Analysis

  • max time kernel
    10s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2024 12:35

General

  • Target

    13e2a1bcc72fa5a6366d3ce2a21f283ed8bdd50d5f41038c909f0a6b9633337c.exe

  • Size

    70KB

  • MD5

    d94ef7acefbc20ddea7c5509b4b0bc90

  • SHA1

    f6dd42a0e47980823acedbba7d063b63f17fe8e4

  • SHA256

    13e2a1bcc72fa5a6366d3ce2a21f283ed8bdd50d5f41038c909f0a6b9633337c

  • SHA512

    c8a10a85cdaea99360a45119e803a7059983f9453731eb58174b9409f85b182dbbc6fabab49137bc8946d9f4e3afd1df03853818557656b66760b0832f0f1062

  • SSDEEP

    1536:gFTnqpKxynVWGeifCSzTPb542HkLbvJfxa:gFTPGeifrvb59H+bvJ5a

Malware Config

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 1 IoCs
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 57 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13e2a1bcc72fa5a6366d3ce2a21f283ed8bdd50d5f41038c909f0a6b9633337c.exe
    "C:\Users\Admin\AppData\Local\Temp\13e2a1bcc72fa5a6366d3ce2a21f283ed8bdd50d5f41038c909f0a6b9633337c.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2728
  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe

      Filesize

      70KB

      MD5

      d94ef7acefbc20ddea7c5509b4b0bc90

      SHA1

      f6dd42a0e47980823acedbba7d063b63f17fe8e4

      SHA256

      13e2a1bcc72fa5a6366d3ce2a21f283ed8bdd50d5f41038c909f0a6b9633337c

      SHA512

      c8a10a85cdaea99360a45119e803a7059983f9453731eb58174b9409f85b182dbbc6fabab49137bc8946d9f4e3afd1df03853818557656b66760b0832f0f1062

    • memory/2728-41-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-42-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-52-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-50-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-49-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-48-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-47-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-46-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-32-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-45-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-44-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-43-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-39-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-38-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-37-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-36-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-30-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-31-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-40-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/2728-51-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/4088-3-0x000000001BB10000-0x000000001BFDE000-memory.dmp

      Filesize

      4.8MB

    • memory/4088-1-0x0000000000EF0000-0x0000000000F96000-memory.dmp

      Filesize

      664KB

    • memory/4088-10-0x000000001CEC0000-0x000000001CF22000-memory.dmp

      Filesize

      392KB

    • memory/4088-13-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/4088-15-0x00007FFBC4C95000-0x00007FFBC4C96000-memory.dmp

      Filesize

      4KB

    • memory/4088-35-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/4088-0-0x00007FFBC4C95000-0x00007FFBC4C96000-memory.dmp

      Filesize

      4KB

    • memory/4088-26-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/4088-2-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/4088-14-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/4088-16-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/4088-8-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/4088-7-0x000000001C160000-0x000000001C1AC000-memory.dmp

      Filesize

      304KB

    • memory/4088-6-0x000000001B4A0000-0x000000001B4A8000-memory.dmp

      Filesize

      32KB

    • memory/4088-5-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/4088-4-0x000000001BFE0000-0x000000001C07C000-memory.dmp

      Filesize

      624KB

    • memory/4088-33-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB

    • memory/4088-9-0x00007FFBC49E0000-0x00007FFBC5381000-memory.dmp

      Filesize

      9.6MB