Resubmissions
26-10-2024 23:19
241026-3a1rfsxrgm 1026-10-2024 23:18
241026-3absbs1fnl 1026-10-2024 23:16
241026-29dkjaymaw 10Analysis
-
max time kernel
7s -
max time network
4s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-10-2024 23:18
Behavioral task
behavioral1
Sample
test.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win11-20241007-en
General
-
Target
test.exe
-
Size
3.0MB
-
MD5
7b3150ddd3df859f8f6f36cb041b23f7
-
SHA1
c3934ab76025c17cab3d309a96c1e32df9ad9d65
-
SHA256
675a8aa47c9032b3588c440435744c3a01c04edc4ea204631eee0b53f0405a8f
-
SHA512
a1fe1559965a5eac9a6eef26bbcd559d8a3aa1719f81c35e4106ca0664805cde9566e7bd163fc63a27e356e034b64ef6af5a0f4a299997352bdf4b51e6b6d214
-
SSDEEP
49152:ONJEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmYXdrZz:ONJtODUKTslWp2MpbfGGilIJPypSbxEw
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/4908-24-0x0000000001B60000-0x0000000001B6A000-memory.dmp disable_win_def -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
test.execsc.exedescription pid process target process PID 4908 wrote to memory of 1828 4908 test.exe csc.exe PID 4908 wrote to memory of 1828 4908 test.exe csc.exe PID 1828 wrote to memory of 3580 1828 csc.exe cvtres.exe PID 1828 wrote to memory of 3580 1828 csc.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zcldbtf8.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5D53.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC5D52.tmp"3⤵PID:3580
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f442a707ef9e4847b6ed40fd1e4ce386
SHA1444142b80f839a3e319d6f495a49881742981c6f
SHA256d10035c2ba55132ede6d32a4565d5f5949dcdb4426ea7d6d96c5505df39094db
SHA51252ba44bf71721a94a8438182cde433a607afc5712e1ebfdd927c48a531baa5d7cfa808e832d47d1db0975d06f971b92b79bab8b2521e865c219812689ed05b81
-
Filesize
76KB
MD528b3898dbfa3a286e9872f5fb837be69
SHA182c4b844aaae58bc6aa0fe9ebade82fdd638b1f9
SHA2565bbff6f06828f68be096993dfcc4bd06975bdd9e9448b56f5ce250e137c7ae84
SHA5126c8233f7a42fb3fef86571d3f1c2b9767670c7c36a53de1d06f02bfe0ff22ba0a098b693e8ee76aa40fdba6e971ed9beda0cf2042849e8aeb844017ca3d844ea
-
Filesize
676B
MD5a8db1d4279f4b63b76bdb4d585b94773
SHA122cec1f2644e1a74aec17fca03be7a13b7be2699
SHA256d920109bde8d07bef446ce8194eed9f000118c53547e9727c47c9e431a386c9d
SHA512930530738181df62f125df879abac0b0bb194decf7c06e71e3bbaf2b05a5dacc843890d5aa5e9c0993fafd504e33bc1141489169a9020435f64dce9bd8babdbf
-
Filesize
208KB
MD5ab40d60da8d1fb1b428b02d64261d263
SHA1f116789f367a8a1f783b31bf7ed37ff526de26b1
SHA2566fc5da17574b38d184c056c8897f66402fb44bfcb1c4277b4503c37072b58462
SHA51218e97cfc0110daad22bfcd418452d4172b6ab7d26f064253cff9c375e8f6afb60c96cab1d56fdd4c678471c002d0449e8c285659424415794e73b7abdc76d6ac
-
Filesize
349B
MD571c59b62e8499b8bb10acae7549b0508
SHA18dbfe781262e4d51fa5d547630386d04ced59c2f
SHA2566b5e390b250f3713a10b4eff3171450f238b3330ddddf6bf779b8b69c513b3ba
SHA5121b727bedb8b5cab190cecb4e3a52d4dd118f1ab5bf54d8c7d6ee537f657a8f62b01c88c0e2150e6ac1a6574963e3739354582ba703433087de7ae3a2f598b3fb