Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 03:19
Behavioral task
behavioral1
Sample
8e15304b91ed59783d09925b6a78e10b.exe
Resource
win7-20231215-en
windows7-x64
13 signatures
150 seconds
General
-
Target
8e15304b91ed59783d09925b6a78e10b.exe
-
Size
152KB
-
MD5
8e15304b91ed59783d09925b6a78e10b
-
SHA1
fff46e09a57a29376e9f84fef3d3468b69166b78
-
SHA256
bddf53330bf51176ef12018b4d8a62e1540d7975b065b02256a0f6df8ffc0232
-
SHA512
f8d53763a7bd4e7321d17e0b7ccd10d3bef2bf11c658fbd2ce0e9ddf0520fca983b4ff689fcef4b95af95c7942e5b4c67f1e11446a936ecf29e8d63f611caba0
-
SSDEEP
3072:xrf6REvQdveO5V/1BW3zVp6Jmg+xgDAVchJB/qQPIS+rTIOC16zYRY:0VeO5V9IjgV+xleBPIS066zSY
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 8e15304b91ed59783d09925b6a78e10b.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8e15304b91ed59783d09925b6a78e10b.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 8e15304b91ed59783d09925b6a78e10b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 8e15304b91ed59783d09925b6a78e10b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 8e15304b91ed59783d09925b6a78e10b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 8e15304b91ed59783d09925b6a78e10b.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 8e15304b91ed59783d09925b6a78e10b.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" 8e15304b91ed59783d09925b6a78e10b.exe -
resource yara_rule behavioral2/memory/4080-0-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral2/memory/4080-5-0x0000000000400000-0x00000000004A2000-memory.dmp upx -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 8e15304b91ed59783d09925b6a78e10b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 8e15304b91ed59783d09925b6a78e10b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 8e15304b91ed59783d09925b6a78e10b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 8e15304b91ed59783d09925b6a78e10b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\regservices.exe 8e15304b91ed59783d09925b6a78e10b.exe File opened for modification C:\Windows\regservices.exe 8e15304b91ed59783d09925b6a78e10b.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe 4080 8e15304b91ed59783d09925b6a78e10b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4080 8e15304b91ed59783d09925b6a78e10b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4428 4080 8e15304b91ed59783d09925b6a78e10b.exe 84 PID 4080 wrote to memory of 4428 4080 8e15304b91ed59783d09925b6a78e10b.exe 84 PID 4080 wrote to memory of 4428 4080 8e15304b91ed59783d09925b6a78e10b.exe 84 PID 4080 wrote to memory of 2596 4080 8e15304b91ed59783d09925b6a78e10b.exe 85 PID 4080 wrote to memory of 2596 4080 8e15304b91ed59783d09925b6a78e10b.exe 85 PID 4080 wrote to memory of 2596 4080 8e15304b91ed59783d09925b6a78e10b.exe 85 PID 4080 wrote to memory of 2264 4080 8e15304b91ed59783d09925b6a78e10b.exe 86 PID 4080 wrote to memory of 2264 4080 8e15304b91ed59783d09925b6a78e10b.exe 86 PID 4080 wrote to memory of 2264 4080 8e15304b91ed59783d09925b6a78e10b.exe 86 PID 4080 wrote to memory of 1388 4080 8e15304b91ed59783d09925b6a78e10b.exe 87 PID 4080 wrote to memory of 1388 4080 8e15304b91ed59783d09925b6a78e10b.exe 87 PID 4080 wrote to memory of 1388 4080 8e15304b91ed59783d09925b6a78e10b.exe 87 PID 4080 wrote to memory of 5012 4080 8e15304b91ed59783d09925b6a78e10b.exe 88 PID 4080 wrote to memory of 5012 4080 8e15304b91ed59783d09925b6a78e10b.exe 88 PID 4080 wrote to memory of 5012 4080 8e15304b91ed59783d09925b6a78e10b.exe 88 PID 4080 wrote to memory of 1784 4080 8e15304b91ed59783d09925b6a78e10b.exe 91 PID 4080 wrote to memory of 1784 4080 8e15304b91ed59783d09925b6a78e10b.exe 91 PID 4080 wrote to memory of 1784 4080 8e15304b91ed59783d09925b6a78e10b.exe 91 PID 4080 wrote to