Analysis
-
max time kernel
150s -
max time network
29s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
10/07/2020, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe
-
Size
158KB
-
MD5
b11e1b59c55fe58bee59b66a38bc962c
-
SHA1
44c5a2a6f456849f9280294300f5892a8cb53087
-
SHA256
dd788c4aec3c45dd1a524971169ac0cccd3271b1a02544398494385a430edfe9
-
SHA512
a55ed0bfbfb5777c0a379268fd0da95dfc56559887e3b67e516a6cd164f72b52037e880e6e82190946fdc6367c5ac33c11d4bdc56a97c102be3b9a6bfddeff14
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1796 1356 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 26 PID 1356 wrote to memory of 1796 1356 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 26 PID 1356 wrote to memory of 1796 1356 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 26 PID 1356 wrote to memory of 1796 1356 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 26 PID 1356 wrote to memory of 1796 1356 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 26 PID 1356 wrote to memory of 1796 1356 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 26 PID 1356 wrote to memory of 1796 1356 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 26 PID 1356 wrote to memory of 1796 1356 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 26 PID 1356 wrote to memory of 1796 1356 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 26 PID 1796 wrote to memory of 1740 1796 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 27 PID 1796 wrote to memory of 1740 1796 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 27 PID 1796 wrote to memory of 1740 1796 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 27 PID 1796 wrote to memory of 1740 1796 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 27 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1356 set thread context of 1796 1356 SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1740 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 powershell.exe 1740 powershell.exe -
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1796-2-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral1/memory/1796-4-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral1/memory/1796-5-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.380.14044.9944.exe"{path}"2⤵
- Windows security modification
- Modifies Windows Defender Real-time Protection settings
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-