Analysis
-
max time kernel
16s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 10:16
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
Anarchy.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Anarchy.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
Anarchy.exe
-
Size
16.1MB
-
MD5
56373fb76365e161485614ff91d4030b
-
SHA1
e2429e6e2953a948e8756a5ff7e87a68bdceabd2
-
SHA256
e208fae2282697cdce4471ce296d4750743acb5b8e7ff09217667a69041243a7
-
SHA512
27c8138c50b473121694b9ce4412d9757b7d74299df25aa5a6693578f05039c6d2f30367100732f16bbff42c78a8d27176d39a0c71d090ec5f18a70d31f1f40c
-
SSDEEP
196608:i5CpPOu/P8G2eee0yMRs4vkmXaU7aIObk9fcdHJDLscmZk36zOAE2A1cZF7sL9YR:s+r0TaZ1LmZ+F1cby9YN/X
Score
10/10
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/2652-1-0x0000020626150000-0x0000020627170000-memory.dmp disable_win_def -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe 2652 Anarchy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2652 Anarchy.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 Anarchy.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2652 Anarchy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anarchy.exe"C:\Users\Admin\AppData\Local\Temp\Anarchy.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2652
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4176