B00000-memory.dmp

            Filesize

            512KB

          • memory/2944-119-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB

          • memory/2944-118-0x0000000000A80000-0x0000000000B00000-memory.dmp

            Filesize

            512KB

          • memory/2944-117-0x000007FEF5960000-0x000007FEF62FD000-memory.dmp

            Filesize

            9.6MB