Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 06:24
Static task
static1
Behavioral task
behavioral1
Sample
ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe
Resource
win10v2004-20240709-en
General
-
Target
ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe
-
Size
265KB
-
MD5
9a6424790f1417195908979b877f51b0
-
SHA1
e6ae0f82782c3b85a8cf2a2cbe0a3af64ee0b789
-
SHA256
ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04
-
SHA512
8d7e75cc50dff3289c8d64220283eb9fafb8d74f9e459c9c6a58a324d4f119ad1832247c5ea030b06fa704d498b92bd364ea4165607180247df5beddf90ebf61
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/m:WFzDqa86hV6uRRqX1evPlwAe
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/4984-28-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe -
Executes dropped EXE 1 IoCs
pid Process 3916 HiPatchService.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HiPatch = "C:\\Users\\Admin\\AppData\\Roaming\\HiPatch\\HiPatchService.exe" ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3916 set thread context of 4984 3916 HiPatchService.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5004 timeout.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe 4984 RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 388 wrote to memory of 3916 388 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 86 PID 388 wrote to memory of 3916 388 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 86 PID 388 wrote to memory of 3916 388 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 86 PID 388 wrote to memory of 3740 388 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 87 PID 388 wrote to memory of 3740 388 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 87 PID 388 wrote to memory of 3740 388 ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe 87 PID 3740 wrote to memory of 5004 3740 cmd.exe 89 PID 3740 wrote to memory of 5004 3740 cmd.exe 89 PID 3740 wrote to memory of 5004 3740 cmd.exe 89 PID 3916 wrote to memory of 4984 3916 HiPatchService.exe 90 PID 3916 wrote to memory of 4984 3916 HiPatchService.exe 90 PID 3916 wrote to memory of 4984 3916 HiPatchService.exe 90 PID 3916 wrote to memory of 4984 3916 HiPatchService.exe 90 PID 3916 wrote to memory of 4984 3916 HiPatchService.exe 90 PID 3916 wrote to memory of 4984 3916 HiPatchService.exe 90 PID 3916 wrote to memory of 4984 3916 HiPatchService.exe 90 PID 3916 wrote to memory of 4984 3916 HiPatchService.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe"C:\Users\Admin\AppData\Local\Temp\ae74cd3811dd7af7f1ecebdbee210c8ed6175251f64284361587439983523e04.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\timeout.exetimeout /t 1803⤵
- Delays execution with timeout.exe
PID:5004
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213B
MD50955cb4b691d44b37f8b6fad48a33b8e
SHA19dae759ae014cc124ab6eed7c8035788c124ae4a
SHA2569092dbb1ca1767d1966b7f79349dd95a802a68248251bf070c0f1d74d5681d71
SHA51208b868a028c1e8d29ed643416850df16f58d44668f9193b46bd3934965e5617a0a4015fc52815c5456023dbde01023450d295b76d936a936f26b602e764b0235
-
Filesize
265KB
MD558e784a69e1c4963d33fe21cfafba88f
SHA1ba1d7871142bf50690008cbd4b1308d392d875cd
SHA256fe58811a7ad6f1d2ba86451f0beb77562eb4aa6d7d8800cba97c47cac0e127d6
SHA512e2fdf94bcd4e8b59e583bc4a509428b1693d1ef1522ad5c5f9fc0becc2a034f4385e0d8817ff5d5a3c76eede23e5893a090cd25e4c913a0e1678a87b91aa8461