Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
207b710761b3330aa804c7a04d015b41.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
207b710761b3330aa804c7a04d015b41.exe
Resource
win10v2004-20231215-en
General
-
Target
207b710761b3330aa804c7a04d015b41.exe
-
Size
11KB
-
MD5
207b710761b3330aa804c7a04d015b41
-
SHA1
82809b814f6006ccf2ecd49825f43c45acc475b8
-
SHA256
8488b24dec28ad3940c5cfec018cb00b71e2eab4a4942acab8bc2a3db922dd5d
-
SHA512
27756c01ff1653d29b784aad891e401701f471b3abf7844d96f442fcfb0c99bf3f3f3a039f751184bfaf40eb0a9bc11b4549f0825668e6f82e5d3e4ba028aaa0
-
SSDEEP
192:8eMTczELU3cPcgNBbIN3ygty+aQQLPmq+D4jT5:pMTcAm+cgNBbIN3u5Dbe4jT
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2112-0-0x0000000000380000-0x000000000038A000-memory.dmp disable_win_def -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\temp.lnk 207b710761b3330aa804c7a04d015b41.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2112 207b710761b3330aa804c7a04d015b41.exe 2712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2112 207b710761b3330aa804c7a04d015b41.exe Token: SeDebugPrivilege 2712 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2712 2112 207b710761b3330aa804c7a04d015b41.exe 29 PID 2112 wrote to memory of 2712 2112 207b710761b3330aa804c7a04d015b41.exe 29 PID 2112 wrote to memory of 2712 2112 207b710761b3330aa804c7a04d015b41.exe 29 PID 2112 wrote to memory of 2712 2112 207b710761b3330aa804c7a04d015b41.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\207b710761b3330aa804c7a04d015b41.exe"C:\Users\Admin\AppData\Local\Temp\207b710761b3330aa804c7a04d015b41.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-