Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
06-11-2023 12:44
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
dis_defender.exe
Resource
win7-20231023-en
windows7-x64
6 signatures
150 seconds
General
-
Target
dis_defender.exe
-
Size
12KB
-
MD5
5e4319826d24eacce3ca0738885722f3
-
SHA1
f028af3df311cb2d94511c8f05fa7f1efa5268b3
-
SHA256
6c174114cc8159ea4a8614b5418fa6e6405c42c64675657f69b1ae1839dd0a70
-
SHA512
f189de4fcc8e3b7ae689b06e8b881d977b15bfe69c6cc762800e3fa2cf929fe16beabee781730f5a1ec10bb61e416afb086332f71178dd9eccc6b87cd53bc0f2
-
SSDEEP
384:oMsJTP+6OFyf/o0xPSzbbVxu2mnj1jPGUc5tuTpqKi3hC4:oMsJTP+6OFy3LhIbbxafc5tuTpqKYhJ
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2852-0-0x0000000000D20000-0x0000000000D28000-memory.dmp disable_win_def -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dis_defender.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dis_defender.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dis_defender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dis_defender.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features dis_defender.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2332 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2332 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2332 2852 dis_defender.exe 28 PID 2852 wrote to memory of 2332 2852 dis_defender.exe 28 PID 2852 wrote to memory of 2332 2852 dis_defender.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dis_defender.exe"C:\Users\Admin\AppData\Local\Temp\dis_defender.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-