Resubmissions
26-10-2024 23:19
241026-3a1rfsxrgm 1026-10-2024 23:18
241026-3absbs1fnl 1026-10-2024 23:16
241026-29dkjaymaw 10Analysis
-
max time kernel
91s -
max time network
203s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-10-2024 23:16
Behavioral task
behavioral1
Sample
test.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
test.exe
Resource
win11-20241007-en
General
-
Target
test.exe
-
Size
3.0MB
-
MD5
7b3150ddd3df859f8f6f36cb041b23f7
-
SHA1
c3934ab76025c17cab3d309a96c1e32df9ad9d65
-
SHA256
675a8aa47c9032b3588c440435744c3a01c04edc4ea204631eee0b53f0405a8f
-
SHA512
a1fe1559965a5eac9a6eef26bbcd559d8a3aa1719f81c35e4106ca0664805cde9566e7bd163fc63a27e356e034b64ef6af5a0f4a299997352bdf4b51e6b6d214
-
SSDEEP
49152:ONJEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmYXdrZz:ONJtODUKTslWp2MpbfGGilIJPypSbxEw
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral3/memory/4744-24-0x000000001BF20000-0x000000001BF2A000-memory.dmp disable_win_def -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4744 wrote to memory of 3160 4744 test.exe 81 PID 4744 wrote to memory of 3160 4744 test.exe 81 PID 3160 wrote to memory of 3684 3160 csc.exe 83 PID 3160 wrote to memory of 3684 3160 csc.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pwsglgw_.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB6FD.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB6FC.tmp"3⤵PID:3684
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56b663bdc85570fe51fbcea14c40feb2f
SHA1b74b6331e4e30a9cfe469b5ac6bdb314069d33fa
SHA256033294f3af057072a8558ba2ecf0857a1324c7b1da147d4cbea99f2544f5780d
SHA512d06d16c341c6281089d378a5d9b2da538eb2bf3adcd50d8e2a33a0742de13c62b628c4efc4f0c425bee0092701e920b57847a5473c30fabc48b4c69c5dcf8a15
-
Filesize
76KB
MD55bd8d7d1abb732fb15027222b9e7b31a
SHA111f86fbee5535c00d3415839ae0a50df1e1edf0a
SHA2565d4e2abb7c1d5db3b534bdff8a18e4c75f021bd7ab34c527d3d281428b7400cc
SHA512ccfa58976276853c625334e1cd2d6acb5a95a9f69999b2a16c6900262eb3d3bd69d54ea2275ab94466258fbec3d7ba03eea134c5761b82a05846a077d7a07a52
-
Filesize
676B
MD5f030e661ed8f2697357a3dac5dc7a6a2
SHA1c2d7c3a39b96a35c603ac04df928f53f76ddb9fc
SHA256fff6a0e4f757431ced4ce8281fb16c117081944dac7a9eaa8ebd98a4e417cf32
SHA512454b62d5c09a6bf20ccd9d48021b73e968a5ff722471f715b013de10970410bc59f278253fdf74f0c61efac64a162f45af1c4769a45d9180407d6e27175fa007
-
Filesize
208KB
MD58d317371b27b7520068751b79345b400
SHA1d8b933fe270bffd1982f88c0bca387ec5c0084d4
SHA2565844af8df5f1db6e3833675dfd8757dc6f6682bb88f9ba1359578ebe1024d0dd
SHA512e1bfc457484b29860be56b5cd6aab92547c8b23893d4e50cb8772a102a5b81ac961ec908d92585137cce97ee6ebc60548d8e2fee920acd3f40367621546b0962
-
Filesize
349B
MD5edb44a7250cf141628669cd718a31b1e
SHA17e86ee07a08f93bebaca87f78c6046e47d3a2704
SHA256072c5b7eb3e55abc2af2a320cf453d8f86f3c96d41f339fe83e864a68986f988
SHA5124206507db06be9646dc44a477648343fc4ad37dae210e66279c27fbea49feb1924ad4cadbe884d590aafc4df6bc50f08c540ca6455da54a6782036fa5fbb749f