Analysis
-
max time kernel
47s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 12:31
Behavioral task
behavioral1
Sample
D867A6939E03FF1CCF63605DDDEA632E.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
D867A6939E03FF1CCF63605DDDEA632E.exe
Resource
win10v2004-20240226-en
General
-
Target
D867A6939E03FF1CCF63605DDDEA632E.exe
-
Size
195KB
-
MD5
d867a6939e03ff1ccf63605dddea632e
-
SHA1
b04f4689ac1ecd317387b28fad290f15a68878d9
-
SHA256
eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b
-
SHA512
28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2
-
SSDEEP
1536:eZuhD5z28TC2PBttWjm38hPMsCoTgbSUPH4Lksi9WXU+pOk+G8wb/APcz+tBvqtu:7pmjm38QegbSKHanO1wbClvmYlVfm+
Malware Config
Signatures
-
BlackNET payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x000800000002322b-33.dat family_blacknet -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/files/0x000800000002322b-33.dat disable_win_def -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
D867A6939E03FF1CCF63605DDDEA632E.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\35dcbc7eb742dd4f1edfbccf7826c724 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D867A6939E03FF1CCF63605DDDEA632E.exe" D867A6939E03FF1CCF63605DDDEA632E.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe"C:\Users\Admin\AppData\Local\Temp\D867A6939E03FF1CCF63605DDDEA632E.exe"1⤵
- Adds Run key to start application
PID:1872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"2⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\svchosts.exe"C:\Users\Admin\AppData\Local\Temp\svchosts.exe"2⤵PID:4468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5d867a6939e03ff1ccf63605dddea632e
SHA1b04f4689ac1ecd317387b28fad290f15a68878d9
SHA256eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b
SHA51228a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
18KB
MD5d133d370c3858c9811e70f95d554d2c6
SHA1bb09b1253ce571a49b76951283883a3499588295
SHA25687a1711030512dd414bcbab0659a2b51c0c16505bd8a068a282a1cc2c9fdf93b
SHA512db4d41fca43e496b2b0d8d47d936a9ce204e3b6c4c669a8a9810362776a977b5337359b843fcd1d20004455d2c91f9790b3accb5352f4e55ec53c7e5d359d778
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-557049126-2506969350-2798870634-1000\d0f230304e413b49f7b36faf47b3bc53_571594ad-b717-4cea-93ae-747ab327a92a
Filesize2KB
MD58de91c4f830956990012f9fd1269e490
SHA15396852c5a98d586d3970638bebf52ac4d7da6b9
SHA2564b1f314ed0d2dd0aedd922297f2b16cce1d5716a24469b72a9e17ea43bc40433
SHA5124c0ef84683613edb6196a43e2da73c58203e080cdee1c4119ad6b3823db137fec0628eb7fa8f34a7da93aa142a13b001168959d59cb425ae858372b5d7f2d555