Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe
Resource
win10v2004-20240508-en
General
-
Target
becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe
-
Size
266KB
-
MD5
d65b5445fa5e3736626098ef689331c5
-
SHA1
b62313172586337872dd25b1ecb968c9c5a9010e
-
SHA256
becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9
-
SHA512
769adc82278c4dbce0a42769119d7ca7fca17712d4ae6a7669ae95d54060e0fa89d142479d080b7c569142d6471f25697324277c3619d0fb3ede78ce8a8e0337
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/s8w:WFzDqa86hV6uRRqX1evPlwAEJ
Malware Config
Signatures
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/2796-36-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2796-35-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2796-34-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2796-29-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def behavioral1/memory/2796-31-0x0000000000400000-0x0000000000430000-memory.dmp disable_win_def -
Detects Windows executables referencing non-Windows User-Agents 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2796-36-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2796-35-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2796-34-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2796-29-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2796-31-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables containing artifacts associated with disabling Widnows Defender 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2796-36-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2796-35-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2796-34-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2796-29-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2796-31-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2796-36-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2796-35-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2796-34-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2796-29-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2796-31-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects file containing reversed ASEP Autorun registry keys 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2796-36-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse behavioral1/memory/2796-35-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse behavioral1/memory/2796-34-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse behavioral1/memory/2796-29-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse behavioral1/memory/2796-31-0x0000000000400000-0x0000000000430000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Executes dropped EXE 1 IoCs
Processes:
HiPatchService.exepid process 2968 HiPatchService.exe -
Loads dropped DLL 1 IoCs
Processes:
becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exepid process 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\HiPatch = "C:\\Users\\Admin\\AppData\\Roaming\\HiPatch\\HiPatchService.exe" becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
HiPatchService.exedescription pid process target process PID 2968 set thread context of 2796 2968 HiPatchService.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
RegAsm.exepid process 2796 RegAsm.exe 2796 RegAsm.exe 2796 RegAsm.exe 2796 RegAsm.exe 2796 RegAsm.exe 2796 RegAsm.exe 2796 RegAsm.exe 2796 RegAsm.exe 2796 RegAsm.exe 2796 RegAsm.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exeHiPatchService.exedescription pid process target process PID 2056 wrote to memory of 2968 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe HiPatchService.exe PID 2056 wrote to memory of 2968 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe HiPatchService.exe PID 2056 wrote to memory of 2968 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe HiPatchService.exe PID 2056 wrote to memory of 2968 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe HiPatchService.exe PID 2056 wrote to memory of 2968 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe HiPatchService.exe PID 2056 wrote to memory of 2968 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe HiPatchService.exe PID 2056 wrote to memory of 2968 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe HiPatchService.exe PID 2056 wrote to memory of 2612 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe cmd.exe PID 2056 wrote to memory of 2612 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe cmd.exe PID 2056 wrote to memory of 2612 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe cmd.exe PID 2056 wrote to memory of 2612 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe cmd.exe PID 2056 wrote to memory of 2612 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe cmd.exe PID 2056 wrote to memory of 2612 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe cmd.exe PID 2056 wrote to memory of 2612 2056 becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe cmd.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe PID 2968 wrote to memory of 2796 2968 HiPatchService.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe"C:\Users\Admin\AppData\Local\Temp\becf832ddc730f55b034b135640ba2149334c29eca1291509d64c35bcf2a6ce9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.bat""2⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.batFilesize
213B
MD50955cb4b691d44b37f8b6fad48a33b8e
SHA19dae759ae014cc124ab6eed7c8035788c124ae4a
SHA2569092dbb1ca1767d1966b7f79349dd95a802a68248251bf070c0f1d74d5681d71
SHA51208b868a028c1e8d29ed643416850df16f58d44668f9193b46bd3934965e5617a0a4015fc52815c5456023dbde01023450d295b76d936a936f26b602e764b0235
-
C:\Users\Admin\AppData\Roaming\HiPatch\HiPatchService.exeFilesize
266KB
MD5a3d1269bb2740b85f4d93fba6eb4cdbe
SHA18a9792062ff93024924867d075f22bbe7a54f84c
SHA256c787362a07ada43f574252d5a4d8a650f423699fd9b21e503455aa9b3760d88a
SHA5125ff77e2a305eb2bc7b09786a949c738187518e4f9dabfb94c167fa78b5bec61bc9b6348893d5db2078b01284c470121f1b890e76129ad1797d0fd64691697292
-
memory/2056-3-0x0000000074CF0000-0x00000000753DE000-memory.dmpFilesize
6.9MB
-
memory/2056-2-0x0000000000240000-0x000000000024A000-memory.dmpFilesize
40KB
-
memory/2056-0-0x0000000074CFE000-0x0000000074CFF000-memory.dmpFilesize
4KB
-
memory/2056-1-0x0000000000E70000-0x0000000000EB6000-memory.dmpFilesize
280KB
-
memory/2056-24-0x0000000074CF0000-0x00000000753DE000-memory.dmpFilesize
6.9MB
-
memory/2796-29-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2796-35-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2796-36-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2796-34-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2796-33-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2796-27-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2796-31-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2796-25-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2968-23-0x0000000074CF0000-0x00000000753DE000-memory.dmpFilesize
6.9MB
-
memory/2968-21-0x0000000000980000-0x00000000009C6000-memory.dmpFilesize
280KB
-
memory/2968-37-0x0000000074CF0000-0x00000000753DE000-memory.dmpFilesize
6.9MB