Analysis

  • max time kernel
    3s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 14:12

General

  • Target

    662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3.exe

  • Size

    493KB

  • MD5

    ad5d8a274eaff455047d801ee9b6231f

  • SHA1

    1a43eb1ae77914cb58e6cffc8a4e8a1eebfee7d2

  • SHA256

    662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3

  • SHA512

    ceb178dbb8e913c489de2eb7cb8c3d3f16b574934155a8fe6d73ec6235e40bb76fdffb34ae33a8e38abd912e3df5efd624104db9693e929e4bd0087b2b266932

  • SSDEEP

    12288:uxjrr7F5qfMs8WdcOX+t4c08no9IaJnv+N6G/wWEh59ma4:uxLsMs8WdcMx8+I+TDV4

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 1 IoCs
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3.exe
    "C:\Users\Admin\AppData\Local\Temp\662344d80ecad59d7c9d4e0ad6864f8ccbbdf1a73321bc3ffeb24e5cec3e1bf3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Users\Admin\AppData\Roaming\Updater.exe
      "C:\Users\Admin\AppData\Roaming\Updater.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
        "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4976
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
            PID:4280
          • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
            "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
            4⤵
              PID:1020
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" Get-MpPreference -verbose
                5⤵
                  PID:2256
              • C:\Users\Admin\AppData\Roaming\svchosts.exe
                "C:\Users\Admin\AppData\Roaming\svchosts.exe"
                4⤵
                  PID:1692
                  • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
                    "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
                    5⤵
                      PID:3628
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "powershell" Get-MpPreference -verbose
                        6⤵
                          PID:3672
                        • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
                          "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
                          6⤵
                            PID:1460
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "powershell" Get-MpPreference -verbose
                              7⤵
                                PID:5536
                          • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe
                            "C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe"
                            5⤵
                              PID:828
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell" Get-MpPreference -verbose
                                6⤵
                                  PID:2328
                                • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
                                  6⤵
                                    PID:3932

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Adobe Photoshop CS12.exe.log

                          Filesize

                          866B

                          MD5

                          4319b58c3bb0f95e5f63b4d85b6dfc17

                          SHA1

                          caf6bbfc1a1beb7d3c523e944ce4fe18c2f9d03e

                          SHA256

                          44f03ead664331c3f81b315a49b9b05745f3c037f39ccbe00c4820b2afedc233

                          SHA512

                          58ee8dec9fce1e768400a3c142a039c67d43048803350c39ec8e0cf0a36ba9994f7d1d72c2479c3143128479df4bf75889d0473ed653d7e54c5d936b938c4266

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\WindowsUpdate.exe.log

                          Filesize

                          866B

                          MD5

                          d7d09fe4ff702ba9f25d5f48923708b6

                          SHA1

                          85ce2b7a1c9a4c3252fc9f471cf13ad50ad2cf65

                          SHA256

                          ae5b9b53869ba7b6bf99b07cb09c9ce9ff11d4abbbb626570390f9fba4f6f462

                          SHA512

                          500a313cc36a23302763d6957516640c981da2fbab691c8b66518f5b0051e25dfb1b09449efff526eab707fa1be36ef9362286869c82b3800e42d2d8287ef1cf

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                          Filesize

                          2KB

                          MD5

                          d85ba6ff808d9e5444a4b369f5bc2730

                          SHA1

                          31aa9d96590fff6981b315e0b391b575e4c0804a

                          SHA256

                          84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                          SHA512

                          8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          944B

                          MD5

                          b3c3db201c6e1fc54f0e17762fe03246

                          SHA1

                          249bfcef33cdd2d6c13a7cc7c9c1d73905fb51d6

                          SHA256

                          6771a83a83da5d6ce23e9cfa5567eb70084dffd51a7c07130ba3379cff78a59f

                          SHA512

                          2945c6f4e05b86e161b9753fca74cc9daf76e8ef535cdff0e9d83cca706eabd6e1ca3aba55005b2d16c2023f6604ee6886837336a63f421fa25f73120cfc00a1

