General
-
Target
KD.exe
-
Size
7KB
-
Sample
220120-k5wf4shce2
-
MD5
ad309c9d2e62a1ceb52cdb76833bb9ff
-
SHA1
f93694b6d153c6a50950f1df29c36fbbae5d1931
-
SHA256
34e4e0f587ea3cbbd417710ec5b90de335dca96f6773fdd4ffb31b97b8913f8d
-
SHA512
addb8b06e6c0791f72b39183cfa850b2553730b60242a38775acc65f6c88e44f431ec3eaadb9bb3c506e639b391f74391890ae6a27c4a2f4e7c3da336b9954a4
Static task
static1
Behavioral task
behavioral1
Sample
KD.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
KD.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\dllhost.txt
ryuk
Targets
-
-
Target
KD.exe
-
Size
7KB
-
MD5
ad309c9d2e62a1ceb52cdb76833bb9ff
-
SHA1
f93694b6d153c6a50950f1df29c36fbbae5d1931
-
SHA256
34e4e0f587ea3cbbd417710ec5b90de335dca96f6773fdd4ffb31b97b8913f8d
-
SHA512
addb8b06e6c0791f72b39183cfa850b2553730b60242a38775acc65f6c88e44f431ec3eaadb9bb3c506e639b391f74391890ae6a27c4a2f4e7c3da336b9954a4
Score10/10-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-