Analysis
-
max time kernel
97s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2023 06:02
Static task
static1
1 signatures
General
-
Target
10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe
-
Size
13KB
-
MD5
c06e8fc8b2b9f21084980b8621f9a46d
-
SHA1
94ad6eb6c6b4942d35314e46aff6aea303578157
-
SHA256
10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69
-
SHA512
1a34cd3d09de7a33c69490ff72c3e9032004d4f74996181fbbdff1650fe0a86f2619c4f16be981e135c20d21eac5d2474ed76263f4a122971ea9bf5399aea280
-
SSDEEP
96:yA/vMth9sDLibql3A44P9QL4fwmPImg+A03PvXLOzk+gqWYV4J6oP/zNt:yw+wGWt94+iANiCkc4Jhp
Malware Config
Signatures
-
Processes:
10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe -
Processes:
10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exepid process 3808 10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe 3808 10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exedescription pid process Token: SeDebugPrivilege 3808 10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe"C:\Users\Admin\AppData\Local\Temp\10674d484ac908a7542e17cea589cc2b7d2900eaf178097605e56e3209c83d69.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3808-133-0x0000000000C70000-0x0000000000C7A000-memory.dmpFilesize
40KB