Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
779215d5adbe0370480da6b59320a5bf.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
779215d5adbe0370480da6b59320a5bf.exe
-
Size
71KB
-
MD5
779215d5adbe0370480da6b59320a5bf
-
SHA1
f586b47128bc99c6cfbbca9eae0e5f14fc06870e
-
SHA256
39ad0477f800022e2311fe3f1cd64dd6079ee9477c896e2a4c7d9c0992568514
-
SHA512
eea3d54d39f448ac034f5a8cdd626ab1001d9b40d039c074e4302cbe00bfb7f3123b5abc3c8a09bfc273a169963b4046619dff80d6fa728de73b6b92c7a6967f
-
SSDEEP
1536:QNtAJKgwK/6aYuSa9m+Ukh1wObYHehJGdTpqKmJ:YXglyaSlPkZbspdQz
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 779215d5adbe0370480da6b59320a5bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 779215d5adbe0370480da6b59320a5bf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 779215d5adbe0370480da6b59320a5bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 779215d5adbe0370480da6b59320a5bf.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 779215d5adbe0370480da6b59320a5bf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3040 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3040 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3040 2520 779215d5adbe0370480da6b59320a5bf.exe 28 PID 2520 wrote to memory of 3040 2520 779215d5adbe0370480da6b59320a5bf.exe 28 PID 2520 wrote to memory of 3040 2520 779215d5adbe0370480da6b59320a5bf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\779215d5adbe0370480da6b59320a5bf.exe"C:\Users\Admin\AppData\Local\Temp\779215d5adbe0370480da6b59320a5bf.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-