Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 01:35

General

  • Target

    8195a6bc151cff05fa45062d140cf304f86fc8f33f64efa9a6c6dff24673ada3N.exe

  • Size

    349KB

  • MD5

    869164c334d4375d7eb568102c6513f0

  • SHA1

    fb0a446791a8c4c3e8853f37593963d13b037f8e

  • SHA256

    8195a6bc151cff05fa45062d140cf304f86fc8f33f64efa9a6c6dff24673ada3

  • SHA512

    413f22e45bda3c875e90ba0bada65f35b0682f737325afb3f80e84ccd670c17f7a0fe274806eb743447057146a4991723c981efb509f571f2857e73c57387542

  • SSDEEP

    6144:YeC4EwZFoobUk8qp0qpgogZfpjkNYL7RI:8fhuLwflks7RI

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Launches sc.exe 22 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8195a6bc151cff05fa45062d140cf304f86fc8f33f64efa9a6c6dff24673ada3N.exe
    "C:\Users\Admin\AppData\Local\Temp\8195a6bc151cff05fa45062d140cf304f86fc8f33f64efa9a6c6dff24673ada3N.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Loads dropped DLL
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WerSvc start=disabled
      2⤵
      • Launches sc.exe
      PID:1180
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config wdfilter start=disabled
      2⤵
      • Launches sc.exe
      PID:1652
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\system32\sc.exe
        sc stop wdfilter
        3⤵
        • Launches sc.exe
        PID:2776
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WinDefend start=disabled
      2⤵
      • Launches sc.exe
      PID:2836
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop WerSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Windows\system32\sc.exe
        sc stop WerSvc
        3⤵
        • Launches sc.exe
        PID:2884
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WdNisSvc start=disabled
      2⤵
      • Launches sc.exe
      PID:2916
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\system32\sc.exe
        sc stop WdNisSvc
        3⤵
        • Launches sc.exe
        PID:2740
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config XblGameSave start=disabled
      2⤵
      • Launches sc.exe
      PID:2792
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\system32\sc.exe
        sc stop WinDefend
        3⤵
        • Launches sc.exe
        PID:2152
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop XblGameSave
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Windows\system32\sc.exe
        sc stop XblGameSave
        3⤵
        • Launches sc.exe
        PID:2356
    • C:\Users\Admin\AppData\Local\Temp\kt2uhctm.bat
      "C:\Users\Admin\AppData\Local\Temp\kt2uhctm.bat" ok
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config wdfilter start=disabled
        3⤵
        • Launches sc.exe
        PID:2952
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config WerSvc start=disabled
        3⤵
        • Launches sc.exe
        PID:1708
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
        3⤵
          PID:2716
          • C:\Windows\system32\sc.exe
            sc stop wdfilter
            4⤵
            • Launches sc.exe
            PID:2112
        • C:\Windows\System32\sc.exe
          "C:\Windows\System32\sc.exe" config WinDefend start=disabled
          3⤵
          • Launches sc.exe
          PID:1404
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c sc stop WerSvc
          3⤵
            PID:2104
            • C:\Windows\system32\sc.exe
              sc stop WerSvc
              4⤵
              • Launches sc.exe
              PID:484
          • C:\Windows\System32\sc.exe
            "C:\Windows\System32\sc.exe" config WdNisSvc start=disabled
            3⤵
            • Launches sc.exe
            PID:1616
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc
            3⤵
              PID:264
              • C:\Windows\system32\sc.exe
                sc stop WdNisSvc
                4⤵
                • Launches sc.exe
                PID:3016
            • C:\Windows\System32\sc.exe
              "C:\Windows\System32\sc.exe" config XblGameSave start=disabled
              3⤵
              • Launches sc.exe
              PID:2604
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c sc stop WinDefend
              3⤵
                PID:708
                • C:\Windows\system32\sc.exe
                  sc stop WinDefend
                  4⤵
                  • Launches sc.exe
                  PID:1160
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c sc stop XblGameSave
                3⤵
                  PID:1096
                  • C:\Windows\system32\sc.exe
                    sc stop XblGameSave
                    4⤵
                    • Launches sc.exe
                    PID:280
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "XXXXX" -AppPathNameMatchCondition "C:\Program Files (x86)\EasyAntiCheat\EasyAntiCheat.exe" -ThrottleRateActionBitsPerSecond 8
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:936
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "YYYYY" -AppPathNameMatchCondition "C:\Program Files (x86)\Common Files\BattlEye\BEService.exe" -ThrottleRateActionBitsPerSecond 8
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2480
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
                  3⤵
                    PID:1536
                    • C:\Windows\system32\sc.exe
                      sc stop wdfilter
                      4⤵
                      • Launches sc.exe
                      PID:1532
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c sc stop faceit
                    3⤵
                      PID:2204
                      • C:\Windows\system32\sc.exe
                        sc stop faceit
                        4⤵
                        • Launches sc.exe
                        PID:1524
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\fd2542da-9e37-4135-ae7d-465615e60e99.bat"
                    2⤵
                    • Deletes itself
                    • Suspicious use of WriteProcessMemory
                    PID:1908
                    • C:\Windows\system32\attrib.exe
                      attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\8195a6bc151cff05fa45062d140cf304f86fc8f33f64efa9a6c6dff24673ada3N.exe"
                      3⤵
                      • Views/modifies file attributes
                      PID:2504
                    • C:\Windows\system32\reg.exe
                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "HiberbootEnabled" /t REG_DWORD /d 0 /f
                      3⤵
                        PID:352
                      • C:\Windows\system32\timeout.exe
                        timeout /T 1
                        3⤵
                        • Delays execution with timeout.exe
                        PID:1452
                      • C:\Windows\system32\attrib.exe
                        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\8195a6bc151cff05fa45062d140cf304f86fc8f33f64efa9a6c6dff24673ada3N.exe"
                        3⤵
                        • Views/modifies file attributes
                        PID:564
                      • C:\Windows\system32\wevtutil.exe
                        wevtutil el
                        3⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2972
                      • C:\Windows\system32\attrib.exe
                        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\fd2542da-9e37-4135-ae7d-465615e60e99.bat"
                        3⤵
                        • Views/modifies file attributes
                        PID:1540

