Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 19:13

General

  • Target

    ab3233851d7f29ea66074a9a50a59540N.exe

  • Size

    330KB

  • MD5

    ab3233851d7f29ea66074a9a50a59540

  • SHA1

    7d5b8e5c84e0908261afa1f9f47264d2d1820724

  • SHA256

    f18dbf85ce6e20ff9639b55c4f595e76ed93888cf6a87afdad0abd5689f531cb

  • SHA512

    e27242405648634f9c572d8b67e0e62c536cf95b355a2eeecd676abcc0a993fb170d7515c298b9a0dbeed6c16b36ce502bb0d6ca2957c838624ca0385e930006

  • SSDEEP

    6144:YeC4EwZFoobUk8qp0qpgogZfpjkNaXihVP:8fhuLwflkLVP

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Launches sc.exe 22 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe
    "C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Loads dropped DLL
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config wdfilter start=disabled
      2⤵
      • Launches sc.exe
      PID:1728
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WerSvc start=disabled
      2⤵
      • Launches sc.exe
      PID:2400
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\system32\sc.exe
        sc stop wdfilter
        3⤵
        • Launches sc.exe
        PID:2856
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WinDefend start=disabled
      2⤵
      • Launches sc.exe
      PID:2740
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop WerSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\system32\sc.exe
        sc stop WerSvc
        3⤵
        • Launches sc.exe
        PID:2876
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WdNisSvc start=disabled
      2⤵
      • Launches sc.exe
      PID:2892
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\system32\sc.exe
        sc stop WinDefend
        3⤵
        • Launches sc.exe
        PID:2592
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\system32\sc.exe
        sc stop WdNisSvc
        3⤵
        • Launches sc.exe
        PID:2608
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config XblGameSave start=disabled
      2⤵
      • Launches sc.exe
      PID:2588
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop XblGameSave
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\system32\sc.exe
        sc stop XblGameSave
        3⤵
        • Launches sc.exe
        PID:3064
    • C:\Users\Admin\AppData\Local\Temp\yi0atn23.bat
      "C:\Users\Admin\AppData\Local\Temp\yi0atn23.bat" ok
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config wdfilter start=disabled
        3⤵
        • Launches sc.exe
        PID:2844
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config WerSvc start=disabled
        3⤵
        • Launches sc.exe
        PID:2920
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
        3⤵
          PID:1364
          • C:\Windows\system32\sc.exe
            sc stop wdfilter
            4⤵
            • Launches sc.exe
            PID:1204
        • C:\Windows\System32\sc.exe
          "C:\Windows\System32\sc.exe" config WinDefend start=disabled
          3⤵
          • Launches sc.exe
          PID:1156
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c sc stop WerSvc
          3⤵
            PID:2112
            • C:\Windows\system32\sc.exe
              sc stop WerSvc
              4⤵
              • Launches sc.exe
              PID:264
          • C:\Windows\System32\sc.exe
            "C:\Windows\System32\sc.exe" config WdNisSvc start=disabled
            3⤵
            • Launches sc.exe
            PID:2020
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c sc stop WinDefend
            3⤵
              PID:1488
              • C:\Windows\system32\sc.exe
                sc stop WinDefend
                4⤵
                • Launches sc.exe
                PID:3004
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc
              3⤵
                PID:392
                • C:\Windows\system32\sc.exe
                  sc stop WdNisSvc
                  4⤵
                  • Launches sc.exe
                  PID:1960
              • C:\Windows\System32\sc.exe
                "C:\Windows\System32\sc.exe" config XblGameSave start=disabled
                3⤵
                • Launches sc.exe
                PID:3000
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c sc stop XblGameSave
                3⤵
                  PID:1704
                  • C:\Windows\system32\sc.exe
                    sc stop XblGameSave
                    4⤵
                    • Launches sc.exe
                    PID:1612
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "XXXXX" -AppPathNameMatchCondition "C:\Program Files (x86)\EasyAntiCheat\EasyAntiCheat.exe" -ThrottleRateActionBitsPerSecond 8
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:564
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "YYYYY" -AppPathNameMatchCondition "C:\Program Files (x86)\Common Files\BattlEye\BEService.exe" -ThrottleRateActionBitsPerSecond 8
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1268
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
                  3⤵
                    PID:2412
                    • C:\Windows\system32\sc.exe
                      sc stop wdfilter
                      4⤵
                      • Launches sc.exe
                      PID:2416
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c sc stop faceit
                    3⤵
                      PID:1912
                      • C:\Windows\system32\sc.exe
                        sc stop faceit
                        4⤵
                        • Launches sc.exe
                        PID:3024
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bceeda17-e57f-47a7-8c0c-1ae93f782e87.bat"
                    2⤵
                    • Deletes itself
                    • Suspicious use of WriteProcessMemory
                    PID:2932
                    • C:\Windows\system32\attrib.exe
                      attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe"
                      3⤵
                      • Views/modifies file attributes
                      PID:2840
                    • C:\Windows\system32\reg.exe
                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "HiberbootEnabled" /t REG_DWORD /d 0 /f
                      3⤵
                        PID:1072
                      • C:\Windows\system32\timeout.exe
                        timeout /T 1
                        3⤵
                        • Delays execution with timeout.exe
                        PID:1664
                      • C:\Windows\system32\attrib.exe
                        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe"
                        3⤵
                        • Views/modifies file attributes
                        PID:984
                      • C:\Windows\system32\wevtutil.exe
                        wevtutil el
                        3⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1812
                      • C:\Windows\system32\attrib.exe
                        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\bceeda17-e57f-47a7-8c0c-1ae93f782e87.bat"
                        3⤵
                        • Views/modifies file attributes
                        PID:2024

