Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe
Resource
win10v2004-20240709-en
General
-
Target
ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe
-
Size
265KB
-
MD5
9a6424790f1417195908979b877f51b0
-
SHA1
e6ae0f82782c3b85a8cf2a2cbe0a3af64ee0b789
-
SHA256
ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04
-
SHA512
8d7e75cc50dff3289c8d64220283eb9fafb8d74f9e459c9c6a58a324d4f119ad1832247c5ea030b06fa704d498b92bd364ea4165607180247df5beddf90ebf61
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/m:WFzDqa86hV6uRRqX1evPlwAe
Malware Config
Signatures
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2688-29-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2688-35-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2688-34-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2688-36-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2688-31-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def -
Executes dropped EXE 1 IoCs
pid Process 1632 HiPatchService.exe -
Loads dropped DLL 1 IoCs
pid Process 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\HiPatch = "C:\\Users\\Admin\\AppData\\Roaming\\HiPatch\\HiPatchService.exe" ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 2688 1632 HiPatchService.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2688 RegAsm.exe 2688 RegAsm.exe 2688 RegAsm.exe 2688 RegAsm.exe 2688 RegAsm.exe 2688 RegAsm.exe 2688 RegAsm.exe 2688 RegAsm.exe 2688 RegAsm.exe 2688 RegAsm.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1632 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 28 PID 1056 wrote to memory of 1632 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 28 PID 1056 wrote to memory of 1632 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 28 PID 1056 wrote to memory of 1632 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 28 PID 1056 wrote to memory of 1632 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 28 PID 1056 wrote to memory of 1632 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 28 PID 1056 wrote to memory of 1632 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 28 PID 1056 wrote to memory of 2888 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 29 PID 1056 wrote to memory of 2888 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 29 PID 1056 wrote to memory of 2888 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 29 PID 1056 wrote to memory of 2888 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 29 PID 1056 wrote to memory of 2888 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 29 PID 1056 wrote to memory of 2888 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 29 PID 1056 wrote to memory of 2888 1056 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 29 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31 PID 1632 wrote to memory of 2688 1632 HiPatchService.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe"C:\Users\Admin\AppData\Local\Temp\ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.bat""2⤵PID:2888
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213B
MD50955cb4b691d44b37f8b6fad48a33b8e
SHA19dae759ae014cc124ab6eed7c8035788c124ae4a
SHA2569092dbb1ca1767d1966b7f79349dd95a802a68248251bf070c0f1d74d5681d71
SHA51208b868a028c1e8d29ed643416850df16f58d44668f9193b46bd3934965e5617a0a4015fc52815c5456023dbde01023450d295b76d936a936f26b602e764b0235
-
Filesize
265KB
MD5ef77b6219a7d83b0ded03cef568d28e4
SHA150711d8e210c1b1fbf94b348682f5beb22bbf34b
SHA25647c57ffe945177af2d6357420c57e8378d06e4adb122ace7fc93756a989b22ef
SHA5127712ed279475a983482b4aed17677b155d908740e193d74ef4c1a38275a30a06987087b69ed52f496703632f2739624d145b3fbd28981ae8733c65ffb303629f