Analysis
-
max time kernel
146s -
max time network
115s -
platform
windows10_x64 -
resource
win10 -
submitted
25-10-2020 20:03
Static task
static1
Behavioral task
behavioral1
Sample
8920c6867df1eeaec33e3e6253524700.exe
Resource
win7
General
-
Target
8920c6867df1eeaec33e3e6253524700.exe
-
Size
534KB
-
MD5
8920c6867df1eeaec33e3e6253524700
-
SHA1
4ce786281b76b6949166092faa9bfccee4e2c599
-
SHA256
b126d2bf73da9bce2f1a0748febb99510127eee852284a75c777ebac33b39649
-
SHA512
fec621690ca21fc62a46c6b285a0bad0d6f3e4c792997616216b227b5a01db78b1b769c4847f3b6d0bc70d95f12b73885156b3164f319cda5d44b34861ef12e2
Malware Config
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/files/0x000200000001ab4e-12.dat disable_win_def behavioral2/files/0x000200000001ab4e-10.dat disable_win_def -
Executes dropped EXE 1 IoCs
Processes:
Client.exepid Process 3892 Client.exe -
Processes:
8920c6867df1eeaec33e3e6253524700.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8920c6867df1eeaec33e3e6253524700.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8920c6867df1eeaec33e3e6253524700.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 2420 schtasks.exe 3924 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
powershell.exe8920c6867df1eeaec33e3e6253524700.exe8920c6867df1eeaec33e3e6253524700.exepid Process 2820 powershell.exe 2820 powershell.exe 2820 powershell.exe 3244 8920c6867df1eeaec33e3e6253524700.exe 3244 8920c6867df1eeaec33e3e6253524700.exe 3244 8920c6867df1eeaec33e3e6253524700.exe 3244 8920c6867df1eeaec33e3e6253524700.exe 3244 8920c6867df1eeaec33e3e6253524700.exe 3244 8920c6867df1eeaec33e3e6253524700.exe 3244 8920c6867df1eeaec33e3e6253524700.exe 3472 8920c6867df1eeaec33e3e6253524700.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
8920c6867df1eeaec33e3e6253524700.exepowershell.exeClient.exe8920c6867df1eeaec33e3e6253524700.exedescription pid Process Token: SeDebugPrivilege 3244 8920c6867df1eeaec33e3e6253524700.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 3892 Client.exe Token: SeDebugPrivilege 3892 Client.exe Token: SeDebugPrivilege 3472 8920c6867df1eeaec33e3e6253524700.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid Process 3892 Client.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
8920c6867df1eeaec33e3e6253524700.exeClient.execmd.execmd.exedescription pid Process procid_target PID 3244 wrote to memory of 2420 3244 8920c6867df1eeaec33e3e6253524700.exe 74 PID 3244 wrote to memory of 2420 3244 8920c6867df1eeaec33e3e6253524700.exe 74 PID 3244 wrote to memory of 2420 3244 8920c6867df1eeaec33e3e6253524700.exe 74 PID 3244 wrote to memory of 3892 3244 8920c6867df1eeaec33e3e6253524700.exe 76 PID 3244 wrote to memory of 3892 3244 8920c6867df1eeaec33e3e6253524700.exe 76 PID 3244 wrote to memory of 3892 3244 8920c6867df1eeaec33e3e6253524700.exe 76 PID 3244 wrote to memory of 2820 3244 8920c6867df1eeaec33e3e6253524700.exe 77 PID 3244 wrote to memory of 2820 3244 8920c6867df1eeaec33e3e6253524700.exe 77 PID 3244 wrote to memory of 2820 3244 8920c6867df1eeaec33e3e6253524700.exe 77 PID 3892 wrote to memory of 3924 3892 Client.exe 79 PID 