Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 00:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Bypass-defender.exe
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Bypass-defender.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
Bypass-defender.exe
-
Size
361KB
-
MD5
7be37dff77a6257da2b430ab7c483612
-
SHA1
028356262caa0076adb3c0a0ad87e4418d386ec8
-
SHA256
93386ea79c58a95c033e66da99d155264f0028a43973a9a4496f3fc8c89db0b9
-
SHA512
09dae1c1cb5b07dd4099d21db53f3d08a5ac354777086e666bd872532a37539a67455c35768e78cfc4e181f03bd67ba546aace35d2b50c7aa68a2433c317634a
-
SSDEEP
3072:6pbgo3vg+rJrkQVOUPrxLExK08A+MQ20AFHxH32Hdxkq51:Ubf3vg+rOgOyrNEI3AxQUHK
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 raw.githubusercontent.com 3 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2252 Bypass-defender.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2540 2252 Bypass-defender.exe 28 PID 2252 wrote to memory of 2540 2252 Bypass-defender.exe 28 PID 2252 wrote to memory of 2540 2252 Bypass-defender.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bypass-defender.exe"C:\Users\Admin\AppData\Local\Temp\Bypass-defender.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2252 -s 10082⤵PID:2540
-