Overview
overview
10Static
static
27猫资源论坛.url
windows7-x64
127猫资源论坛.url
windows10-2004-x64
1StopUpdate...rd.exe
windows7-x64
1StopUpdate...rd.exe
windows10-2004-x64
1StopUpdate...10.exe
windows7-x64
1StopUpdate...10.exe
windows10-2004-x64
1StopUpdate...up.bat
windows7-x64
1StopUpdate...up.bat
windows10-2004-x64
1StopUpdate...rd.bat
windows7-x64
8StopUpdate...rd.bat
windows10-2004-x64
8StopUpdate...ll.bat
windows7-x64
10StopUpdate...ll.bat
windows10-2004-x64
10StopUpdate...wu.exe
windows7-x64
1StopUpdate...wu.exe
windows10-2004-x64
1Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 05:27
Static task
static1
Behavioral task
behavioral1
Sample
27猫资源论坛.url
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
27猫资源论坛.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/SU10Guard.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/SU10Guard.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/StopUpdates10.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/StopUpdates10.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/stop-gwx-from-startup.bat
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/stop-gwx-from-startup.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/uninstall-guard.bat
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/uninstall-guard.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/uninstall.bat
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/uninstall.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/wu.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/wu.exe
Resource
win10v2004-20220812-en
General
-
Target
StopUpdates10 Win10Զ¹رչ_v3.1.101 Я/stop-gwx-from-startup.bat
-
Size
1KB
-
MD5
4b724372b80e66b4f7747aa7a4dd82fa
-
SHA1
74a7972fb13bb80530fde331bc0de6df18405834
-
SHA256
9580a95c5cd25d960232af7c8042c0c89aeddfb2a7db009f9080241190f8bccd
-
SHA512
caf6c95820094a9b600fbed64d53179ebf6b397301b060d6731b6de922c59ef3e9e3bacfce771cdc4fd5a0a33332a69eedb099edbe3daaf6b185af7d88221c45
Malware Config
Signatures
-
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 880 taskkill.exe 1904 taskkill.exe 968 taskkill.exe 1444 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 968 taskkill.exe Token: SeDebugPrivilege 1444 taskkill.exe Token: SeDebugPrivilege 880 taskkill.exe Token: SeDebugPrivilege 1904 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exedescription pid process target process PID 1064 wrote to memory of 968 1064 cmd.exe taskkill.exe PID 1064 wrote to memory of 968 1064 cmd.exe taskkill.exe PID 1064 wrote to memory of 968 1064 cmd.exe taskkill.exe PID 1064 wrote to memory of 1444 1064 cmd.exe taskkill.exe PID 1064 wrote to memory of 1444 1064 cmd.exe taskkill.exe PID 1064 wrote to memory of 1444 1064 cmd.exe taskkill.exe PID 1064 wrote to memory of 516 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 516 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 516 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1760 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1760 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1760 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1556 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1556 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1556 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1240 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1240 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1240 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1528 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1528 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1528 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 592 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 592 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 592 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1180 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1180 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1180 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1952 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1952 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1952 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1396 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1396 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1396 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1688 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1688 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1688 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 280 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 280 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 280 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1752 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1752 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1752 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 2032 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 2032 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 2032 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1368 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1368 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1368 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 2020 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 2020 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 2020 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1764 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1764 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1764 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 732 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 732 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 732 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1720 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1720 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1720 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1808 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1808 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1808 1064 cmd.exe schtasks.exe PID 1064 wrote to memory of 1924 1064 cmd.exe schtasks.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\StopUpdates10 Win10Զ¹رչ_v3.1.101 Я\stop-gwx-from-startup.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /IM gwxdetector.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM gwx.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks /end /tn "microsoft\windows\setup\gwx\launchtrayprocess"2⤵
-
C:\Windows\system32\schtasks.exeschtasks /end /tn "microsoft\windows\setup\gwx\refreshgwxconfig"2⤵
-
C:\Windows\system32\schtasks.exeschtasks /end /tn "microsoft\windows\setup\gwx\refreshgwxcontent"2⤵
-
C:\Windows\system32\schtasks.exeschtasks /end /tn "microsoft\windows\setup\gwx\runappraiser"2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\gwx\launchtrayprocess" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\gwx\refreshgwxconfig" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\gwx\refreshgwxcontent" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\gwx\refreshgwxconfigandcontent" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\gwx\runappraiser" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /end /tn "microsoft\windows\setup\GWXTriggers\Logon"2⤵
-
C:\Windows\system32\schtasks.exeschtasks /end /tn "microsoft\windows\setup\GWXTriggers\OutOfIdle"2⤵
-
C:\Windows\system32\schtasks.exeschtasks /end /tn "microsoft\windows\setup\GWXTriggers\refreshgwxconfig-B"2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\GWXTriggers\Logon" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\GWXTriggers\OutOfIdle" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\GWXTriggers\refreshgwxconfig-B" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\GWXTriggers\Logon-5d" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\GWXTriggers\MachineUnlock-5d" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\GWXTriggers\OutOfIdle-5d" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\GWXTriggers\OutOfSleep-5d" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\GWXTriggers\Time-5d" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\GWXTriggers\ScheduleUpgradeReminderTime" /DISABLE2⤵
-
C:\Windows\system32\schtasks.exeschtasks /change /tn "microsoft\windows\setup\GWXTriggers\ScheduleUpgradeTime" /DISABLE2⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /IM gwxdetector.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /IM gwx.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/280-66-0x0000000000000000-mapping.dmp
-
memory/516-56-0x0000000000000000-mapping.dmp
-
memory/592-61-0x0000000000000000-mapping.dmp
-
memory/732-72-0x0000000000000000-mapping.dmp
-
memory/880-78-0x0000000000000000-mapping.dmp
-
memory/968-54-0x0000000000000000-mapping.dmp
-
memory/1180-62-0x0000000000000000-mapping.dmp
-
memory/1240-59-0x0000000000000000-mapping.dmp
-
memory/1368-69-0x0000000000000000-mapping.dmp
-
memory/1396-64-0x0000000000000000-mapping.dmp
-
memory/1444-55-0x0000000000000000-mapping.dmp
-
memory/1528-60-0x0000000000000000-mapping.dmp
-
memory/1556-58-0x0000000000000000-mapping.dmp
-
memory/1688-65-0x0000000000000000-mapping.dmp
-
memory/1720-73-0x0000000000000000-mapping.dmp
-
memory/1752-67-0x0000000000000000-mapping.dmp
-
memory/1760-57-0x0000000000000000-mapping.dmp
-
memory/1764-71-0x0000000000000000-mapping.dmp
-
memory/1808-74-0x0000000000000000-mapping.dmp
-
memory/1904-79-0x0000000000000000-mapping.dmp
-
memory/1924-75-0x0000000000000000-mapping.dmp
-
memory/1940-76-0x0000000000000000-mapping.dmp
-
memory/1952-63-0x0000000000000000-mapping.dmp
-
memory/2000-77-0x0000000000000000-mapping.dmp
-
memory/2020-70-0x0000000000000000-mapping.dmp
-
memory/2032-68-0x0000000000000000-mapping.dmp