Analysis
-
max time kernel
61s -
max time network
77s -
platform
windows7_x64 -
resource
win7 -
submitted
01-08-2020 19:35
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe
Resource
win7
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe
Resource
win10
General
-
Target
SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe
-
Size
531KB
-
MD5
17e2541126192fb39fcfd63c4ea3308a
-
SHA1
468cc15e755e368bc56c779ac801a95dffd6c4a9
-
SHA256
a1bf9a7b8d6dd555ea81443658567d3d5cd91cdf57ccdbaf9557db1531349f64
-
SHA512
8b9ad5da4ff25611e5d3cc1d7645a7ac9ea6b6c1e1f1dfb1953cd3c4fbd5cf3f5e86e1cf38a01aad787848eaa421ef7f1d242bc40a0567071143e53cb25df84c
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exepowershell.exedescription pid process Token: SeDebugPrivilege 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe Token: SeDebugPrivilege 1044 powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exepowershell.exepid process 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe 1044 powershell.exe 1044 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exeSecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exedescription pid process target process PID 1320 wrote to memory of 240 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe PID 1320 wrote to memory of 240 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe PID 1320 wrote to memory of 240 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe PID 1320 wrote to memory of 240 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe PID 1320 wrote to memory of 240 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe PID 1320 wrote to memory of 240 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe PID 1320 wrote to memory of 240 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe PID 1320 wrote to memory of 240 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe PID 1320 wrote to memory of 240 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe PID 240 wrote to memory of 1044 240 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe powershell.exe PID 240 wrote to memory of 1044 240 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe powershell.exe PID 240 wrote to memory of 1044 240 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe powershell.exe PID 240 wrote to memory of 1044 240 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exedescription pid process target process PID 1320 set thread context of 240 1320 SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe -
Contains code to disable Windows Defender 7 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/240-3-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral1/memory/240-3-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral1/memory/240-4-0x0000000000403BEE-mapping.dmp disable_win_def behavioral1/memory/240-5-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral1/memory/240-5-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral1/memory/240-6-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral1/memory/240-6-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def -
Processes:
SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.43569931.17547.14217.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
- Windows security modification
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/240-3-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/240-4-0x0000000000403BEE-mapping.dmp
-
memory/240-5-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/240-6-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1044-7-0x0000000000000000-mapping.dmp
-
memory/1320-1-0x0000000000000000-0x0000000000000000-disk.dmp