Resubmissions
26-10-2024 23:19
241026-3a1rfsxrgm 1026-10-2024 23:18
241026-3absbs1fnl 1026-10-2024 23:16
241026-29dkjaymaw 10Analysis
-
max time kernel
7s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-10-2024 23:18
Behavioral task
behavioral1
Sample
test.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win11-20241007-en
General
-
Target
test.exe
-
Size
3.0MB
-
MD5
7b3150ddd3df859f8f6f36cb041b23f7
-
SHA1
c3934ab76025c17cab3d309a96c1e32df9ad9d65
-
SHA256
675a8aa47c9032b3588c440435744c3a01c04edc4ea204631eee0b53f0405a8f
-
SHA512
a1fe1559965a5eac9a6eef26bbcd559d8a3aa1719f81c35e4106ca0664805cde9566e7bd163fc63a27e356e034b64ef6af5a0f4a299997352bdf4b51e6b6d214
-
SSDEEP
49152:ONJEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmYXdrZz:ONJtODUKTslWp2MpbfGGilIJPypSbxEw
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/5072-24-0x000000001C0E0000-0x000000001C0EA000-memory.dmp disable_win_def -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
test.execsc.exedescription pid process target process PID 5072 wrote to memory of 4680 5072 test.exe csc.exe PID 5072 wrote to memory of 4680 5072 test.exe csc.exe PID 4680 wrote to memory of 2264 4680 csc.exe cvtres.exe PID 4680 wrote to memory of 2264 4680 csc.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zul19po0.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES82BE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC82BD.tmp"3⤵PID:2264
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57440cb513971cc932c23992b09e56cdd
SHA186b8412f006f55d8dfad25202753928cbf51cde7
SHA256acdebc72cd95647ef93f04fd0d7dee293f9325415d5f7c6fa28bf1e3d0a0dfb7
SHA512f37cd80ffbefbd7afc47e347dca93d3bd3476af7489b513496116a0377bf189e91f9d51bd111f4f33a5edccf034ba8f69c7ee4835a967234c3edc2b341b25fed
-
Filesize
76KB
MD54c7d63216527fa72ec004af79c9e1ef6
SHA19bbc8583e5b054086a3aed701576960eaec5c979
SHA25648725364b06fda729c6419ddf711518133397542f7c06f3cda25398827c10cd5
SHA512cee6dc976ca9f540131ded29f079dc9dff9897678b9c920ef5fa709106ad6560f69616674ae6de6ca739ef343c4f968b2de8fcbf3bc19808a2183f9b2737ed26
-
Filesize
676B
MD54b79a2bbdd70951a5e898d172ea731c3
SHA1cb320205a381d8438ab99266684c3a589a6bc506
SHA2564b3d395c88e3d94fb4583c02aa0aa79e866d4b8a2835607eb915e8303549f7fa
SHA512b218f54eff8d4511ce8fd528596f61cbc6fd5976d7dce7ceb4e257cb34a22d70684957ddd837c11fdd0d593b0a2d4b9403640943ec894b245fd4d81df7ea26b5
-
Filesize
208KB
MD5636d075f31d7c5ec3eb0b66f4bb3359f
SHA1def6e77427ad6c2567a3cfd53f10a6c36787a43f
SHA25661e63bf52f68e246e8d0576bdceff4ce3635ab9f23e7c61516ed043a91b66279
SHA5126b97b32a9ff4e789a0ef23c026aab2dcb07eeb3992d7ac7724223e4a5f6f5563c9f356a6cdb3992d9546ad9565704b1176799ef3040ea9e8ff480098188d1228
-
Filesize
349B
MD518da9ecb89475b9e636eedfa2491d676
SHA18311f413162e8e7a2b4850ff30003c3a1b078df6
SHA256c836becdeefa3bdb63369eedcf771dfdad1cd50eb069e96eaa0420d13d964087
SHA512289fb31c44a6589edab0ddc38f7ed0da11b9ce814887fa99f8410db93557c82de44112a9ab92031ad8063fab1f607033c435b1658eaeffcbe2a78d9bcadf7de4