Analysis

  • max time kernel
    15s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2024 02:54

General

  • Target

    eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b.exe

  • Size

    195KB

  • MD5

    d867a6939e03ff1ccf63605dddea632e

  • SHA1

    b04f4689ac1ecd317387b28fad290f15a68878d9

  • SHA256

    eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b

  • SHA512

    28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2

  • SSDEEP

    1536:eZuhD5z28TC2PBttWjm38hPMsCoTgbSUPH4Lksi9WXU+pOk+G8wb/APcz+tBvqtu:7pmjm38QegbSKHanO1wbClvmYlVfm+

Malware Config

Extracted

Family

blacknet

Botnet

Windows Update

C2

wOzx3g1DVutJaIF8JkCiLDWWDUVaGVAFT9MNNbf3GHejuL8mYQHtmLByJVduHMIIMCJOTkByRDSvMbknVYDMjFMd33ucCNGRd6rsd55Kjfz5N8toWqPtUAUWFp2VPBqwDphjXZsEuRw6KPvEHxNrRtmmNF3TSPIX5em2yZySCQTum749uJG4nmFWEHI/cH1NCAx4fFkBSOcgGykeOVQl1nGRgAHWZfv9g9qNaMeeu53b56HQWR/mZ6mTILTeO979h0iF42Y1WsHlP1Cd9xLI0jeNeBHY9FCS6EZPmLXKu/X9q8n26O7UQt6xg0ujFGbbUZ8glKZ26j6atQFXHOQGag==

Mutex

BN[fEVvWhbt-6079003]

Attributes
  • antivm

    true

  • elevate_uac

    true

  • install_name

    WindowsUpdate.exe

  • splitter

    |BN|

  • start_name

    35dcbc7eb742dd4f1edfbccf7826c724

  • startup

    true

  • usb_spread

    true

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 1 IoCs
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Detects executables containing artifacts associated with disabling Widnows Defender 1 IoCs
  • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b.exe
    "C:\Users\Admin\AppData\Local\Temp\eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
        PID:2796
      • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
        "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
        2⤵
          PID:1640
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" Get-MpPreference -verbose
            3⤵
              PID:1172

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe

          Filesize

          195KB

          MD5

          d867a6939e03ff1ccf63605dddea632e

          SHA1

          b04f4689ac1ecd317387b28fad290f15a68878d9

          SHA256

          eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b

          SHA512

          28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2

        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1298544033-3225604241-2703760938-1000\08f1b4b10ff1d48461a689dbace7a72c_e3fd1d67-4513-4809-a7f1-bf54bd53bdbc

          Filesize

          2KB

          MD5

          8de91c4f830956990012f9fd1269e490

          SHA1

          5396852c5a98d586d3970638bebf52ac4d7da6b9

          SHA256

          4b1f314ed0d2dd0aedd922297f2b16cce1d5716a24469b72a9e17ea43bc40433

          SHA512

          4c0ef84683613edb6196a43e2da73c58203e080cdee1c4119ad6b3823db137fec0628eb7fa8f34a7da93aa142a13b001168959d59cb425ae858372b5d7f2d555

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CCW6HIO1DH1JI2NVZSAF.temp

          Filesize

          7KB

          MD5

          ee5f67b433a8e06762602f1383d09a97

          SHA1

          6daca5d77021082b3e283be396180e8c6b524a17

          SHA256

          2800953a9661161c2d1ab1edd71170e758c9138e3f2cb0e81fbe959cee8ab817

          SHA512

          56b35917a2fa29e08f959fc7f541918d7836e374316bcfd73a1a974c3e00860184bc7d4ac1a09f581890c775624e9df663a40dbf4c915bdd5e55d68958074484

        • memory/1172-91-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/1172-86-0x0000000002940000-0x00000000029C0000-memory.dmp

          Filesize

          512KB

        • memory/1172-93-0x000000000294B000-0x00000000029B2000-memory.dmp

          Filesize

          412KB

        • memory/1172-80-0x0000000002940000-0x00000000029C0000-memory.dmp

          Filesize

          512KB

        • memory/1172-92-0x0000000002944000-0x0000000002947000-memory.dmp

          Filesize

          12KB

        • memory/1172-79-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/1172-74-0x000000001B610000-0x000000001B8F2000-memory.dmp

          Filesize

          2.9MB

        • memory/1172-83-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/1172-81-0x0000000001D10000-0x0000000001D18000-memory.dmp

          Filesize

          32KB

        • memory/1460-22-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-46-0x000000001F810000-0x000000001F910000-memory.dmp

          Filesize

          1024KB

        • memory/1460-23-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-2-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/1460-3-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-29-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-30-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-31-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/1460-32-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-38-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-33-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-13-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-12-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-19-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-43-0x000000001F810000-0x000000001F910000-memory.dmp

          Filesize

          1024KB

        • memory/1460-26-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-44-0x000000001F810000-0x000000001F910000-memory.dmp

          Filesize

          1024KB

        • memory/1460-21-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-0-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/1460-41-0x000000001F810000-0x000000001F910000-memory.dmp

          Filesize

          1024KB

        • memory/1460-50-0x0000000020860000-0x0000000020A60000-memory.dmp

          Filesize

          2.0MB

        • memory/1460-1-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-51-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/1460-56-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-57-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-42-0x000000001F810000-0x000000001F910000-memory.dmp

          Filesize

          1024KB

        • memory/1460-58-0x0000000020860000-0x0000000020A60000-memory.dmp

          Filesize

          2.0MB

        • memory/1460-60-0x0000000020860000-0x0000000020A60000-memory.dmp

          Filesize

          2.0MB

        • memory/1460-61-0x0000000020860000-0x0000000020A60000-memory.dmp

          Filesize

          2.0MB

        • memory/1460-64-0x000000001F810000-0x000000001F910000-memory.dmp

          Filesize

          1024KB

        • memory/1460-63-0x0000000002010000-0x0000000002090000-memory.dmp

          Filesize

          512KB

        • memory/1460-62-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/1640-77-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-84-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-47-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/1640-78-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-48-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-76-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-75-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-49-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/1640-95-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-82-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-94-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-59-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-87-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-89-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-85-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-88-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/1640-90-0x0000000000A90000-0x0000000000B10000-memory.dmp

          Filesize

          512KB

        • memory/2796-20-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

          Filesize

          32KB

        • memory/2796-24-0x000007FEF5C80000-0x000007FEF661D000-memory.dmp

          Filesize

          9.6MB

        • memory/2796-25-0x0000000001F14000-0x0000000001F17000-memory.dmp

          Filesize

          12KB

        • memory/2796-18-0x000000001B580000-0x000000001B862000-memory.dmp

          Filesize

          2.9MB

        • memory/2796-28-0x0000000001F1B000-0x0000000001F82000-memory.dmp

          Filesize

          412KB

        • memory/2796-27-0x0000000001F10000-0x0000000001F90000-memory.dmp

          Filesize

          512KB