Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2024 13:17

General

  • Target

    8C64A02C90F20524920E6E5E482B5A55.exe

  • Size

    141KB

  • MD5

    8c64a02c90f20524920e6e5e482b5a55

  • SHA1

    cc0f119b3d8e6d91f6e49d9cd21df4bc6b478b52

  • SHA256

    2e4d8723602c5ffc6409dceb0cb4ced2e749e374a0fcd41fe92e0fd50f817c5b

  • SHA512

    45b43dace1960596f7da79f9fec0dc4189ad7d8c5c3d6f6372a6b52d5adc5077ab50e5832852b0e69c92a02b637fb96d5b2f275738a653cb1113e42a9c2a7105

  • SSDEEP

    1536:VZuhD5z28TC2u8OpBPncFPAcTgbSUPH4Lh0tY7:ah0BPncKCgbSKHahoY7

Score
10/10

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8C64A02C90F20524920E6E5E482B5A55.exe
    "C:\Users\Admin\AppData\Local\Temp\8C64A02C90F20524920E6E5E482B5A55.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4516

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4516-0-0x000000001B0E0000-0x000000001B186000-memory.dmp

    Filesize

    664KB

  • memory/4516-1-0x00007FF9D2A80000-0x00007FF9D3421000-memory.dmp

    Filesize

    9.6MB

  • memory/4516-2-0x000000001B660000-0x000000001BB2E000-memory.dmp

    Filesize

    4.8MB

  • memory/4516-3-0x000000001BC00000-0x000000001BC9C000-memory.dmp

    Filesize

    624KB

  • memory/4516-4-0x00007FF9D2A80000-0x00007FF9D3421000-memory.dmp

    Filesize

    9.6MB

  • memory/4516-5-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4516-6-0x00000000008A0000-0x00000000008A8000-memory.dmp

    Filesize

    32KB

  • memory/4516-7-0x000000001BD60000-0x000000001BDAC000-memory.dmp

    Filesize

    304KB

  • memory/4516-8-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4516-9-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4516-10-0x000000001C770000-0x000000001C7D2000-memory.dmp

    Filesize

    392KB

  • memory/4516-11-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4516-12-0x00007FF9D2A80000-0x00007FF9D3421000-memory.dmp

    Filesize

    9.6MB

  • memory/4516-13-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4516-14-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4516-15-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4516-16-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB