Analysis

  • max time kernel
    118s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2024 04:20

General

  • Target

    51d49b7595b0a21700a55c6b82a2ad85ad5a72663f953430d7f7f8025818395dN.exe

  • Size

    80KB

  • MD5

    3a1b7cc91f95791f686d6b76df9fd160

  • SHA1

    7d31307dd52f08b588548017da2b919e7f63987b

  • SHA256

    51d49b7595b0a21700a55c6b82a2ad85ad5a72663f953430d7f7f8025818395d

  • SHA512

    fd66b6004d1e81c98aa8392d686273e57fc3774b7f1d511b17cfeb712dd502a48b888b8f3d5c7c0a559f71d3f7d8c5dc3d9136e42618808cebf5609db21d9fa3

  • SSDEEP

    1536:QPvK/3zvzVJJicVLhilofshvjzJxuOmb54vHTL+lf:Qi5ikFSofUzVmb5uHv+lf

Score
10/10

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51d49b7595b0a21700a55c6b82a2ad85ad5a72663f953430d7f7f8025818395dN.exe
    "C:\Users\Admin\AppData\Local\Temp\51d49b7595b0a21700a55c6b82a2ad85ad5a72663f953430d7f7f8025818395dN.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jwk4ev3v.sgr.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/4748-9-0x00007FFEE34B0000-0x00007FFEE354E000-memory.dmp

    Filesize

    632KB

  • memory/4748-23-0x00007FFEE34B0000-0x00007FFEE354E000-memory.dmp

    Filesize

    632KB

  • memory/4748-20-0x0000024EEE200000-0x0000024EEE222000-memory.dmp

    Filesize

    136KB

  • memory/4912-4-0x000000001B860000-0x000000001B868000-memory.dmp

    Filesize

    32KB

  • memory/4912-5-0x000000001C5A0000-0x000000001C5EC000-memory.dmp

    Filesize

    304KB

  • memory/4912-6-0x00007FFEE34B0000-0x00007FFEE354E000-memory.dmp

    Filesize

    632KB

  • memory/4912-7-0x000000001D760000-0x000000001D7C2000-memory.dmp

    Filesize

    392KB

  • memory/4912-8-0x00007FFEE34B0000-0x00007FFEE354E000-memory.dmp

    Filesize

    632KB

  • memory/4912-0-0x00007FFEE34B0000-0x00007FFEE354E000-memory.dmp

    Filesize

    632KB

  • memory/4912-10-0x00007FFEE34B0000-0x00007FFEE354E000-memory.dmp

    Filesize

    632KB

  • memory/4912-3-0x000000001C440000-0x000000001C4DC000-memory.dmp

    Filesize

    624KB

  • memory/4912-2-0x000000001BE20000-0x000000001C2EE000-memory.dmp

    Filesize

    4.8MB

  • memory/4912-1-0x000000001B880000-0x000000001B926000-memory.dmp

    Filesize

    664KB

  • memory/4912-24-0x00007FFEE34B0000-0x00007FFEE354E000-memory.dmp

    Filesize

    632KB

  • memory/4912-25-0x00007FFEE34B0000-0x00007FFEE354E000-memory.dmp

    Filesize

    632KB