Resubmissions
28/11/2022, 09:53
221128-lwp4eaea33 1017/11/2022, 04:28
221117-e328zsdf69 1007/11/2022, 10:35
221107-mm272secgj 10Analysis
-
max time kernel
66s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 10:35
Behavioral task
behavioral1
Sample
update.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
update.exe
Resource
win10-20220812-en
General
-
Target
update.exe
-
Size
60.2MB
-
MD5
b77955061c0f46de8059c20128ebb156
-
SHA1
bd9ba700caec09387bfcf97bd9cc0a2e846836ca
-
SHA256
ca94c8bbbb10febb8187f8c709affaa91911f646cf0ac99e857bf45b3a709091
-
SHA512
83f07b66be1138e5f3f1c1f2504d3222bcc1bb1c1626a98e2346408cde7c771a64a998fa38c23ac66097f0b610f70c6309ea914e0c9c95ecff588a385aeb69aa
-
SSDEEP
1572864:DdjkMwgaV4gRNzu1zCcFA4o/UDDvX94UKfytNxZhDa:FJGuMzuHnXDKfeN5Da
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" update.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" update.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ update.exe -
Blocks application from running via registry modification 27 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\21 = "PANDAFREEAV.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "Cube.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "AV_br.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\23 = "drweb-12.0-ss-win.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "eav_trial_rus.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "eis_trial_rus.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "essf_trial_rus.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "ESETOnlineScanner_RUS.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\19 = "eset_nod32_antivirus_live_installer.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\24 = "Cureit.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "hitmanpro_x64.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "AVbr.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\18 = "esetonlinescanner.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KVRT.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\16 = "FRST64.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\20 = "MBSetup.exe" update.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "Cezurity_Scanner_Pro_Free.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\22 = "bitdefender_avfree.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "HitmanPro.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "360TS_Setup_Mini.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\17 = "eset_internet_security_live_installer.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\25 = "TDSSKiller.exe" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "avast_free_antivirus_setup_online.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "cureit.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "ESETOnlineScanner_UKR.exe" update.exe -
Modifies Windows Firewall 1 TTPs 7 IoCs
pid Process 1164 netsh.exe 776 netsh.exe 1104 netsh.exe 1356 netsh.exe 684 netsh.exe 1108 netsh.exe 1304 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion update.exe -
Modifies file permissions 1 TTPs 16 IoCs
pid Process 464 icacls.exe 2228 icacls.exe 2268 icacls.exe 2200 icacls.exe 2012 icacls.exe 1548 icacls.exe 904 icacls.exe 2244 icacls.exe 1764 icacls.exe 2256 icacls.exe 2300 icacls.exe 2460 icacls.exe 2056 icacls.exe 2352 icacls.exe 2216 icacls.exe 2524 icacls.exe -
