Analysis

  • max time kernel
    45s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-03-2024 12:31

General

  • Target

    D867A6939E03FF1CCF63605DDDEA632E.exe

  • Size

    195KB

  • MD5

    d867a6939e03ff1ccf63605dddea632e

  • SHA1

    b04f4689ac1ecd317387b28fad290f15a68878d9

  • SHA256

    eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b

  • SHA512

    28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2

  • SSDEEP

    1536:eZuhD5z28TC2PBttWjm38hPMsCoTgbSUPH4Lksi9WXU+pOk+G8wb/APcz+tBvqtu:7pmjm38QegbSKHanO1wbClvmYlVfm+

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 1 IoCs
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe
    "C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
        PID:3392
      • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
        "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
        2⤵
          PID:4060
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" Get-MpPreference -verbose
            3⤵
              PID:1428
          • C:\Users\Admin\AppData\Local\Temp\svchosts.exe
            "C:\Users\Admin\AppData\Local\Temp\svchosts.exe"
            2⤵
              PID:4752
              • C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe
                "C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe"
                3⤵
                  PID:2960

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\D867A6939E03FF1CCF63605DDDEA632E.exe.log

              Filesize

              866B

              MD5

              d7d09fe4ff702ba9f25d5f48923708b6

              SHA1

              85ce2b7a1c9a4c3252fc9f471cf13ad50ad2cf65

              SHA256

              ae5b9b53869ba7b6bf99b07cb09c9ce9ff11d4abbbb626570390f9fba4f6f462

              SHA512

              500a313cc36a23302763d6957516640c981da2fbab691c8b66518f5b0051e25dfb1b09449efff526eab707fa1be36ef9362286869c82b3800e42d2d8287ef1cf

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              d85ba6ff808d9e5444a4b369f5bc2730

              SHA1

              31aa9d96590fff6981b315e0b391b575e4c0804a

              SHA256

              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

              SHA512

              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              e243a38635ff9a06c87c2a61a2200656

              SHA1

              ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc

              SHA256

              af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f

              SHA512

              4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

            • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe

              Filesize

              195KB

              MD5

              d867a6939e03ff1ccf63605dddea632e

              SHA1

              b04f4689ac1ecd317387b28fad290f15a68878d9

              SHA256

              eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b

              SHA512

              28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jv2jkfv5.upt.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\svchosts.exe

              Filesize

              18KB

              MD5

              d133d370c3858c9811e70f95d554d2c6

              SHA1

              bb09b1253ce571a49b76951283883a3499588295

              SHA256

              87a1711030512dd414bcbab0659a2b51c0c16505bd8a068a282a1cc2c9fdf93b

              SHA512

              db4d41fca43e496b2b0d8d47d936a9ce204e3b6c4c669a8a9810362776a977b5337359b843fcd1d20004455d2c91f9790b3accb5352f4e55ec53c7e5d359d778

            • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-983155329-280873152-1838004294-1000\8983a3f6c5f1e53947669cbb1f18eb12_d1f2fdfb-e063-43be-88aa-b9b0326295b4

              Filesize

              2KB

              MD5

              8de91c4f830956990012f9fd1269e490

              SHA1

              5396852c5a98d586d3970638bebf52ac4d7da6b9

              SHA256

              4b1f314ed0d2dd0aedd922297f2b16cce1d5716a24469b72a9e17ea43bc40433

              SHA512

              4c0ef84683613edb6196a43e2da73c58203e080cdee1c4119ad6b3823db137fec0628eb7fa8f34a7da93aa142a13b001168959d59cb425ae858372b5d7f2d555

            • memory/1428-116-0x00007FFDE42E0000-0x00007FFDE4DA1000-memory.dmp

              Filesize

              10.8MB

            • memory/1428-118-0x000001C7F21A0000-0x000001C7F21B0000-memory.dmp

              Filesize

              64KB

            • memory/1472-119-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-90-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-15-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-16-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-19-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-24-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-25-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-13-0x000000001CC90000-0x000000001CCF2000-memory.dmp

              Filesize

              392KB

            • memory/1472-0-0x000000001B310000-0x000000001B3B6000-memory.dmp

              Filesize

              664KB

            • memory/1472-8-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-7-0x000000001BF70000-0x000000001BFBC000-memory.dmp

              Filesize

              304KB

            • memory/1472-131-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB

            • memory/1472-101-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-103-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-104-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-6-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB

            • memory/1472-102-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-62-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-5-0x0000000000BC0000-0x0000000000BC8000-memory.dmp

              Filesize

              32KB

            • memory/1472-105-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-4-0x000000001BE10000-0x000000001BEAC000-memory.dmp

              Filesize

              624KB

            • memory/1472-3-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-117-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-2-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB

            • memory/1472-79-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-80-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-81-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-82-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-83-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-84-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-85-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-86-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-112-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-97-0x0000000000C20000-0x0000000000C30000-memory.dmp

              Filesize

              64KB

            • memory/1472-14-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB

            • memory/1472-1-0x000000001B890000-0x000000001BD5E000-memory.dmp

              Filesize

              4.8MB

            • memory/1472-106-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-111-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/1472-95-0x0000000020A60000-0x0000000020B60000-memory.dmp

              Filesize

              1024KB

            • memory/3392-93-0x00007FFDE42E0000-0x00007FFDE4DA1000-memory.dmp

              Filesize

              10.8MB

            • memory/3392-88-0x000001DF8CA80000-0x000001DF8CA90000-memory.dmp

              Filesize

              64KB

            • memory/3392-76-0x000001DFA51B0000-0x000001DFA51D2000-memory.dmp

              Filesize

              136KB

            • memory/3392-57-0x000001DF8CA80000-0x000001DF8CA90000-memory.dmp

              Filesize

              64KB

            • memory/3392-58-0x000001DF8CA80000-0x000001DF8CA90000-memory.dmp

              Filesize

              64KB

            • memory/3392-56-0x00007FFDE42E0000-0x00007FFDE4DA1000-memory.dmp

              Filesize

              10.8MB

            • memory/4060-38-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB

            • memory/4060-115-0x00000000019C0000-0x00000000019D0000-memory.dmp

              Filesize

              64KB

            • memory/4060-99-0x00000000019C0000-0x00000000019D0000-memory.dmp

              Filesize

              64KB

            • memory/4060-51-0x00000000019C0000-0x00000000019D0000-memory.dmp

              Filesize

              64KB

            • memory/4060-55-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB

            • memory/4060-94-0x00000000019C0000-0x00000000019D0000-memory.dmp

              Filesize

              64KB

            • memory/4060-77-0x00000000019C0000-0x00000000019D0000-memory.dmp

              Filesize

              64KB

            • memory/4060-87-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB

            • memory/4060-114-0x00000000019C0000-0x00000000019D0000-memory.dmp

              Filesize

              64KB

            • memory/4060-100-0x00000000019C0000-0x00000000019D0000-memory.dmp

              Filesize

              64KB

            • memory/4060-78-0x00000000019C0000-0x00000000019D0000-memory.dmp

              Filesize

              64KB

            • memory/4752-66-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB

            • memory/4752-89-0x0000000001760000-0x0000000001770000-memory.dmp

              Filesize

              64KB

            • memory/4752-60-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB

            • memory/4752-59-0x0000000001760000-0x0000000001770000-memory.dmp

              Filesize

              64KB

            • memory/4752-96-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB

            • memory/4752-98-0x00007FFDE7950000-0x00007FFDE82F1000-memory.dmp

              Filesize

              9.6MB