Analysis

  • max time kernel
    85s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-03-2024 02:11

General

  • Target

    662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3.exe

  • Size

    493KB

  • MD5

    ad5d8a274eaff455047d801ee9b6231f

  • SHA1

    1a43eb1ae77914cb58e6cffc8a4e8a1eebfee7d2

  • SHA256

    662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3

  • SHA512

    ceb178dbb8e913c489de2eb7cb8c3d3f16b574934155a8fe6d73ec6235e40bb76fdffb34ae33a8e38abd912e3df5efd624104db9693e929e4bd0087b2b266932

  • SSDEEP

    12288:uxjrr7F5qfMs8WdcOX+t4c08no9IaJnv+N6G/wWEh59ma4:uxLsMs8WdcMx8+I+TDV4

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 1 IoCs
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Detects executables containing artifacts associated with disabling Widnows Defender 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3.exe
    "C:\Users\Admin\AppData\Local\Temp\662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Users\Admin\AppData\Roaming\Updater.exe
      "C:\Users\Admin\AppData\Roaming\Updater.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
        "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3984
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3776
        • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
          "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
          4⤵
          • Executes dropped EXE
          PID:4416
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" Get-MpPreference -verbose
            5⤵
              PID:2000
          • C:\Users\Admin\AppData\Roaming\svchosts.exe
            "C:\Users\Admin\AppData\Roaming\svchosts.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3408
            • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
              "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
              5⤵
              • Executes dropped EXE
              PID:4440
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" Get-MpPreference -verbose
                6⤵
                  PID:684
                • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
                  "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
                  6⤵
                    PID:2780
                • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
                  "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
                  5⤵
                    PID:1080

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Adobe Photoshop CS12.exe.log

            Filesize

            866B

            MD5

            4319b58c3bb0f95e5f63b4d85b6dfc17

            SHA1

            caf6bbfc1a1beb7d3c523e944ce4fe18c2f9d03e

            SHA256

            44f03ead664331c3f81b315a49b9b05745f3c037f39ccbe00c4820b2afedc233

            SHA512

            58ee8dec9fce1e768400a3c142a039c67d43048803350c39ec8e0cf0a36ba9994f7d1d72c2479c3143128479df4bf75889d0473ed653d7e54c5d936b938c4266

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            d85ba6ff808d9e5444a4b369f5bc2730

            SHA1

            31aa9d96590fff6981b315e0b391b575e4c0804a

            SHA256

            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

            SHA512

            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            77d622bb1a5b250869a3238b9bc1402b

            SHA1

            d47f4003c2554b9dfc4c16f22460b331886b191b

            SHA256

            f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

            SHA512

            d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            792ce030edf976fe5aaf014cf7efe140

            SHA1

            1d826126b6973bbc2233b5ba3acc817cfc8487ef

            SHA256

            5308779552e97a55251bef36007eac517232e3c037de512130d8ae4dad8cff2e

            SHA512

            3866129562e07242a7fa3f8e7170535d3c8a0514a08a7f2b8442fbdcaab4e38694453030b708e719591079f74090664836bc8eb01d6b033ec9b09053cc949205

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_352f1edj.irm.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe

            Filesize

            195KB

            MD5

            d867a6939e03ff1ccf63605dddea632e

            SHA1

            b04f4689ac1ecd317387b28fad290f15a68878d9

            SHA256

            eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b

            SHA512

            28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2

          • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3045580317-3728985860-206385570-1000\3d5e4e8c7b80a867930ec00e34e8b286_2d983147-f9f1-498d-be7e-1997eada874a

            Filesize

            2KB

            MD5

            8de91c4f830956990012f9fd1269e490

            SHA1

            5396852c5a98d586d3970638bebf52ac4d7da6b9

            SHA256

            4b1f314ed0d2dd0aedd922297f2b16cce1d5716a24469b72a9e17ea43bc40433

            SHA512

            4c0ef84683613edb6196a43e2da73c58203e080cdee1c4119ad6b3823db137fec0628eb7fa8f34a7da93aa142a13b001168959d59cb425ae858372b5d7f2d555

          • C:\Users\Admin\AppData\Roaming\Updater.exe

            Filesize

            329KB

            MD5

            317abf62a372c7d88088dbbfea227449

            SHA1

            f193753fca12f4576eec8d8d82796e13da54fd56

            SHA256

            6b0934e044667b39e0826d98239c96b4978fc73f2e12bab9cefa13e87cd3b2fc

            SHA512

            628675c573d713fda4a18548a5160aaed44ac719d07d570ceff856f425b5181b1f552c34bfb0be9bddfa14672c323923cb0c6c496a1a8608ce8f4215fb6ab8d8