resource yara_rule behavioral1/memory/844-55-0x000000013F1D0000-0x0000000143493000-memory.dmp themida behavioral1/memory/844-57-0x000000013F1D0000-0x0000000143493000-memory.dmp themida behavioral1/memory/844-58-0x000000013F1D0000-0x0000000143493000-memory.dmp themida behavioral1/memory/844-59-0x000000013F1D0000-0x0000000143493000-memory.dmp themida behavioral1/memory/844-60-0x000000013F1D0000-0x0000000143493000-memory.dmp themida behavioral1/memory/844-61-0x000000013F1D0000-0x0000000143493000-memory.dmp themida behavioral1/memory/844-62-0x000000013F1D0000-0x0000000143493000-memory.dmp themida behavioral1/memory/844-63-0x000000013F1D0000-0x0000000143493000-memory.dmp themida behavioral1/memory/844-64-0x000000013F1D0000-0x0000000143493000-memory.dmp themida behavioral1/memory/844-65-0x000000013F1D0000-0x0000000143493000-memory.dmp themida behavioral1/files/0x000c00000001231e-94.dat themida behavioral1/files/0x000c00000001231e-96.dat themida behavioral1/files/0x000800000001232f-98.dat themida behavioral1/files/0x000800000001232f-100.dat themida behavioral1/files/0x000c00000001231e-102.dat themida behavioral1/memory/1664-103-0x000000013F710000-0x00000001402D8000-memory.dmp themida behavioral1/memory/1664-105-0x000000013F710000-0x00000001402D8000-memory.dmp themida behavioral1/memory/1664-106-0x000000013F710000-0x00000001402D8000-memory.dmp themida behavioral1/memory/1664-107-0x000000013F710000-0x00000001402D8000-memory.dmp themida behavioral1/memory/832-109-0x000000013F2F0000-0x0000000142612000-memory.dmp themida behavioral1/memory/1664-108-0x000000013F710000-0x00000001402D8000-memory.dmp themida behavioral1/memory/1664-110-0x000000013F710000-0x00000001402D8000-memory.dmp themida behavioral1/memory/1664-111-0x000000013F710000-0x00000001402D8000-memory.dmp themida behavioral1/memory/1664-112-0x000000013F710000-0x00000001402D8000-memory.dmp themida behavioral1/memory/1664-113-0x000000013F710000-0x00000001402D8000-memory.dmp themida behavioral1/files/0x000800000001232f-114.dat themida behavioral1/memory/832-116-0x000000013F2F0000-0x0000000142612000-memory.dmp themida behavioral1/memory/832-117-0x000000013F2F0000-0x0000000142612000-memory.dmp themida behavioral1/memory/832-118-0x000000013F2F0000-0x0000000142612000-memory.dmp themida behavioral1/memory/832-119-0x000000013F2F0000-0x0000000142612000-memory.dmp themida behavioral1/memory/832-120-0x000000013F2F0000-0x0000000142612000-memory.dmp themida behavioral1/memory/832-121-0x000000013F2F0000-0x0000000142612000-memory.dmp themida behavioral1/memory/832-122-0x000000013F2F0000-0x0000000142612000-memory.dmp themida behavioral1/memory/832-123-0x000000013F2F0000-0x0000000142612000-memory.dmp themida behavioral1/memory/1664-124-0x000000013F710000-0x00000001402D8000-memory.dmp themida behavioral1/memory/832-126-0x000000013F2F0000-0x0000000142612000-memory.dmp themida behavioral1/files/0x000c00000001231e-159.dat themida behavioral1/files/0x000800000001232f-163.dat themida behavioral1/files/0x000800000001232f-162.dat themida behavioral1/files/0x000c00000001231e-160.dat themida -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio = "C:\\ProgramData\\RealtekHD\\taskhost.exe" update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Plex Media Server = "C:\\ProgramData\\Windows Tasks Service\\winserv.exe" update.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" update.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Modifies WinLogon 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts update.exe -