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\bceeda17-e57f-47a7-8c0c-1ae93f782e87.bat

                          Filesize

                          652B

                          MD5

                          93a9a38bd9653e6dd2329fd018c2c27b

                          SHA1

                          d749a61afa8012e9eb0c3b0872fcb0324432342b

                          SHA256

                          71092f87a2757c4f46cc3bb87ed1b4161a6b05f67f57f82d77fbd45feb4385cd

                          SHA512

                          78ed6e29e22e19a717f6e1de1dbade25b55ec0ac394711e24cda35923fca703963a48577c5e66da559acea98eb2d6a82f4c5c5f90acf6e32e0746bb2bb5b378c

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          cbed48f10136a06a2d72ef658204c512

                          SHA1

                          60a3975ea516909ada982badc71c87bf78a17b4f

                          SHA256

                          981e7a03ea4db881fb5ac3edce3c0f726388c472981ef168d3250d10b0632901

                          SHA512

                          0f28fe94f9b75bea86435df94cd0467e1f24555958c76b99b64aa44ed3d60cdc345173eec3a86ba815a59bdef255fbd6fef78058289e7f6eeab0203b0c0e264e

                        • C:\Users\Admin\AppData\Roaming\spf\unknown.log

                          Filesize

                          263B

                          MD5

                          3c162df5e709ff6d99f82c2fb0b2fdc4

                          SHA1

                          940bd2d7bab4e6b9e8c4d7734c6f102d952338cd

                          SHA256

                          c2d77a02704db553164b2f88e714be3a8956f094fc90935ee41e10f9ac6460f0

                          SHA512

                          7994745fe5ec0bc7dda9c26129194357143d522ca77e00cfbcfc219ae00182d2d055f373a75145f8717813ef9164968f68c0a5719e32d7ab4d0732661a16241a

                        • \Users\Admin\AppData\Local\Temp\yi0atn23.bat

                          Filesize

                          331KB

                          MD5

                          2c94d2cdfda021c89fcabd7ce0d3fcb5

                          SHA1

                          f759c5b8cbaef2d6f901796dd13fe11ddba0e5a0

                          SHA256

                          ae941cc76e7254060e3f729980a9c2c35d77ed11cf7284d654300a168650b257

                          SHA512

                          bd2673a9ac9889ae79ebe8a743ce5c8079126ae8be3cdd30274ac7603ad51eb535291cf2485a982dc16cd14b27ab4d24ae801d5bc3adc338f415cdfe0f2039f8

                        • memory/564-28-0x000000001B520000-0x000000001B802000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/564-29-0x0000000001E80000-0x0000000001E88000-memory.dmp

                          Filesize

                          32KB

                        • memory/632-14-0x000000013E810000-0x000000013E84E000-memory.dmp

                          Filesize

                          248KB

                        • memory/1268-35-0x000000001B5E0000-0x000000001B8C2000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/1268-36-0x0000000002810000-0x0000000002818000-memory.dmp

                          Filesize

                          32KB

                        • memory/2032-18-0x000007FEF5210000-0x000007FEF5BFC000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/2032-2-0x000007FEF5210000-0x000007FEF5BFC000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/2032-0-0x000007FEF5213000-0x000007FEF5214000-memory.dmp

                          Filesize

                          4KB

                        • memory/2032-1-0x000000013EE60000-0x000000013EE9E000-memory.dmp

                          Filesize

                          248KB