Analysis
-
max time kernel
96s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-03-2024 12:31
Behavioral task
behavioral1
Sample
D867A6939E03FF1CCF63605DDDEA632E.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
D867A6939E03FF1CCF63605DDDEA632E.exe
Resource
win10v2004-20240226-en
General
-
Target
D867A6939E03FF1CCF63605DDDEA632E.exe
-
Size
195KB
-
MD5
d867a6939e03ff1ccf63605dddea632e
-
SHA1
b04f4689ac1ecd317387b28fad290f15a68878d9
-
SHA256
eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b
-
SHA512
28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2
-
SSDEEP
1536:eZuhD5z28TC2PBttWjm38hPMsCoTgbSUPH4Lksi9WXU+pOk+G8wb/APcz+tBvqtu:7pmjm38QegbSKHanO1wbClvmYlVfm+
Malware Config
Extracted
blacknet
Windows Update
wOzx3g1DVutJaIF8JkCiLDWWDUVaGVAFT9MNNbf3GHejuL8mYQHtmLByJVduHMIIMCJOTkByRDSvMbknVYDMjFMd33ucCNGRd6rsd55Kjfz5N8toWqPtUAUWFp2VPBqwDphjXZsEuRw6KPvEHxNrRtmmNF3TSPIX5em2yZySCQTum749uJG4nmFWEHI/cH1NCAx4fFkBSOcgGykeOVQl1nGRgAHWZfv9g9qNaMeeu53b56HQWR/mZ6mTILTeO979h0iF42Y1WsHlP1Cd9xLI0jeNeBHY9FCS6EZPmLXKu/X9q8n26O7UQt6xg0ujFGbbUZ8glKZ26j6atQFXHOQGag==
BN[fEVvWhbt-6079003]
-
antivm
true
-
elevate_uac
true
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
35dcbc7eb742dd4f1edfbccf7826c724
-
startup
true
-
usb_spread
true
Signatures
-
BlackNET payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000015e7c-38.dat family_blacknet -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/files/0x0007000000015e7c-38.dat disable_win_def -
Processes:
D867A6939E03FF1CCF63605DDDEA632E.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection D867A6939E03FF1CCF63605DDDEA632E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" D867A6939E03FF1CCF63605DDDEA632E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" D867A6939E03FF1CCF63605DDDEA632E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" D867A6939E03FF1CCF63605DDDEA632E.exe -
Executes dropped EXE 1 IoCs
Processes:
WindowsUpdate.exepid Process 1968 WindowsUpdate.exe -
Processes:
D867A6939E03FF1CCF63605DDDEA632E.exeWindowsUpdate.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features D867A6939E03FF1CCF63605DDDEA632E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features WindowsUpdate.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
D867A6939E03FF1CCF63605DDDEA632E.exeWindowsUpdate.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\35dcbc7eb742dd4f1edfbccf7826c724 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\MyClient\\WindowsUpdate.exe" D867A6939E03FF1CCF63605DDDEA632E.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\35dcbc7eb742dd4f1edfbccf7826c724 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\MyClient\\WindowsUpdate.exe" WindowsUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\35dcbc7eb742dd4f1edfbccf7826c724 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D867A6939E03FF1CCF63605DDDEA632E.exe" D867A6939E03FF1CCF63605DDDEA632E.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
D867A6939E03FF1CCF63605DDDEA632E.exepid Process 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 2256 D867A6939E03FF1CCF63605DDDEA632E.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
D867A6939E03FF1CCF63605DDDEA632E.exepowershell.exeWindowsUpdate.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2256 D867A6939E03FF1CCF63605DDDEA632E.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 1968 WindowsUpdate.exe Token: SeDebugPrivilege 520 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
D867A6939E03FF1CCF63605DDDEA632E.exeWindowsUpdate.exedescription pid Process procid_target PID 2256 wrote to memory of 1944 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 31 PID 2256 wrote to memory of 1944 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 31 PID 2256 wrote to memory of 1944 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 31 PID 2256 wrote to memory of 1968 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 33 PID 2256 wrote to memory of 1968 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 33 PID 2256 wrote to memory of 1968 2256 D867A6939E03FF1CCF63605DDDEA632E.exe 33 PID 1968 wrote to memory of 520 1968 WindowsUpdate.exe 34 PID 1968 wrote to memory of 520 1968 WindowsUpdate.exe 34 PID 1968 wrote to memory of 520 1968 WindowsUpdate.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe"C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5d867a6939e03ff1ccf63605dddea632e
SHA1b04f4689ac1ecd317387b28fad290f15a68878d9
SHA256eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b
SHA51228a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-330940541-141609230-1670313778-1000\7fca30624ef576a22b26293309114fa3_4456596e-0528-4680-8940-5edc26c0ff50
Filesize2KB
MD58de91c4f830956990012f9fd1269e490
SHA15396852c5a98d586d3970638bebf52ac4d7da6b9
SHA2564b1f314ed0d2dd0aedd922297f2b16cce1d5716a24469b72a9e17ea43bc40433
SHA5124c0ef84683613edb6196a43e2da73c58203e080cdee1c4119ad6b3823db137fec0628eb7fa8f34a7da93aa142a13b001168959d59cb425ae858372b5d7f2d555
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5cbb0e457beb164f21f31dc7fb1ab85d0
SHA19ec4dad4cae0864e947785f1704038ef0502d6cf
SHA2565db23a5bf3e1e68b6ed13482ea8efa5fde140c7e2339c9d476a740e7425b3300
SHA5125f9543d1cc366fec10b020910f5d53cec49ce6f9543b783a16606a514abbb315ef5edb440d55bfcabc03fc393299a440214ffa5822d9c2e8f1fa9fa9b7386b39