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          944B

                          MD5

                          c1768af648e5e2c307ec7b653b59178a

                          SHA1

                          431d3dbf3cec36790d8479b5f1466aff8acc1dbf

                          SHA256

                          b0f703cb7bb6cdc322ff35bfb35e34c4ae1a88e9a952e28b520bc8bfd8cc26d2

                          SHA512

                          0ff7fd138b822a9f4b74f3bc8494841c01ebc1dff4eae8cbda14972e5925d74cf102854a4d55801e78da88be64aa82781d60852316ceda30b3caa2501203cfb2

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          944B

                          MD5

                          6d42b6da621e8df5674e26b799c8e2aa

                          SHA1

                          ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                          SHA256

                          5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                          SHA512

                          53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tjn5gi5s.rc3.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Roaming\Adobe Photoshop CS12.exe

                          Filesize

                          195KB

                          MD5

                          d867a6939e03ff1ccf63605dddea632e

                          SHA1

                          b04f4689ac1ecd317387b28fad290f15a68878d9

                          SHA256

                          eecb4035c620f07749f4627e6c7243dd4053b4918c6d76e236374900d0dace3b

                          SHA512

                          28a848f5411c8af9e046ff37507f96da84790bdaf140fbae1526ce980cb0142d47f957de3a3f1a36a6a12c6e32c28f6706f06d770e4948a6ae3f74c3c628fba2

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1132431369-515282257-1998160155-1000\98ca1c4287021f29f4edfe2238f5494b_70c90021-9ffc-4518-9838-e0670256fcd5

                          Filesize

                          2KB

                          MD5

                          8de91c4f830956990012f9fd1269e490

                          SHA1

                          5396852c5a98d586d3970638bebf52ac4d7da6b9

                          SHA256

                          4b1f314ed0d2dd0aedd922297f2b16cce1d5716a24469b72a9e17ea43bc40433

                          SHA512

                          4c0ef84683613edb6196a43e2da73c58203e080cdee1c4119ad6b3823db137fec0628eb7fa8f34a7da93aa142a13b001168959d59cb425ae858372b5d7f2d555

                        • C:\Users\Admin\AppData\Roaming\Updater.exe

                          Filesize

                          329KB

                          MD5

                          317abf62a372c7d88088dbbfea227449

                          SHA1

                          f193753fca12f4576eec8d8d82796e13da54fd56

                          SHA256

                          6b0934e044667b39e0826d98239c96b4978fc73f2e12bab9cefa13e87cd3b2fc

                          SHA512

                          628675c573d713fda4a18548a5160aaed44ac719d07d570ceff856f425b5181b1f552c34bfb0be9bddfa14672c323923cb0c6c496a1a8608ce8f4215fb6ab8d8

                        • C:\Users\Admin\AppData\Roaming\svchosts.exe

                          Filesize

                          18KB

                          MD5

                          d133d370c3858c9811e70f95d554d2c6

                          SHA1

                          bb09b1253ce571a49b76951283883a3499588295

                          SHA256

                          87a1711030512dd414bcbab0659a2b51c0c16505bd8a068a282a1cc2c9fdf93b

                          SHA512

                          db4d41fca43e496b2b0d8d47d936a9ce204e3b6c4c669a8a9810362776a977b5337359b843fcd1d20004455d2c91f9790b3accb5352f4e55ec53c7e5d359d778

                        • memory/1020-76-0x0000000001160000-0x0000000001170000-memory.dmp

                          Filesize

                          64KB

                        • memory/1020-4705-0x0000000001160000-0x0000000001170000-memory.dmp

                          Filesize

                          64KB

                        • memory/1020-765-0x0000000001160000-0x0000000001170000-memory.dmp

                          Filesize

                          64KB

                        • memory/1020-168-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1020-3274-0x0000000001160000-0x0000000001170000-memory.dmp

                          Filesize

                          64KB

                        • memory/1020-56-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1020-57-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1020-167-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1020-3408-0x0000000001160000-0x0000000001170000-memory.dmp

