Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-03-2021 11:10
Static task
static1
Behavioral task
behavioral1
Sample
d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe
Resource
win7v20201028
General
-
Target
d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe
-
Size
534KB
-
MD5
3eb993c8d8b647f850cfa469d57a2dec
-
SHA1
da5dc696590815cb6389c693a7edad6e65722c51
-
SHA256
d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b
-
SHA512
df2b679ea062146b3bb2be292a4ec09671e107abab7fbb7784aa9a78a22baa37e24220796c07b0abbe2cdf6de5b56707567c99ac73badceac075c93482611061
Malware Config
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x000100000001ab63-13.dat disable_win_def behavioral2/files/0x000100000001ab63-14.dat disable_win_def -
Executes dropped EXE 1 IoCs
pid Process 4056 Client.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3116 schtasks.exe 3968 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2824 PING.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 188 powershell.exe 188 powershell.exe 188 powershell.exe 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 3244 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe Token: SeDebugPrivilege 188 powershell.exe Token: SeDebugPrivilege 4056 Client.exe Token: SeDebugPrivilege 4056 Client.exe Token: SeDebugPrivilege 3244 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4056 Client.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3920 wrote to memory of 3968 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 75 PID 3920 wrote to memory of 3968 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 75 PID 3920 wrote to memory of 3968 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 75 PID 3920 wrote to memory of 4056 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 77 PID 3920 wrote to memory of 4056 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 77 PID 3920 wrote to memory of 4056 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 77 PID 3920 wrote to memory of 188 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 78 PID 3920 wrote to memory of 188 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 78 PID 3920 wrote to memory of 188 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 78 PID 4056 wrote to memory of 3116 4056 Client.exe 80 PID 4056 wrote to memory of 3116 4056 Client.exe 80 PID 4056 wrote to memory of 3116 4056 Client.exe 80 PID 3920 wrote to memory of 2724 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 85 PID 3920 wrote to memory of 2724 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 85 PID 3920 wrote to memory of 2724 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 85 PID 2724 wrote to memory of 3724 2724 cmd.exe 87 PID 2724 wrote to memory of 3724 2724 cmd.exe 87 PID 2724 wrote to memory of 3724 2724 cmd.exe 87 PID 3920 wrote to memory of 1512 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 88 PID 3920 wrote to memory of 1512 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 88 PID 3920 wrote to memory of 1512 3920 d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe 88 PID 1512 wrote to memory of 3484 1512 cmd.exe 90 PID 1512 wrote to memory of 3484 1512 cmd.exe 90 PID 1512 wrote to memory of 3484 1512 cmd.exe 90 PID 1512 wrote to memory of 2824 1512 cmd.exe 91 PID 1512 wrote to memory of 2824 1512 cmd.exe 91 PID 1512 wrote to memory of 2824 1512 cmd.exe 91 PID 1512 wrote to memory of 3244 1512 cmd.exe 92 PID 1512 wrote to memory of 3244 1512 cmd.exe 92 PID 1512 wrote to memory of 3244 1512 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe"C:\Users\Admin\AppData\Local\Temp\d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe"1⤵
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "CheckerFortnite" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3968
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "CheckerFortnite" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3116
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:188
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:3724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2W1c9iDxalZl.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3484
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe"C:\Users\Admin\AppData\Local\Temp\d9fffd6edeeaeb271645ebd329755660356ed84bbfdd773c7c3aa1d4b594904b.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-