Resubmissions

14/04/2025, 07:51

250414-jp1kfssjz9 10

14/04/2025, 07:46

250414-jl9nyssjt9 10

08/04/2025, 15:58

250408-tevasswl18 10

08/04/2025, 14:19

250408-rm2nqsvqw2 10

Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250410-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250410-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    14/04/2025, 07:51

General

  • Target

    f846950431f463a0a7e663ea7003e31c.exe

  • Size

    351KB

  • MD5

    f846950431f463a0a7e663ea7003e31c

  • SHA1

    d503a8270aab52268a1668b129be687bba0faedb

  • SHA256

    4022f2227edc7bd96dfbdc2dd88697774b5f47fa7b50a0098e14dcdf0cc8d4ef

  • SHA512

    330c48bc86fc75fd0fccd1a04800192c46cea7b1ef1e5e9e39873a4e95c0e8ee766dd9e77a9d6dfc1b3f09c1e1c8833abd5a3c7ae099a2c4a618e35a76696d88

  • SSDEEP

    6144:YeC4EwZFoobUk8qp0qpgogZfpjkNaXiCEa4+U:8fhuLwflkac

Malware Config

Signatures

  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Launches sc.exe 15 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f846950431f463a0a7e663ea7003e31c.exe
    "C:\Users\Admin\AppData\Local\Temp\f846950431f463a0a7e663ea7003e31c.exe"
    1⤵
    • Modifies Windows Defender DisableAntiSpyware settings
    • Modifies Windows Defender Real-time Protection settings
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WerSvc start=disabled
      2⤵
      • Launches sc.exe
      PID:5636
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config wdfilter start=disabled
      2⤵
      • Launches sc.exe
      PID:3912
    • C:\Users\Admin\AppData\Local\Temp\uwrkldag.bat
      "C:\Users\Admin\AppData\Local\Temp\uwrkldag.bat" ok
      2⤵
      • Modifies Windows Defender DisableAntiSpyware settings
      • Modifies Windows Defender Real-time Protection settings
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:60
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config WerSvc start=disabled
        3⤵
        • Launches sc.exe
        PID:3188
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config wdfilter start=disabled
        3⤵
        • Launches sc.exe
        PID:2744
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config WinDefend start=disabled
        3⤵
        • Launches sc.exe
        PID:2448
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Windows\system32\sc.exe
          sc stop wdfilter
          4⤵
          • Launches sc.exe
          PID:4940
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop WerSvc
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4420
        • C:\Windows\system32\sc.exe
          sc stop WerSvc
          4⤵
          • Launches sc.exe
          PID:4944
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config WdNisSvc start=disabled
        3⤵
        • Launches sc.exe
        PID:4972
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config XblGameSave start=disabled
        3⤵
        • Launches sc.exe
        PID:4772
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop WinDefend
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4872
        • C:\Windows\system32\sc.exe
          sc stop WinDefend
          4⤵
          • Launches sc.exe
          PID:1168
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4228
        • C:\Windows\system32\sc.exe
          sc stop WdNisSvc
          4⤵
          • Launches sc.exe
          PID:5040
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop XblGameSave
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Windows\system32\sc.exe
          sc stop XblGameSave
          4⤵
          • Launches sc.exe
          PID:3888
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "XXXXX" -AppPathNameMatchCondition "C:\Program Files (x86)\EasyAntiCheat\EasyAntiCheat.exe" -ThrottleRateActionBitsPerSecond 8
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2212
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "YYYYY" -AppPathNameMatchCondition "C:\Program Files (x86)\Common Files\BattlEye\BEService.exe" -ThrottleRateActionBitsPerSecond 8
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1396
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5176
        • C:\Windows\system32\sc.exe
          sc stop wdfilter
          4⤵
          • Launches sc.exe
          PID:1916
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop faceit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4296
        • C:\Windows\system32\sc.exe
          sc stop faceit
          4⤵
          • Launches sc.exe
          PID:3492
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WinDefend start=disabled
      2⤵
      • Launches sc.exe
      PID:4880
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\c9eb8326-ecb1-4062-9c1f-95875736753f.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\system32\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\f846950431f463a0a7e663ea7003e31c.exe"
        3⤵
        • Views/modifies file attributes
        PID:1136
      • C:\Windows\system32\reg.exe
        REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "HiberbootEnabled" /t REG_DWORD /d 0 /f
        3⤵
          PID:3088
        • C:\Windows\system32\timeout.exe
          timeout /T 1
          3⤵
          • Delays execution with timeout.exe
          PID:1272
        • C:\Windows\system32\attrib.exe
          attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\f846950431f463a0a7e663ea7003e31c.exe"
          3⤵
          • Views/modifies file attributes
          PID:4900
        • C:\Windows\system32\wevtutil.exe
          wevtutil el
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4592
        • C:\Windows\system32\attrib.exe
          attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\c9eb8326-ecb1-4062-9c1f-95875736753f.bat"
          3⤵
          • Views/modifies file attributes
          PID:4040