          • C:\Users\Admin\AppData\Roaming\svchosts.exe

            Filesize

            18KB

            MD5

            d133d370c3858c9811e70f95d554d2c6

            SHA1

            bb09b1253ce571a49b76951283883a3499588295

            SHA256

            87a1711030512dd414bcbab0659a2b51c0c16505bd8a068a282a1cc2c9fdf93b

            SHA512

            db4d41fca43e496b2b0d8d47d936a9ce204e3b6c4c669a8a9810362776a977b5337359b843fcd1d20004455d2c91f9790b3accb5352f4e55ec53c7e5d359d778

          • memory/3408-146-0x0000000000840000-0x0000000000850000-memory.dmp

            Filesize

            64KB

          • memory/3408-139-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/3408-121-0x0000000000840000-0x0000000000850000-memory.dmp

            Filesize

            64KB

          • memory/3408-118-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/3408-142-0x0000000000840000-0x0000000000850000-memory.dmp

            Filesize

            64KB

          • memory/3408-143-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/3408-97-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/3408-95-0x0000000000840000-0x0000000000850000-memory.dmp

            Filesize

            64KB

          • memory/3776-128-0x00007FFF12820000-0x00007FFF132E1000-memory.dmp

            Filesize

            10.8MB

          • memory/3776-116-0x00000150FC480000-0x00000150FC4A2000-memory.dmp

            Filesize

            136KB

          • memory/3776-103-0x00000150FC4E0000-0x00000150FC4F0000-memory.dmp

            Filesize

            64KB

          • memory/3776-101-0x00000150FC4E0000-0x00000150FC4F0000-memory.dmp

            Filesize

            64KB

          • memory/3776-100-0x00007FFF12820000-0x00007FFF132E1000-memory.dmp

            Filesize

            10.8MB

          • memory/3984-47-0x0000000000E00000-0x0000000000E10000-memory.dmp

            Filesize

            64KB

          • memory/3984-46-0x0000000000E00000-0x0000000000E10000-memory.dmp

            Filesize

            64KB

          • memory/3984-63-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-62-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-66-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-73-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-53-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-82-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-81-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-84-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-87-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-88-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-89-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-61-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-21-0x000000001B620000-0x000000001B6C6000-memory.dmp

            Filesize

            664KB

          • memory/3984-22-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/3984-50-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-49-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-48-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-27-0x000000001B5C0000-0x000000001B5C8000-memory.dmp

            Filesize

            32KB

          • memory/3984-102-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/3984-45-0x0000000000E00000-0x0000000000E10000-memory.dmp

            Filesize

            64KB

          • memory/3984-104-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-44-0x0000000000E00000-0x0000000000E10000-memory.dmp

            Filesize

            64KB

          • memory/3984-117-0x0000000020BC4000-0x0000000020BC8000-memory.dmp

            Filesize

            16KB

          • memory/3984-37-0x0000000000E00000-0x0000000000E10000-memory.dmp

            Filesize

            64KB

          • memory/3984-23-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/3984-24-0x0000000000E00000-0x0000000000E10000-memory.dmp

            Filesize

            64KB

          • memory/3984-106-0x0000000020BC2000-0x0000000020BC8000-memory.dmp

            Filesize

            24KB

          • memory/3984-105-0x0000000020AD0000-0x0000000020BD0000-memory.dmp

            Filesize

            1024KB

          • memory/3984-36-0x0000000000E00000-0x0000000000E10000-memory.dmp

            Filesize

            64KB

          • memory/3984-35-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/3984-34-0x000000001F4A0000-0x000000001F502000-memory.dmp

            Filesize

            392KB

          • memory/3984-29-0x0000000000E00000-0x0000000000E10000-memory.dmp

            Filesize

            64KB

          • memory/3984-28-0x000000001C2F0000-0x000000001C33C000-memory.dmp

            Filesize

            304KB

          • memory/3984-25-0x000000001BBA0000-0x000000001C06E000-memory.dmp

            Filesize

            4.8MB

          • memory/3984-26-0x000000001C190000-0x000000001C22C000-memory.dmp

            Filesize

            624KB

          • memory/4416-90-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4416-144-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

            Filesize

            64KB

          • memory/4416-91-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

            Filesize

            64KB

          • memory/4416-140-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4416-141-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

            Filesize

            64KB

          • memory/4416-93-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4416-119-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

            Filesize

            64KB

          • memory/4416-145-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

            Filesize

            64KB

          • memory/4416-120-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

            Filesize

            64KB

          • memory/4440-134-0x0000000000F50000-0x0000000000F60000-memory.dmp

            Filesize

            64KB

          • memory/4440-147-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4440-131-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB

          • memory/4440-132-0x0000000000F50000-0x0000000000F60000-memory.dmp

            Filesize

            64KB

          • memory/4440-133-0x00007FFF16510000-0x00007FFF16EB1000-memory.dmp

            Filesize

            9.6MB