Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
test2.bat
Resource
win7-20241023-en
8 signatures
150 seconds
General
-
Target
test2.bat
-
Size
853B
-
MD5
1a3dc0421e9078992b3ca8f0297dd6c8
-
SHA1
f72384f6cc010503b9f2bdb9934a4b64e77168d6
-
SHA256
1cab37cabfb1ee68e57bbefd17aa8afe7b6d61f3de8ad976d14eeb20cc7a5b9e
-
SHA512
397db20e2a3318a94e2b3395d03294e1e4e29d5e3cf12dcd9932349b344324ef18ea95460414efef9ab934532e832abf18401f5889ffcb8ef02df2bbb016639d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
pid Process 2396 powershell.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2124 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2396 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2396 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1616 2412 cmd.exe 31 PID 2412 wrote to memory of 1616 2412 cmd.exe 31 PID 2412 wrote to memory of 1616 2412 cmd.exe 31 PID 1616 wrote to memory of 1028 1616 net.exe 32 PID 1616 wrote to memory of 1028 1616 net.exe 32 PID 1616 wrote to memory of 1028 1616 net.exe 32 PID 2412 wrote to memory of 2396 2412 cmd.exe 33 PID 2412 wrote to memory of 2396 2412 cmd.exe 33 PID 2412 wrote to memory of 2396 2412 cmd.exe 33 PID 2412 wrote to memory of 2124 2412 cmd.exe 34 PID 2412 wrote to memory of 2124 2412 cmd.exe 34 PID 2412 wrote to memory of 2124 2412 cmd.exe 34 PID 2412 wrote to memory of 780 2412 cmd.exe 35 PID 2412 wrote to memory of 780 2412 cmd.exe 35 PID 2412 wrote to memory of 780 2412 cmd.exe 35 PID 2412 wrote to memory of 2988 2412 cmd.exe 36 PID 2412 wrote to memory of 2988 2412 cmd.exe 36 PID 2412 wrote to memory of 2988 2412 cmd.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\test2.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:1028
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\system32\sc.exesc stop WinDefend2⤵
- Launches sc.exe
PID:2124
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:780
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2988
-