                          Filesize

                          64KB

                        • memory/1020-112-0x0000000001160000-0x0000000001170000-memory.dmp

                          Filesize

                          64KB

                        • memory/1020-113-0x0000000001160000-0x0000000001170000-memory.dmp

                          Filesize

                          64KB

                        • memory/1460-3155-0x0000000000F50000-0x0000000000F60000-memory.dmp

                          Filesize

                          64KB

                        • memory/1460-3471-0x0000000000F50000-0x0000000000F60000-memory.dmp

                          Filesize

                          64KB

                        • memory/1460-3222-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1460-3275-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1692-79-0x0000000000C90000-0x0000000000CA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1692-1481-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1692-80-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1692-3273-0x0000000000C90000-0x0000000000CA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1692-1253-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/1692-103-0x0000000000C90000-0x0000000000CA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1692-1200-0x0000000000C90000-0x0000000000CA0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1692-82-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/2256-1069-0x00007FFF480E0000-0x00007FFF48BA1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/2256-374-0x000002557FAF0000-0x000002557FB00000-memory.dmp

                          Filesize

                          64KB

                        • memory/2256-307-0x000002557FAF0000-0x000002557FB00000-memory.dmp

                          Filesize

                          64KB

                        • memory/2256-306-0x00007FFF480E0000-0x00007FFF48BA1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3628-2669-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3628-2738-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3628-2809-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3628-1255-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3628-1254-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/3628-1322-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/3628-1542-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3628-4322-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

                          Filesize

                          64KB

                        • memory/3672-3063-0x00007FFF480E0000-0x00007FFF48BA1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3672-3101-0x0000028CA0840000-0x0000028CA0850000-memory.dmp

                          Filesize

                          64KB

                        • memory/4280-60-0x0000021CFD550000-0x0000021CFD560000-memory.dmp

                          Filesize

                          64KB

                        • memory/4280-107-0x00007FFF47FD0000-0x00007FFF48A91000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/4280-59-0x00007FFF47FD0000-0x00007FFF48A91000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/4280-61-0x0000021CFD550000-0x0000021CFD560000-memory.dmp

                          Filesize

                          64KB

                        • memory/4280-88-0x0000021CFD4F0000-0x0000021CFD512000-memory.dmp

                          Filesize

                          136KB

                        • memory/4976-98-0x0000000021250000-0x0000000021350000-memory.dmp

                          Filesize

                          1024KB

                        • memory/4976-41-0x00000000014D0000-0x00000000014E0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4976-99-0x00000000014D0000-0x00000000014E0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4976-100-0x00000000014D0000-0x00000000014E0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4976-81-0x00000000014D0000-0x00000000014E0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4976-74-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/4976-62-0x00000000014D0000-0x00000000014E0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4976-102-0x0000000021250000-0x0000000021350000-memory.dmp

                          Filesize

                          1024KB

                        • memory/4976-104-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/4976-43-0x00000000014D0000-0x00000000014E0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4976-42-0x00000000014D0000-0x00000000014E0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4976-94-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/4976-34-0x000000001DB60000-0x000000001DBC2000-memory.dmp

                          Filesize

                          392KB

                        • memory/4976-29-0x00000000014D0000-0x00000000014E0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4976-28-0x000000001C880000-0x000000001C8CC000-memory.dmp

                          Filesize

                          304KB

                        • memory/4976-27-0x00000000014A0000-0x00000000014A8000-memory.dmp

                          Filesize

                          32KB

                        • memory/4976-26-0x000000001C720000-0x000000001C7BC000-memory.dmp

                          Filesize

                          624KB

                        • memory/4976-25-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/4976-24-0x000000001C160000-0x000000001C62E000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/4976-23-0x00000000014D0000-0x00000000014E0000-memory.dmp

                          Filesize

                          64KB

                        • memory/4976-22-0x00007FFF4AFC0000-0x00007FFF4B961000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/4976-21-0x000000001BBE0000-0x000000001BC86000-memory.dmp

                          Filesize

                          664KB