Analysis

  • max time kernel
    62s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-03-2024 12:31

General

  • Target

    D867A6939E03FF1CCF63605DDDEA632E.exe

  • Size

    195KB

  • MD5

    d867a6939e03ff1ccf63605dddea632e

  • SHA1

    b04f4689ac1ecd317387b28fad290f15a68878d9

  • SHA256

    eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b

  • SHA512

    28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2

  • SSDEEP

    1536:eZuhD5z28TC2PBttWjm38hPMsCoTgbSUPH4Lksi9WXU+pOk+G8wb/APcz+tBvqtu:7pmjm38QegbSKHanO1wbClvmYlVfm+

Malware Config

Extracted

Family

blacknet

Botnet

Windows Update

C2

wOzx3g1DVutJaIF8JkCiLDWWDUVaGVAFT9MNNbf3GHejuL8mYQHtmLByJVduHMIIMCJOTkByRDSvMbknVYDMjFMd33ucCNGRd6rsd55Kjfz5N8toWqPtUAUWFp2VPBqwDphjXZsEuRw6KPvEHxNrRtmmNF3TSPIX5em2yZySCQTum749uJG4nmFWEHI/cH1NCAx4fFkBSOcgGykeOVQl1nGRgAHWZfv9g9qNaMeeu53b56HQWR/mZ6mTILTeO979h0iF42Y1WsHlP1Cd9xLI0jeNeBHY9FCS6EZPmLXKu/X9q8n26O7UQt6xg0ujFGbbUZ8glKZ26j6atQFXHOQGag==

Mutex

BN[fEVvWhbt-6079003]

Attributes
  • antivm

    true

  • elevate_uac

    true

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    35dcbc7eb742dd4f1edfbccf7826c724

  • startup

    true

  • usb_spread

    true

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 2 IoCs
  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe
    "C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1040
    • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      PID:1640
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
          PID:1344
      • C:\Users\Admin\AppData\Local\Temp\svchosts.exe
        "C:\Users\Admin\AppData\Local\Temp\svchosts.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1576
        • C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe
          "C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe"
          3⤵
          • Executes dropped EXE
          PID:2908
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" Get-MpPreference -verbose
            4⤵
              PID:2480
            • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
              "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
              4⤵
                PID:2940
            • C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe
              "C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe"
              3⤵
                PID:1324

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe

            Filesize

            64KB

            MD5

            beec760efbb05e5dbefe82e3ac942c37

            SHA1

            85b12f4a92bc53e8b9a648be61c9a56ee623671d

            SHA256

            e2038584d6fa8292a224e6c45967068035b47926cbdaedb1c5c26ccdd8854146

            SHA512

            77dbd19dd3777ace059459b3ea33445719b8c45a6bb06ffb1b9c02facda0b91ac51e3c8c922db173cc3e4fb417eaadcec05b00912b7c62e8a4fb6ea1d1c580a6

          • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe

            Filesize

            195KB

            MD5

            d867a6939e03ff1ccf63605dddea632e

            SHA1

            b04f4689ac1ecd317387b28fad290f15a68878d9

            SHA256

            eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b

            SHA512

            28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2

          • C:\Users\Admin\AppData\Local\Temp\svchosts.exe

            Filesize

            18KB

            MD5

            d133d370c3858c9811e70f95d554d2c6

            SHA1

            bb09b1253ce571a49b76951283883a3499588295

            SHA256

            87a1711030512dd414bcbab0659a2b51c0c16505bd8a068a282a1cc2c9fdf93b

            SHA512

            db4d41fca43e496b2b0d8d47d936a9ce204e3b6c4c669a8a9810362776a977b5337359b843fcd1d20004455d2c91f9790b3accb5352f4e55ec53c7e5d359d778

          • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1658372521-4246568289-2509113762-1000\4e876bea704b61e7aecfd20688f2f6fb_f4bfc772-1e14-4cb7-967a-2360098b659f

            Filesize

            2KB

            MD5

            8de91c4f830956990012f9fd1269e490

            SHA1

            5396852c5a98d586d3970638bebf52ac4d7da6b9

            SHA256

            4b1f314ed0d2dd0aedd922297f2b16cce1d5716a24469b72a9e17ea43bc40433

            SHA512

            4c0ef84683613edb6196a43e2da73c58203e080cdee1c4119ad6b3823db137fec0628eb7fa8f34a7da93aa142a13b001168959d59cb425ae858372b5d7f2d555

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            43d338ffe5b05ab2cdc0df71732904bb

            SHA1

            4bf6e8172189412a911edf8c2ea5c466339c7159

            SHA256

            dfa2869231238827fdee9f60ee94d186e26e73f6e760b27b857c86e036351b2a

            SHA512

            b64c319475bd121bc896ecbe200174fadba90d3d46507ed8b068b242ec31d60678f560d6f7ab025888f5a2cc3f6af380f655c7a63221a9c7848acf1a13ecbda9

          • memory/1040-53-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/1040-48-0x0000000002580000-0x0000000002600000-memory.dmp

            Filesize

            512KB

          • memory/1040-47-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/1040-24-0x000000001B350000-0x000000001B632000-memory.dmp

            Filesize

            2.9MB

          • memory/1040-27-0x0000000001D70000-0x0000000001D78000-memory.dmp

            Filesize

            32KB

          • memory/1040-49-0x0000000002584000-0x0000000002587000-memory.dmp

            Filesize

            12KB

          • memory/1040-51-0x0000000002580000-0x0000000002600000-memory.dmp

            Filesize

            512KB

          • memory/1040-55-0x0000000002580000-0x0000000002600000-memory.dmp

            Filesize

            512KB

          • memory/1040-50-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/1576-89-0x0000000000B70000-0x0000000000BF0000-memory.dmp

            Filesize

            512KB

          • memory/1576-88-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/1576-83-0x0000000000B70000-0x0000000000BF0000-memory.dmp

            Filesize

            512KB

          • memory/1576-84-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/1640-99-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/1640-52-0x00000000009B0000-0x0000000000A30000-memory.dmp

            Filesize

            512KB

          • memory/1640-101-0x00000000009B0000-0x0000000000A30000-memory.dmp

            Filesize

            512KB

          • memory/1640-54-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/1640-100-0x00000000009B0000-0x0000000000A30000-memory.dmp

            Filesize

            512KB

          • memory/1640-66-0x00000000009B0000-0x0000000000A30000-memory.dmp

            Filesize

            512KB

          • memory/1640-65-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/2200-31-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-63-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-45-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-44-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-43-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-38-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-37-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-35-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-0-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/2200-32-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-56-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-57-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-70-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-71-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-69-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-68-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-67-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-25-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-20-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-64-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-19-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-46-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-61-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-60-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-59-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-58-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-75-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-78-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-18-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-85-0x000000001BF00000-0x000000001C000000-memory.dmp

            Filesize

            1024KB

          • memory/2200-86-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/2200-13-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-12-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-87-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-11-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-1-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-2-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/2200-3-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2200-8-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/2200-9-0x0000000000B40000-0x0000000000BC0000-memory.dmp

            Filesize

            512KB

          • memory/2908-98-0x0000000000AA0000-0x0000000000B20000-memory.dmp

            Filesize

            512KB

          • memory/2908-95-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB

          • memory/2908-92-0x0000000000AA0000-0x0000000000B20000-memory.dmp

            Filesize

            512KB

          • memory/2908-91-0x000007FEF56D0000-0x000007FEF606D000-memory.dmp

            Filesize

            9.6MB