AutoIT Executable 24 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/844-58-0x000000013F1D0000-0x0000000143493000-memory.dmp autoit_exe behavioral1/memory/844-59-0x000000013F1D0000-0x0000000143493000-memory.dmp autoit_exe behavioral1/memory/844-60-0x000000013F1D0000-0x0000000143493000-memory.dmp autoit_exe behavioral1/memory/844-61-0x000000013F1D0000-0x0000000143493000-memory.dmp autoit_exe behavioral1/memory/844-62-0x000000013F1D0000-0x0000000143493000-memory.dmp autoit_exe behavioral1/memory/844-63-0x000000013F1D0000-0x0000000143493000-memory.dmp autoit_exe behavioral1/memory/844-64-0x000000013F1D0000-0x0000000143493000-memory.dmp autoit_exe behavioral1/memory/844-65-0x000000013F1D0000-0x0000000143493000-memory.dmp autoit_exe behavioral1/memory/1664-106-0x000000013F710000-0x00000001402D8000-memory.dmp autoit_exe behavioral1/memory/1664-107-0x000000013F710000-0x00000001402D8000-memory.dmp autoit_exe behavioral1/memory/1664-108-0x000000013F710000-0x00000001402D8000-memory.dmp autoit_exe behavioral1/memory/1664-110-0x000000013F710000-0x00000001402D8000-memory.dmp autoit_exe behavioral1/memory/1664-111-0x000000013F710000-0x00000001402D8000-memory.dmp autoit_exe behavioral1/memory/1664-112-0x000000013F710000-0x00000001402D8000-memory.dmp autoit_exe behavioral1/memory/1664-113-0x000000013F710000-0x00000001402D8000-memory.dmp autoit_exe behavioral1/memory/832-117-0x000000013F2F0000-0x0000000142612000-memory.dmp autoit_exe behavioral1/memory/832-118-0x000000013F2F0000-0x0000000142612000-memory.dmp autoit_exe behavioral1/memory/832-119-0x000000013F2F0000-0x0000000142612000-memory.dmp autoit_exe behavioral1/memory/832-120-0x000000013F2F0000-0x0000000142612000-memory.dmp autoit_exe behavioral1/memory/832-121-0x000000013F2F0000-0x0000000142612000-memory.dmp autoit_exe behavioral1/memory/832-122-0x000000013F2F0000-0x0000000142612000-memory.dmp autoit_exe behavioral1/memory/832-123-0x000000013F2F0000-0x0000000142612000-memory.dmp autoit_exe behavioral1/memory/1664-124-0x000000013F710000-0x00000001402D8000-memory.dmp autoit_exe behavioral1/memory/832-126-0x000000013F2F0000-0x0000000142612000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 844 update.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 280 sc.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 844 update.exe 844 update.exe 844 update.exe 844 update.exe 844 update.exe 844 update.exe 844 update.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 844 wrote to memory of 1500 844 update.exe 29 PID 844 wrote to memory of 1500 844 update.exe 29 PID 844 wrote to memory of 1500 844 update.exe 29 PID 1500 wrote to memory of 280 1500 cmd.exe 30 PID 1500 wrote to memory of 280 1500 cmd.exe 30 PID 1500 wrote to memory of 280 1500 cmd.exe 30 PID 844 wrote to memory of 1288 844 update.exe 36 PID 844 wrote to memory of 1288 844 update.exe 36 PID 844 wrote to memory of 1288 844 update.exe 36 PID 844 wrote to memory of 1368 844 update.exe 35 PID 844 wrote to memory of 1368 844 update.exe 35 PID 844 wrote to memory of 1368 844 update.exe 35 PID 1288 wrote to memory of 1164 1288 cmd.exe 33 PID 1288 wrote to memory of 1164 1288 cmd.exe 33 PID 1288 wrote to memory of 1164 1288 cmd.exe 33 PID 1368 wrote to memory of 1304 1368 cmd.exe 32 PID 1368 wrote to memory of 1304 1368 cmd.exe 32 PID 1368 wrote to memory of 1304 1368 cmd.exe 32 PID 844 wrote to memory of 976 844 update.exe 39 PID 844 wrote to memory of 976 844 update.exe 39 PID 844 wrote to memory of 976 844 update.exe 39 PID 976 wrote to memory of 776 976 cmd.exe 38 PID 976 wrote to memory of 776 976 cmd.exe 38 PID 976 wrote to memory of 776 976 cmd.exe 38 PID 844 wrote to memory of 1748 844 update.exe 40 PID 844 wrote to memory of 1748 844 update.exe 40 PID 844 wrote to memory of 1748 844 update.exe 