Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 05:23
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20240708-en
General
-
Target
svchost.exe
-
Size
116KB
-
MD5
67289188208c899195083547187789c9
-
SHA1
bb8893801bd0b9ff3abc2e3280b6b0cad479bec9
-
SHA256
72982e83206930e2da3f4887ef09520fbf6937f9475f34620c6a78843c640a65
-
SHA512
78e77f8163f4d3bc636c4ea5a1df61c63f0aa01088039c50a5bd31a410568c4aa1b8c744bf0d52c0e906de0df4b2f05c9953fac6596caaf33464136ca3680040
-
SSDEEP
3072:hAohOst+5w1h5w/oV9wRKyfKW63beFEKymFnaa:yGJ71oRPfKWybiQ
Malware Config
Extracted
blacknet
v3.7.0 Public
Ydt6Vl
http://91.92.242.16/Panel/
BN[]
-
antivm
true
-
elevate_uac
true
-
install_name
WindowsUpdate.exe
-
splitter
|BN|
-
start_name
e162b1333458a713bc6916cc8ac4110c
-
startup
true
-
usb_spread
true
Signatures
-
BlackNET payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2976-1-0x0000000000EF0000-0x0000000000F12000-memory.dmp family_blacknet -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/2976-1-0x0000000000EF0000-0x0000000000F12000-memory.dmp disable_win_def -
Processes:
svchost.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" svchost.exe -
Processes:
svchost.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
svchost.exepowershell.exepid Process 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2492 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2976 svchost.exe Token: SeDebugPrivilege 2492 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
svchost.exepid Process 2976 svchost.exe 2976 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
svchost.exedescription pid Process procid_target PID 2976 wrote to memory of 2492 2976 svchost.exe 31 PID 2976 wrote to memory of 2492 2976 svchost.exe 31 PID 2976 wrote to memory of 2492 2976 svchost.exe 31 PID 2976 wrote to memory of 2076 2976 svchost.exe 33 PID 2976 wrote to memory of 2076 2976 svchost.exe 33 PID 2976 wrote to memory of 2076 2976 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2976 -s 9762⤵PID:2076
-