3892 wrote to memory of 3924 3892 Client.exe 79 PID 3892 wrote to memory of 3924 3892 Client.exe 79 PID 3244 wrote to memory of 200 3244 8920c6867df1eeaec33e3e6253524700.exe 84 PID 3244 wrote to memory of 200 3244 8920c6867df1eeaec33e3e6253524700.exe 84 PID 3244 wrote to memory of 200 3244 8920c6867df1eeaec33e3e6253524700.exe 84 PID 200 wrote to memory of 3804 200 cmd.exe 86 PID 200 wrote to memory of 3804 200 cmd.exe 86 PID 200 wrote to memory of 3804 200 cmd.exe 86 PID 3244 wrote to memory of 3880 3244 8920c6867df1eeaec33e3e6253524700.exe 87 PID 3244 wrote to memory of 3880 3244 8920c6867df1eeaec33e3e6253524700.exe 87 PID 3244 wrote to memory of 3880 3244 8920c6867df1eeaec33e3e6253524700.exe 87 PID 3880 wrote to memory of 3928 3880 cmd.exe 89 PID 3880 wrote to memory of 3928 3880 cmd.exe 89 PID 3880 wrote to memory of 3928 3880 cmd.exe 89 PID 3880 wrote to memory of 3972 3880 cmd.exe 90 PID 3880 wrote to memory of 3972 3880 cmd.exe 90 PID 3880 wrote to memory of 3972 3880 cmd.exe 90 PID 3880 wrote to memory of 3472 3880 cmd.exe 91 PID 3880 wrote to memory of 3472 3880 cmd.exe 91 PID 3880 wrote to memory of 3472 3880 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8920c6867df1eeaec33e3e6253524700.exe"C:\Users\Admin\AppData\Local\Temp\8920c6867df1eeaec33e3e6253524700.exe"1⤵
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\8920c6867df1eeaec33e3e6253524700.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2420
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3924
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:3804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YraTizeP4P6K.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3928
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\8920c6867df1eeaec33e3e6253524700.exe"C:\Users\Admin\AppData\Local\Temp\8920c6867df1eeaec33e3e6253524700.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8920c6867df1eeaec33e3e6253524700.exe.log
MD51efce85e583a7a2f123317a20f889d04
SHA160f71aa73ea2e2a48ed1c17e3c6d440abf39c914
SHA2562b5532a94879134a876b11c188ade1a61deaba6a80fe1f3a3a77cc442f1cca0d
SHA51245a5cd283e6a6ac34c3d8b1a6d73dc1cf52d8c974cf84624e8e9924eddaf354ccda929bce728b47db2b62175e47bdc3eaca6bc6b84d3565881fa87c50319d24c
-
MD5
a73acca21437a5a03a1d507b7b28584e
SHA120a717c25367e9a2a8dceace53abb80dbfa366ba
SHA2564737dcfc0c8930b34c3b0c679ecf5fc63c35892aba56cf0be4a0c2206b75c040
SHA512afe973c28947a0e60e023fa8eeb28cb10ae8c96d7521f62bf899a332e7afe69ba756b75d9e3ba780eb516f44dd1a5432ee1f84f3215da253fbe569e15126a7ff
-
MD5
8920c6867df1eeaec33e3e6253524700
SHA14ce786281b76b6949166092faa9bfccee4e2c599
SHA256b126d2bf73da9bce2f1a0748febb99510127eee852284a75c777ebac33b39649
SHA512fec621690ca21fc62a46c6b285a0bad0d6f3e4c792997616216b227b5a01db78b1b769c4847f3b6d0bc70d95f12b73885156b3164f319cda5d44b34861ef12e2
-
MD5
8920c6867df1eeaec33e3e6253524700
SHA14ce786281b76b6949166092faa9bfccee4e2c599
SHA256b126d2bf73da9bce2f1a0748febb99510127eee852284a75c777ebac33b39649
SHA512fec621690ca21fc62a46c6b285a0bad0d6f3e4c792997616216b227b5a01db78b1b769c4847f3b6d0bc70d95f12b73885156b3164f319cda5d44b34861ef12e2