40 PID 1748 wrote to memory of 1104 1748 cmd.exe 41 PID 1748 wrote to memory of 1104 1748 cmd.exe 41 PID 1748 wrote to memory of 1104 1748 cmd.exe 41 PID 844 wrote to memory of 388 844 update.exe 45 PID 844 wrote to memory of 388 844 update.exe 45 PID 844 wrote to memory of 388 844 update.exe 45 PID 388 wrote to memory of 1356 388 cmd.exe 44 PID 388 wrote to memory of 1356 388 cmd.exe 44 PID 388 wrote to memory of 1356 388 cmd.exe 44 PID 844 wrote to memory of 556 844 update.exe 46 PID 844 wrote to memory of 556 844 update.exe 46 PID 844 wrote to memory of 556 844 update.exe 46 PID 556 wrote to memory of 684 556 cmd.exe 48 PID 556 wrote to memory of 684 556 cmd.exe 48 PID 556 wrote to memory of 684 556 cmd.exe 48 PID 844 wrote to memory of 672 844 update.exe 50 PID 844 wrote to memory of 672 844 update.exe 50 PID 844 wrote to memory of 672 844 update.exe 50 PID 672 wrote to memory of 1108 672 cmd.exe 51 PID 672 wrote to memory of 1108 672 cmd.exe 51 PID 672 wrote to memory of 1108 672 cmd.exe 51 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" update.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\update.exe"C:\Users\Admin\AppData\Local\Temp\update.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocks application from running via registry modification
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies WinLogon
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:844 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete swprv2⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\system32\sc.exesc delete swprv3⤵
- Launches sc.exe
PID:280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AppModule" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes2⤵
- Suspicious use of WriteProcessMemory
PID:1368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set allprofiles state on2⤵
- Suspicious use of WriteProcessMemory
PID:1288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AMD" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes2⤵
- Suspicious use of WriteProcessMemory
PID:976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN2⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN3⤵
- Modifies Windows Firewall
PID:1104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN2⤵
- Suspicious use of WriteProcessMemory
PID:388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN2⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN3⤵
- Modifies Windows Firewall
PID:684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN2⤵
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN3⤵
- Modifies Windows Firewall
PID:1108
-
-
-
C:\ProgramData\Setup\Game.exeC:\ProgramData\Setup\Game.exe -pnaxui2⤵PID:1596
-
C:\ProgramData\RealtekHD\GameGuard.exe"C:\ProgramData\RealtekHD\GameGuard.exe"3⤵PID:1664
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny Администраторы:(OI)(CI)(F)4⤵PID:1772
-
C:\Windows\system32\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny Администраторы:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)4⤵PID:1020
-
C:\Windows\system32\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny Администраторы:(OI)(CI)(F)4⤵PID:1636
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny Администраторы:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)4⤵PID:1956
-
C:\Windows\system32\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny Администраторы:(OI)(CI)(F)4⤵PID:1044
-
C:\Windows\system32\icacls.exeicacls C:\Windows\speechstracing /deny Администраторы:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny Администраторы:(F)4⤵PID:1012