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      e30544e6d048b2c1c6129c89835c16dd

      SHA1

      21d167ff64825d3f8a5c351c3160b670dc14cb60

      SHA256

      df0fcfba7ccb03bac0ccf6941f9cc512937fdc63035a2fedc78aa9a82c1d8af1

      SHA512

      fcfc1e2b4110286dc8ede8caab34ea309e24fa6deb225213ab0e5b2d6499cc195e65dde2e125bca3ef5d5b5f4fdda66a1e4429cf2ea1c3df0ba92142342dfd9b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      948B

      MD5

      1a7ee7aea001f6870f5d0e1ded725a4e

      SHA1

      bca157ad10f98ba007c22e7358c0c88fe991300c

      SHA256

      4d6c85efa6f1c7bc475ce64eb67f88095acc358950257049e0f239360fa1bc61

      SHA512

      ab79cd8efb3d1550b122d280225c7c2e9e6b388722f9505fcf0d454142b9c9898ac7451057d4168dcc7e39e9dd73680577db9d710c9be207130e18d7d40c172a

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fd2gjz0b.ziw.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\c9eb8326-ecb1-4062-9c1f-95875736753f.bat

      Filesize

      648B

      MD5

      87887dbb01529b1d8235df8ec56b1d24

      SHA1

      989ebdc5d46aa7dadfd6fb1a44021df907884079

      SHA256

      1fb3921fed2a5a84f831bb700e6b5f1ad7fea3e4c43639e83ab2cdbf798831b6

      SHA512

      dc330d3fc02b04dc1e4d301cd08e228ec0466137b5d91cb80576b444281920e799966bbc819b865e9894e718d1a51a192bc88186f78770f346cb76e1e604db73

    • C:\Users\Admin\AppData\Local\Temp\uwrkldag.bat

      Filesize

      351KB

      MD5

      85099d68cc5496bfbb2ca09ba510c9f3

      SHA1

      80a85691ddfcd11e9054da103e4cb360114bdfa0

      SHA256

      14b08890987671b8ea7f71d921cc539882450d910627c0407cd83047a293f9a0

      SHA512

      74227502347284a467bec514e53b544799f3e3f283abf3c1451bdd1bef9b78e98507a23252ee0644cad9a2b653a8012c5e3c32bbca067fe91ef8dfddb0c80ff3

    • C:\Users\Admin\AppData\Roaming\spf\unknown.log

      Filesize

      271B

      MD5

      d8205a0233944e28ae7803d11ff2afe0

      SHA1

      791a944c1a5243cdcd68022579e6c421891bc0ca

      SHA256

      4318fc8bb8a7aced3965192313429b4031657bc3afe0a2bfe41441274b4d2d9a

      SHA512

      9a3efc8a9a73dbe210f9af3180dfdf33b65a982284864f0891757ee7b84a2abcc12ea167cb2da5b45242b29d4456b449c3c67d32876476adae0cc41d4ec56cbb

    • memory/60-19-0x00007FFE9BBA0000-0x00007FFE9C662000-memory.dmp

      Filesize

      10.8MB

    • memory/60-21-0x00007FFE9BBA0000-0x00007FFE9C662000-memory.dmp

      Filesize

      10.8MB

    • memory/60-56-0x00007FFE9BBA0000-0x00007FFE9C662000-memory.dmp

      Filesize

      10.8MB

    • memory/60-57-0x00007FFE9BBA0000-0x00007FFE9C662000-memory.dmp

      Filesize

      10.8MB

    • memory/2212-32-0x000001E96A580000-0x000001E96A5A2000-memory.dmp

      Filesize

      136KB

    • memory/4544-20-0x00007FFE9BBA0000-0x00007FFE9C662000-memory.dmp

      Filesize

      10.8MB

    • memory/4544-0-0x00007FFE9BBA3000-0x00007FFE9BBA5000-memory.dmp

      Filesize

      8KB

    • memory/4544-2-0x00007FFE9BBA0000-0x00007FFE9C662000-memory.dmp

      Filesize

      10.8MB

    • memory/4544-1-0x000001B346200000-0x000001B34623E000-memory.dmp

      Filesize

      248KB