Analysis
-
max time kernel
14s -
max time network
22s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
27-08-2024 15:04
Behavioral task
behavioral1
Sample
nvkFix/Control Defender/Defender_Settings.vbs
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
nvkFix/Control Defender/dControl.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
nvkFix/FIX.bat
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
nvkFix/WUB/Wub_x64.exe
Resource
win10-20240404-en
General
-
Target
nvkFix/FIX.bat
-
Size
977B
-
MD5
f083c0f930d20a64669958500e827f4b
-
SHA1
9315478c204f317865bc5c5dc57d007edf826525
-
SHA256
eaaec43dba120f9dc1e2621a5812536aeeceaa1c851c492536e848b7ab57d93d
-
SHA512
eb81b18a67ac6da65a97219b6cfed6ab6745cf02bc4fe446972558847fc47ccac2726b7f6c32c3af04005c885aed462a5098d236cff8b88c1323607395cf209d
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 4168 bcdedit.exe -
Modify Registry: Disable Windows Driver Blocklist 2 TTPs 1 IoCs
Disable Windows Driver Blocklist via Registry.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\VulnerableDriverBlocklistEnable = "0" reg.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4500 wrote to memory of 3584 4500 cmd.exe 72 PID 4500 wrote to memory of 3584 4500 cmd.exe 72 PID 3584 wrote to memory of 3820 3584 net.exe 73 PID 3584 wrote to memory of 3820 3584 net.exe 73 PID 4500 wrote to memory of 3572 4500 cmd.exe 74 PID 4500 wrote to memory of 3572 4500 cmd.exe 74 PID 4500 wrote to memory of 96 4500 cmd.exe 75 PID 4500 wrote to memory of 96 4500 cmd.exe 75 PID 4500 wrote to memory of 3172 4500 cmd.exe 76 PID 4500 wrote to memory of 3172 4500 cmd.exe 76 PID 4500 wrote to memory of 4168 4500 cmd.exe 77 PID 4500 wrote to memory of 4168 4500 cmd.exe 77
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\nvkFix\FIX.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:3820
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 32⤵PID:3572
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 32⤵PID:96
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\CI\Config" /v VulnerableDriverBlocklistEnable /t REG_DWORD /d 0x0000002⤵
- Modify Registry: Disable Windows Driver Blocklist
PID:3172
-
-
C:\Windows\system32\bcdedit.exebcdedit /set hypervisorlaunchtype off2⤵
- Modifies boot configuration data using bcdedit
PID:4168
-