-
C:\Windows\system32\icacls.exeicacls c:\programdata\Malwarebytes /deny Администраторы:(F)5⤵
- Modifies file permissions
PID:1548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)4⤵PID:1332
-
C:\Windows\system32\icacls.exeicacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2256
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny System:(F)4⤵PID:836
-
C:\Windows\system32\icacls.exeicacls c:\programdata\Malwarebytes /deny System:(F)5⤵
- Modifies file permissions
PID:2268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny Администраторы:(F)4⤵PID:588
-
C:\Windows\system32\icacls.exeicacls C:\Programdata\MB3Install /deny Администраторы:(F)5⤵
- Modifies file permissions
PID:2244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny System:(F)4⤵PID:388
-
C:\Windows\system32\icacls.exeicacls C:\Programdata\MB3Install /deny System:(F)5⤵
- Modifies file permissions
PID:2200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)4⤵PID:1660
-
C:\Windows\system32\icacls.exeicacls C:\Programdata\Indus /deny System:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny Администраторы:(OI)(CI)(F)4⤵PID:1860
-
C:\Windows\system32\icacls.exeicacls C:\Programdata\Indus /deny Администраторы:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\AdwCleaner /deny Администраторы:(OI)(CI)(F)4⤵PID:1396
-
C:\Windows\system32\icacls.exeicacls C:\AdwCleaner /deny Администраторы:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:1764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ByteFence" /deny Администраторы:(OI)(CI)(F)4⤵PID:2092
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\ByteFence" /deny Администраторы:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny Администраторы:(OI)(CI)(F)4⤵PID:2432
-
C:\Windows\system32\icacls.exeicacls C:\KVRT_Data /deny Администраторы:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)4⤵PID:2492
-
C:\Windows\system32\icacls.exeicacls C:\KVRT_Data /deny system:(OI)(CI)(F)5⤵
- Modifies file permissions
PID:2524
-
-
-
-
C:\ProgramData\RealtekHD\taskhost.exe"C:\ProgramData\RealtekHD\taskhost.exe"3⤵PID:832
-
-
-
C:\ProgramData\Setup\svchost.exeC:/ProgramData/Setup/svchost.exe -pnaxui2⤵PID:2288
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="AppModule" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:1304
-
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state on1⤵
- Modifies Windows Firewall
PID:1164
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="AMD" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:776
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN1⤵
- Modifies Windows Firewall
PID:1356
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:2280
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
2File and Directory Permissions Modification
1Impair Defenses
1Modify Registry
5Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD532198d6a8e26f4e103885fc4eef3c2d7
SHA1f35a0abab275eececc6410f69c5d041d14f3684e
SHA256fc110064f6cee1dfb6793283a7bf1964347b1e6b29a0db8efc70dd77c15c85a1
SHA512d25eaad411040c4b3dc8892594c717d820a0e2dc2bc10d68217a52351764691c8e1e17bc55c1e67fe550e3ffde1e01ab60e6dae8f75b5e1c182733bbc950485e
-
Filesize
5.0MB
MD532198d6a8e26f4e103885fc4eef3c2d7
SHA1f35a0abab275eececc6410f69c5d041d14f3684e
SHA256fc110064f6cee1dfb6793283a7bf1964347b1e6b29a0db8efc70dd77c15c85a1
SHA512d25eaad411040c4b3dc8892594c717d820a0e2dc2bc10d68217a52351764691c8e1e17bc55c1e67fe550e3ffde1e01ab60e6dae8f75b5e1c182733bbc950485e
-
Filesize
26.9MB
MD5cc9e9d0f8d112e9b934cbd0b91138c18
SHA1fcf04eb677a9e69f914f9950670472aef5c395a0
