Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01/03/2021, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe
Resource
win7v20201028
General
-
Target
fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe
-
Size
534KB
-
MD5
1a6cd9334c846e9aadb214cce3c0359a
-
SHA1
04536a296bb91ca1b702a2eb8d90fff8a9fe5845
-
SHA256
fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f
-
SHA512
3e4c35c019076621c785728128c4faf29926371d69a01482558df233de1c74062f77700e6aec1e69f7eec82c11c6f1a21d96e90f0decc189c4ff71f11338bf83
Malware Config
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x000100000001ab75-13.dat disable_win_def behavioral2/files/0x000100000001ab75-15.dat disable_win_def -
Executes dropped EXE 1 IoCs
pid Process 212 Client.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 496 schtasks.exe 1936 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2676 PING.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 200 powershell.exe 200 powershell.exe 200 powershell.exe 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 508 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe Token: SeDebugPrivilege 200 powershell.exe Token: SeDebugPrivilege 212 Client.exe Token: SeDebugPrivilege 212 Client.exe Token: SeDebugPrivilege 508 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 212 Client.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 652 wrote to memory of 496 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 75 PID 652 wrote to memory of 496 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 75 PID 652 wrote to memory of 496 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 75 PID 652 wrote to memory of 212 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 77 PID 652 wrote to memory of 212 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 77 PID 652 wrote to memory of 212 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 77 PID 652 wrote to memory of 200 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 78 PID 652 wrote to memory of 200 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 78 PID 652 wrote to memory of 200 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 78 PID 212 wrote to memory of 1936 212 Client.exe 80 PID 212 wrote to memory of 1936 212 Client.exe 80 PID 212 wrote to memory of 1936 212 Client.exe 80 PID 652 wrote to memory of 3304 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 85 PID 652 wrote to memory of 3304 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 85 PID 652 wrote to memory of 3304 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 85 PID 3304 wrote to memory of 1472 3304 cmd.exe 87 PID 3304 wrote to memory of 1472 3304 cmd.exe 87 PID 3304 wrote to memory of 1472 3304 cmd.exe 87 PID 652 wrote to memory of 3972 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 88 PID 652 wrote to memory of 3972 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 88 PID 652 wrote to memory of 3972 652 fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe 88 PID 3972 wrote to memory of 3936 3972 cmd.exe 90 PID 3972 wrote to memory of 3936 3972 cmd.exe 90 PID 3972 wrote to memory of 3936 3972 cmd.exe 90 PID 3972 wrote to memory of 2676 3972 cmd.exe 91 PID 3972 wrote to memory of 2676 3972 cmd.exe 91 PID 3972 wrote to memory of 2676 3972 cmd.exe 91 PID 3972 wrote to memory of 508 3972 cmd.exe 92 PID 3972 wrote to memory of 508 3972 cmd.exe 92 PID 3972 wrote to memory of 508 3972 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe"C:\Users\Admin\AppData\Local\Temp\fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe"1⤵
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "CheckerFortnite" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:496
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "CheckerFortnite" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1936
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:200
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SauSV3PmXofn.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3936
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe"C:\Users\Admin\AppData\Local\Temp\fbebdf6e8fa43a2458cd66a14dfa5b7127727c55b93a67f40f400e8c48b6a92f.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:508
-
-