Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:16
Static task
static1
Behavioral task
behavioral1
Sample
DOC#090900009.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DOC#090900009.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
DOC#090900009.exe
-
Size
858KB
-
MD5
873ee9e180e146dbc58e236adc4859e2
-
SHA1
244f6944163d7b56f41c8e6b321b66fbcced9e8c
-
SHA256
a1b7b74f099ecb3e600271c2ed326aacaeece3eda474d5769c2839386fa0fc05
-
SHA512
6feb78a2ea87f4cd0b676d8cadf92a74126d0658f96fc2e4e60baea17d99e97a5caffbf3737873ed9be07d18e5f1ce4f24fb3cb13fe535ea5cda0b0a21c098b8
Score
10/10
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1600-57-0x0000000004D00000-0x0000000004DCE000-memory.dmp disable_win_def -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe 1600 DOC#090900009.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1600 DOC#090900009.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1600 wrote to memory of 276 1600 DOC#090900009.exe 28 PID 1600 wrote to memory of 276 1600 DOC#090900009.exe 28 PID 1600 wrote to memory of 276 1600 DOC#090900009.exe 28 PID 1600 wrote to memory of 276 1600 DOC#090900009.exe 28 PID 1600 wrote to memory of 1968 1600 DOC#090900009.exe 29 PID 1600 wrote to memory of 1968 1600 DOC#090900009.exe 29 PID 1600 wrote to memory of 1968 1600 DOC#090900009.exe 29 PID 1600 wrote to memory of 1968 1600 DOC#090900009.exe 29 PID 1600 wrote to memory of 1780 1600 DOC#090900009.exe 30 PID 1600 wrote to memory of 1780 1600 DOC#090900009.exe 30 PID 1600 wrote to memory of 1780 1600 DOC#090900009.exe 30 PID 1600 wrote to memory of 1780 1600 DOC#090900009.exe 30 PID 1600 wrote to memory of 684 1600 DOC#090900009.exe 31 PID 1600 wrote to memory of 684 1600 DOC#090900009.exe 31 PID 1600 wrote to memory of 684 1600 DOC#090900009.exe 31 PID 1600 wrote to memory of 684 1600 DOC#090900009.exe 31 PID 1600 wrote to memory of 1728 1600 DOC#090900009.exe 32 PID 1600 wrote to memory of 1728 1600 DOC#090900009.exe 32 PID 1600 wrote to memory of 1728 1600 DOC#090900009.exe 32 PID 1600 wrote to memory of 1728 1600 DOC#090900009.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"2⤵PID:276
-
-
C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"2⤵PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"2⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"2⤵PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"C:\Users\Admin\AppData\Local\Temp\DOC#090900009.exe"2⤵PID:1728
-