memory of 2844 4080 8e15304b91ed59783d09925b6a78e10b.exe 90 PID 4080 wrote to memory of 2844 4080 8e15304b91ed59783d09925b6a78e10b.exe 90 PID 4080 wrote to memory of 2844 4080 8e15304b91ed59783d09925b6a78e10b.exe 90 PID 4080 wrote to memory of 228 4080 8e15304b91ed59783d09925b6a78e10b.exe 89 PID 4080 wrote to memory of 228 4080 8e15304b91ed59783d09925b6a78e10b.exe 89 PID 4080 wrote to memory of 228 4080 8e15304b91ed59783d09925b6a78e10b.exe 89 PID 4080 wrote to memory of 2004 4080 8e15304b91ed59783d09925b6a78e10b.exe 92 PID 4080 wrote to memory of 2004 4080 8e15304b91ed59783d09925b6a78e10b.exe 92 PID 4080 wrote to memory of 2004 4080 8e15304b91ed59783d09925b6a78e10b.exe 92 PID 4080 wrote to memory of 4120 4080 8e15304b91ed59783d09925b6a78e10b.exe 108 PID 4080 wrote to memory of 4120 4080 8e15304b91ed59783d09925b6a78e10b.exe 108 PID 4080 wrote to memory of 4120 4080 8e15304b91ed59783d09925b6a78e10b.exe 108 PID 4080 wrote to memory of 2584 4080 8e15304b91ed59783d09925b6a78e10b.exe 107 PID 4080 wrote to memory of 2584 4080 8e15304b91ed59783d09925b6a78e10b.exe 107 PID 4080 wrote to memory of 2584 4080 8e15304b91ed59783d09925b6a78e10b.exe 107 PID 4080 wrote to memory of 4956 4080 8e15304b91ed59783d09925b6a78e10b.exe 106 PID 4080 wrote to memory of 4956 4080 8e15304b91ed59783d09925b6a78e10b.exe 106 PID 4080 wrote to memory of 4956 4080 8e15304b91ed59783d09925b6a78e10b.exe 106 PID 4080 wrote to memory of 2108 4080 8e15304b91ed59783d09925b6a78e10b.exe 104 PID 4080 wrote to memory of 2108 4080 8e15304b91ed59783d09925b6a78e10b.exe 104 PID 4080 wrote to memory of 2108 4080 8e15304b91ed59783d09925b6a78e10b.exe 104 PID 4080 wrote to memory of 4928 4080 8e15304b91ed59783d09925b6a78e10b.exe 103 PID 4080 wrote to memory of 4928 4080 8e15304b91ed59783d09925b6a78e10b.exe 103 PID 4080 wrote to memory of 4928 4080 8e15304b91ed59783d09925b6a78e10b.exe 103 PID 4080 wrote to memory of 2960 4080 8e15304b91ed59783d09925b6a78e10b.exe 102 PID 4080 wrote to memory of 2960 4080 8e15304b91ed59783d09925b6a78e10b.exe 102 PID 4080 wrote to memory of 2960 4080 8e15304b91ed59783d09925b6a78e10b.exe 102 PID 4080 wrote to memory of 2732 4080 8e15304b91ed59783d09925b6a78e10b.exe 100 PID 4080 wrote to memory of 2732 4080 8e15304b91ed59783d09925b6a78e10b.exe 100 PID 4080 wrote to memory of 2732 4080 8e15304b91ed59783d09925b6a78e10b.exe 100 PID 4080 wrote to memory of 4964 4080 8e15304b91ed59783d09925b6a78e10b.exe 99 PID 4080 wrote to memory of 4964 4080 8e15304b91ed59783d09925b6a78e10b.exe 99 PID 4080 wrote to memory of 4964 4080 8e15304b91ed59783d09925b6a78e10b.exe 99 PID 4080 wrote to memory of 4040 4080 8e15304b91ed59783d09925b6a78e10b.exe 98 PID 4080 wrote to memory of 4040 4080 8e15304b91ed59783d09925b6a78e10b.exe 98 PID 4080 wrote to memory of 4040 4080 8e15304b91ed59783d09925b6a78e10b.exe 98 PID 4080 wrote to memory of 2848 4080 8e15304b91ed59783d09925b6a78e10b.exe 97 PID 4080 wrote to memory of 2848 4080 8e15304b91ed59783d09925b6a78e10b.exe 97 PID 4080 wrote to memory of 2848 4080 8e15304b91ed59783d09925b6a78e10b.exe 97 PID 4080 wrote to memory of 3456 4080 8e15304b91ed59783d09925b6a78e10b.exe 94 PID 4080 wrote to memory of 3456 4080 8e15304b91ed59783d09925b6a78e10b.exe 94 PID 4080 wrote to memory of 3456 4080 8e15304b91ed59783d09925b6a78e10b.exe 94 PID 4080 wrote to memory of 912 4080 8e15304b91ed59783d09925b6a78e10b.exe 93 PID 4080 wrote to memory of 912 4080 8e15304b91ed59783d09925b6a78e10b.exe 93 PID 4080 wrote to memory of 912 4080 8e15304b91ed59783d09925b6a78e10b.exe 93 PID 228 wrote to memory of 3440 228 net.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e15304b91ed59783d09925b6a78e10b.exe"C:\Users\Admin\AppData\Local\Temp\8e15304b91ed59783d09925b6a78e10b.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Windows security modification
