Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
02-03-2021 11:10
Static task
static1
Behavioral task
behavioral1
Sample
d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe
Resource
win7v20201028
General
-
Target
d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe
-
Size
534KB
-
MD5
3eb993c8d8b647f850cfa469d57a2dec
-
SHA1
da5dc696590815cb6389c693a7edad6e65722c51
-
SHA256
d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b
-
SHA512
df2b679ea062146b3bb2be292a4ec09671e107abab7fbb7784aa9a78a22baa37e24220796c07b0abbe2cdf6de5b56707567c99ac73badceac075c93482611061
Malware Config
Signatures
-
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x00050000000130fd-7.dat disable_win_def behavioral1/files/0x00050000000130fd-9.dat disable_win_def behavioral1/files/0x00050000000130fd-10.dat disable_win_def -
Executes dropped EXE 1 IoCs
pid Process 416 Client.exe -
Loads dropped DLL 1 IoCs
pid Process 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1640 schtasks.exe 932 schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 964 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1492 powershell.exe 1492 powershell.exe 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe Token: SeDebugPrivilege 1492 powershell.exe Token: SeDebugPrivilege 416 Client.exe Token: SeDebugPrivilege 416 Client.exe Token: SeDebugPrivilege 920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 416 Client.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1640 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 30 PID 1724 wrote to memory of 1640 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 30 PID 1724 wrote to memory of 1640 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 30 PID 1724 wrote to memory of 1640 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 30 PID 1724 wrote to memory of 416 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 32 PID 1724 wrote to memory of 416 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 32 PID 1724 wrote to memory of 416 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 32 PID 1724 wrote to memory of 416 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 32 PID 1724 wrote to memory of 1492 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 33 PID 1724 wrote to memory of 1492 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 33 PID 1724 wrote to memory of 1492 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 33 PID 1724 wrote to memory of 1492 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 33 PID 416 wrote to memory of 932 416 Client.exe 35 PID 416 wrote to memory of 932 416 Client.exe 35 PID 416 wrote to memory of 932 416 Client.exe 35 PID 416 wrote to memory of 932 416 Client.exe 35 PID 1724 wrote to memory of 316 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 37 PID 1724 wrote to memory of 316 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 37 PID 1724 wrote to memory of 316 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 37 PID 1724 wrote to memory of 316 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 37 PID 316 wrote to memory of 1556 316 cmd.exe 39 PID 316 wrote to memory of 1556 316 cmd.exe 39 PID 316 wrote to memory of 1556 316 cmd.exe 39 PID 316 wrote to memory of 1556 316 cmd.exe 39 PID 1724 wrote to memory of 1628 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 40 PID 1724 wrote to memory of 1628 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 40 PID 1724 wrote to memory of 1628 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 40 PID 1724 wrote to memory of 1628 1724 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 40 PID 1628 wrote to memory of 1688 1628 cmd.exe 42 PID 1628 wrote to memory of 1688 1628 cmd.exe 42 PID 1628 wrote to memory of 1688 1628 cmd.exe 42 PID 1628 wrote to memory of 1688 1628 cmd.exe 42 PID 1628 wrote to memory of 964 1628 cmd.exe 43 PID 1628 wrote to memory of 964 1628 cmd.exe 43 PID 1628 wrote to memory of 964 1628 cmd.exe 43 PID 1628 wrote to memory of 964 1628 cmd.exe 43 PID 1628 wrote to memory of 920 1628 cmd.exe 44 PID 1628 wrote to memory of 920 1628 cmd.exe 44 PID 1628 wrote to memory of 920 1628 cmd.exe 44 PID 1628 wrote to memory of 920 1628 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe"C:\Users\Admin\AppData\Local\Temp\d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe"1⤵
- Loads dropped DLL
- Windows security modification
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "CheckerFortnite" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1640
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "CheckerFortnite" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:932
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:1556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BdnMdbHKu12w.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1688
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe"C:\Users\Admin\AppData\Local\Temp\d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-