SHA256f6243dc3ec9e29664ff68b89cec1a0fbdec028263535a68b73b8a2b0c8658208
SHA512d299eabbd7c92d454115aa9fb6f8543c819084c94ec56929ce8aea4d55ca327b1ce6a085466a5d61d6ded1694b1244677b29990d3544396f039e2184f5613f1c
-
Filesize
24.0MB
MD5454e3d0f0e453781f79da2ae4753badf
SHA109ed752f8dde2b04eec6291ed128e0902d897995
SHA256af7189df065284cacc983ce3107be3505db6ef4f8a3b40e1bf3195c8d0e8b797
SHA512847a80487f5d5041d64968e2376c06c211272a6aa9942378356af99ee731ae38547bfcccd552d263920db263125a191256bce0563eb7386c33787581b72aa359
-
Filesize
30.5MB
MD5d2dfa8f06c7b00770ef14c4378ced6f5
SHA1b8b5bc2f0139d45195bd91101228a4b9f1e4def8
SHA256551fd29693d6d8dc43019a9b68218c72db86858075864ffda951143b22e8cb19
SHA51224d4b669132035d1d8948659a2a872c638ae968f4e3e1ec94da966cd332cf5bbada741bee2d72895304d8c8415096295756cf95b37a4a3c61a692373e13ea2af
-
Filesize
33.5MB
MD5df2fcff88365ac7c8a61a49d904b2264
SHA13a8d976d2733f1b69c60e2c1cf6def54eaf625b3
SHA25602a748f1413b71df2e84ffe35cbe253772f0157e43e4effc8bcc6b63057edb97
SHA5126747aab5b3a507fc1ca68e8e853e8b1442a7f1da9d7970c6cdfcbb07d48a4d635e927ace8db048eda54a2883c4ba5e198360d1bc1b4f1ce1480275f70e57c7c9
-
Filesize
4.6MB
MD5800d018de27bd9b586e22fc0230cdfc5
SHA16b1d60a4ce8b566b5f1835814b913ccc532d949b
SHA256182b75f3d2c1857ddf6e56eaf1bee6d00392cfb80ddfdb0164597643c5ea4958
SHA512a214265c023abf7deb7a78fef0c9efc8379dbaa8797d5207450d422c1d0ebe73c218ac67b36e4a59bd1755e989b09dbf5c338093265a122c25a3eba20c3fab13
-
Filesize
2.8MB
MD51575a2a17f54b20cf1c547e250c5e01d
SHA1f578879e948812b6a98a62f5da44950eb65a335e
SHA256d00991a761ef77c5ba0d59fc754cd971e3e9277d6e29da523477d1fb6ba345eb
SHA5125275836b39c471f533a0ae5899312b3572a994cd61f37ae7416604749ea4f3671db3f5f1e1f92d83303d8c4ef73717306899eafc8059bf1ae858f03d3dcc4d04
-
Filesize
2.9MB
MD5d5e2f38c79e9c2d6c8732fed4f9c656a
SHA14403df12e757e68f83eb2c2f74ffd45030d9e6c3
SHA256e17117efb032f43e0f9872f582b2b72c1d0451d5366272a891e9bee7c689ff38
SHA51222cabfb3034b251018a237fd491b6fd372ba90487ec0bba82743fea62efdade414b26b061d404bccbbc72c4d477692c61adf9a40bd7732b31a7000eedcb7015a
-
Filesize
2.9MB
MD5d5e2f38c79e9c2d6c8732fed4f9c656a
SHA14403df12e757e68f83eb2c2f74ffd45030d9e6c3
SHA256e17117efb032f43e0f9872f582b2b72c1d0451d5366272a891e9bee7c689ff38
SHA51222cabfb3034b251018a237fd491b6fd372ba90487ec0bba82743fea62efdade414b26b061d404bccbbc72c4d477692c61adf9a40bd7732b31a7000eedcb7015a
-
Filesize
5.0MB
MD532198d6a8e26f4e103885fc4eef3c2d7
SHA1f35a0abab275eececc6410f69c5d041d14f3684e
SHA256fc110064f6cee1dfb6793283a7bf1964347b1e6b29a0db8efc70dd77c15c85a1
SHA512d25eaad411040c4b3dc8892594c717d820a0e2dc2bc10d68217a52351764691c8e1e17bc55c1e67fe550e3ffde1e01ab60e6dae8f75b5e1c182733bbc950485e
-
Filesize
2.9MB
MD5989c3c66d674b29ac223e4dd69f94f24
SHA1e458aeba23d53984190094987e26b12a6d76c69b
SHA2565799e0187ca12f0e6634e386827acda318e061a604f54e4d65607552da287ef2
SHA512be0d28459890a5b9004288beb07ad68f54d937f7a3e0adbf06a0949e22116fa073fd6a1099c95e2dd558e242e7a6b9560dc9d03eadecbc837e4ebeb6cf31159e
-
Filesize
2.8MB
MD5e13071d1395da5f71baff63ab77b09d8
SHA1c71b6c75f967b1d12da5118c6c0ddd4bc7f6f19c
SHA256c72177d5ded891a844f386102a9af0f4f10879372897318d8086deb042eaafb4
SHA512f1b04a9b9df1e77eea16023724b10d02377679b6cb1fa93701527bc3f215f0f7f047de8a08f323618ccdb4cf4c498130500c7ea500d9f9a326cdb8e2bfae0e2c
-
Filesize
28.0MB
MD5e663f5fb810d74ce1e9fdb5ea06646c8
SHA111eab6d6f59aaf7c37f565f5b464e40060371bbf
SHA25606b1184172989841e74d17880a2466cb8469665102916bcd3373ac50cd7e3c66
SHA512771cdca722d3ac5e53316be18b327540dfd3c4217141c38cad29448f707a4a88500075791c3b0e35a3123ef6b24ac793f71ab2c7e4512f29e41383f7e8ded454