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\net.exenet stop "TrueVector Internet Monitor"2⤵PID:4428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueVector Internet Monitor"3⤵PID:5056
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Lavasoft Personal Firewall"2⤵PID:2596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Lavasoft Personal Firewall"3⤵PID:2452
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Panda Firewall service"2⤵PID:2264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Panda Firewall service"3⤵PID:1608
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Norton Firewall"2⤵PID:1388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Norton Firewall"3⤵PID:1920
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Outpost Firewall Service"2⤵PID:5012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Outpost Firewall Service"3⤵PID:4708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SharedAccess"2⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SharedAccess"3⤵PID:3440
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BlackICE"2⤵PID:2844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BlackICE"3⤵PID:2916
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Tiny Personal Firewall"2⤵PID:1784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Tiny Personal Firewall"3⤵PID:3380
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sygate Personal Firewall"2⤵PID:2004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sygate Personal Firewall"3⤵PID:2876
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Outpost Firewall Service"2⤵PID:912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Outpost Firewall Service"3⤵PID:2940
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Outpost Firewall Service"2⤵PID:3456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Outpost Firewall Service"3⤵PID:1928
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Outpost Firewall Service"2⤵PID:2848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Outpost Firewall Service"3⤵PID:968
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Norton AntiVirus Auto-Protect"2⤵PID:4040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Norton AntiVirus Auto-Protect"3⤵PID:3108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Norton AntiVirus"2⤵PID:4964
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Norton AntiVirus"3⤵PID:740
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BlackICE PC Protection"2⤵PID:2732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BlackICE PC Protection"3⤵PID:880
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BitDefender antivirus"2⤵PID:2960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BitDefender antivirus"3⤵PID:4812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kaspersky Labs anti-virus"2⤵PID:4928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kaspersky Labs anti-virus"3⤵PID:1912
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AVG Antivirus"2⤵PID:2108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AVG Antivirus"3⤵PID:3936
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfee VirusScan"2⤵PID:4956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfee VirusScan"3⤵PID:3992
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Panda anti-virus service"2⤵PID:2584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Panda anti-virus service"3⤵PID:468
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Lavasoft Personal Firewall Service"2⤵PID:4120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Lavasoft Personal Firewall Service"3⤵PID:4560
-
-