Analysis
-
max time kernel
120s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 00:23
Behavioral task
behavioral1
Sample
fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe
Resource
win10v2004-20241007-en
General
-
Target
fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe
-
Size
80KB
-
MD5
066ea80c2b94ada1d308c30a6f7d7c40
-
SHA1
ff25096221ee852614610d710d54c8a0da933f37
-
SHA256
fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85
-
SHA512
2623ecb3e41357d12611fe17fdb588d96b577c9c00668e5fcf31f7781b6bfe4976088cd13caec146922a0e2b268582c8f252375741b60cf8306f29422952f397
-
SSDEEP
1536:dPvK/3zvzVQtCsscKvW/jzJxuOmb54vHTL6lm:diqCspbzVmb5uHv6lm
Malware Config
Signatures
-
BlackNET payload 1 IoCs
resource yara_rule behavioral2/files/0x000e000000023b76-19.dat family_blacknet -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x000e000000023b76-19.dat disable_win_def -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe -
Executes dropped EXE 1 IoCs
pid Process 1944 WindowsUpdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cde2f914e4cce7f13b2c1cec7b6da970 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\MyClient\\WindowsUpdate.exe" fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 960 powershell.exe 960 powershell.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 1944 WindowsUpdate.exe 3432 powershell.exe 3432 powershell.exe 1944 WindowsUpdate.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe Token: SeDebugPrivilege 960 powershell.exe Token: SeDebugPrivilege 1944 WindowsUpdate.exe Token: SeDebugPrivilege 3432 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1644 wrote to memory of 960 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 90 PID 1644 wrote to memory of 960 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 90 PID 1644 wrote to memory of 1944 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 92 PID 1644 wrote to memory of 1944 1644 fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe 92 PID 1944 wrote to memory of 3432 1944 WindowsUpdate.exe 94 PID 1944 wrote to memory of 3432 1944 WindowsUpdate.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe"C:\Users\Admin\AppData\Local\Temp\fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85N.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a43e653ffb5ab07940f4bdd9cc8fade4
SHA1af43d04e3427f111b22dc891c5c7ee8a10ac4123
SHA256c4c53abb13e99475aebfbe9fec7a8fead81c14c80d9dcc2b81375304f3a683fe
SHA51262a97e95e1f19a8d4302847110dae44f469877eed6aa8ea22345c6eb25ee220e7d310fa0b7ec5df42356815421c0af7c46a0f1fee8933cc446641800eda6cd1b
-
Filesize
944B
MD51f8b23cd03fdfb5d4559ac10c445b89f
SHA1cea378877687b1967095d5237e3c0111929f012d
SHA256f1bb0869c1d26c4282aa06a4840a9ca86e9145c136af42bb85b6d2e77e684551
SHA5123ffe559e174f4706d3e7681f0d88d53dfde5eef56ee5005ccf7b3036a5d6ba85e02fa4d0cb213d237afcb894d79fbe673b18f986f57db2904558f447e42fe550
-
Filesize
80KB
MD5066ea80c2b94ada1d308c30a6f7d7c40
SHA1ff25096221ee852614610d710d54c8a0da933f37
SHA256fe6dbe4e1eee773a044fe49f0b013b1c73d18adbdb8a04305e0f034e1f63fd85
SHA5122623ecb3e41357d12611fe17fdb588d96b577c9c00668e5fcf31f7781b6bfe4976088cd13caec146922a0e2b268582c8f252375741b60cf8306f29422952f397
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82