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\fd2542da-9e37-4135-ae7d-465615e60e99.bat

                    Filesize

                    780B

                    MD5

                    bd46ae050d7e66311b37a4484a327066

                    SHA1

                    543b3e6aa7fd3cc33d956f66dafb41b83e7e65d5

                    SHA256

                    4b978e259b9219c239044a8d810d2525bef63501e6dfd8a883eed5c8e80d4a00

                    SHA512

                    045abc1601591a6659a45692a6bb785a8589f90fc6d12c3ee67ac3289cedf8c745e8e41fd213ef3bdd0f411ee7636705440fe1db2af2c4a04955a9866a207b88

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RRGYL73DTXJGAVKLQE48.temp

                    Filesize

                    7KB

                    MD5

                    89edcee60b6018b55223831ad5b97653

                    SHA1

                    6c61c18b9fbf1ca97c4e3993029e326b3806fe61

                    SHA256

                    fa4589b0d6df9fc368cc4693b39e3f8aee4e2acca03a224ba0642e7b9ea28559

                    SHA512

                    e92f0b5247c9a83f30fc0ec794a1e1e460507afb6b7fd914000b1e1fc6f22d5647728fda32e38c1874069736a4442f2567bab0f600b4b29011df9e6dafc2f563

                  • C:\Users\Admin\AppData\Roaming\spf\unknown.log

                    Filesize

                    190B

                    MD5

                    b0dce94b7cc11fe305cf25475b709844

                    SHA1

                    f4fa3c9a7a7efa8e60de732da522057c3946bd85

                    SHA256

                    83b9fadce7361d8b70862c32fd931ab296705b3c18969be1111ae980217a43be

                    SHA512

                    70aa1ade56b29da6340664adca20154fd95712df770f8d7687c92567ebe9627a8a68122fb95250b3d97c2e7987ba4b827234773bdd2c413c250c602538bbf82e

                  • \Users\Admin\AppData\Local\Temp\kt2uhctm.bat

                    Filesize

                    350KB

                    MD5

                    9a835a8f8ad4bcb6dfea77be4dd07692

                    SHA1

                    e9e4191fb9f37645be7f92039714cc10591056e3

                    SHA256

                    51158d7da1a4539275d42a3a4495ff906b1a3423969eb0c1f1de5ca7f1bd8066

                    SHA512

                    6b39ec08b1dab5d41ef48bf5b7df6db46427bc04456b9ac87223508805f84d8abc48297db2c546d223198cfd9bd8fadb79f3849bdfa65a8c4d0216fe8154e421

                  • memory/936-29-0x0000000002920000-0x0000000002928000-memory.dmp

                    Filesize

                    32KB

                  • memory/936-28-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/1124-14-0x000000013EE30000-0x000000013EE6E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2480-35-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2480-36-0x0000000002350000-0x0000000002358000-memory.dmp

                    Filesize

                    32KB

                  • memory/2524-18-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2524-2-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2524-0-0x000007FEF5DA3000-0x000007FEF5DA4000-memory.dmp

                    Filesize

                    4KB

                  • memory/2524-1-0x000000013E1B0000-0x000000013E1EE000-memory.dmp

                    Filesize

                    248KB