Overview
overview
10Static
static
7trojan-lea...35.exe
windows7-x64
8trojan-lea...35.exe
windows10-2004-x64
8trojan-lea...07.exe
windows7-x64
8trojan-lea...07.exe
windows10-2004-x64
AIDS_NT.exe
windows7-x64
AIDS_NT.exe
windows10-2004-x64
Abantes.exe
windows7-x64
10Abantes.exe
windows10-2004-x64
10trojan-lea...ys.exe
windows7-x64
7trojan-lea...ys.exe
windows10-2004-x64
7trojan-lea...er.exe
windows7-x64
3trojan-lea...er.exe
windows10-2004-x64
8trojan-lea...32.exe
windows7-x64
10trojan-lea...32.exe
windows10-2004-x64
10trojan-lea...32.exe
windows7-x64
trojan-lea...32.exe
windows10-2004-x64
trojan-lea...64.exe
windows7-x64
trojan-lea...64.exe
windows10-2004-x64
trojan-lea...ne.exe
windows7-x64
1trojan-lea...ne.exe
windows10-2004-x64
1trojan-lea...64.exe
windows7-x64
1trojan-lea...64.exe
windows10-2004-x64
1trojan-lea...er.exe
windows7-x64
trojan-lea...er.exe
windows10-2004-x64
trojan-lea...ks.exe
windows7-x64
1trojan-lea...ks.exe
windows10-2004-x64
trojan-lea...ix.exe
windows7-x64
6trojan-lea...ix.exe
windows10-2004-x64
6trojan-lea...V).exe
windows7-x64
10trojan-lea...V).exe
windows10-2004-x64
10trojan-lea...23.exe
windows7-x64
1trojan-lea...23.exe
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2023 19:16
Behavioral task
behavioral1
Sample
trojan-leaks-main/0.950095298700035.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
trojan-leaks-main/0.950095298700035.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
trojan-leaks-main/0x07.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
trojan-leaks-main/0x07.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
AIDS_NT.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
AIDS_NT.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Abantes.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Abantes.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
trojan-leaks-main/AjarSys.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
trojan-leaks-main/AjarSys.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
trojan-leaks-main/Antivirus_Installer.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
trojan-leaks-main/Antivirus_Installer.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
trojan-leaks-main/BUG32.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
trojan-leaks-main/BUG32.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
trojan-leaks-main/BaldiTrojan-x32.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
trojan-leaks-main/BaldiTrojan-x32.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral17
Sample
trojan-leaks-main/BaldiTrojan-x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
trojan-leaks-main/BaldiTrojan-x64.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
trojan-leaks-main/Benzene.exe
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
trojan-leaks-main/Benzene.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
trojan-leaks-main/Benzene_x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
trojan-leaks-main/Benzene_x64.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
trojan-leaks-main/CoViper.exe
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
trojan-leaks-main/CoViper.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
trojan-leaks-main/Cs_Hacks_Free_no_hacks.exe
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
trojan-leaks-main/Cs_Hacks_Free_no_hacks.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral27
Sample
trojan-leaks-main/Glodrix.exe
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
trojan-leaks-main/Glodrix.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
trojan-leaks-main/Halloware (BerkayV).exe
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
trojan-leaks-main/Halloware (BerkayV).exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
trojan-leaks-main/HorrorTrojan123.exe
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
trojan-leaks-main/HorrorTrojan123.exe
Resource
win10v2004-20230220-en
General
-
Target
Abantes.exe
-
Size
2.7MB
-
MD5
cd2e58136d3049e9be40ae29f9250c93
-
SHA1
e97beb8b87d130e5c5745981e3614ed6aa3caae3
-
SHA256
dac4b5511343cf863832e38886af8a3e1d55529648314eb02cc21fa3979f6419
-
SHA512
3ad23ad35d23acfa9edc187f443f28c4bb11279472632726f450b10cc09a653e10f4832f9cca44d063ad1259de6c7017ca6ca8f64ed07d302c3b2d06628f0ba7
-
SSDEEP
49152:yi98eUDa7+tCg3e+zNWZjUDa7+tCg3e+zNWyUDa7+tCg3e+zNWR9Bh:yAC+7+p3ej2+7+p3ejh+7+p3ejDBh
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Abantes.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe, C:\\Windows\\Defender\\Abantes.exe" Abantes.exe -
Processes:
Abantes.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Abantes.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Possible privilege escalation attempt 14 IoCs
Processes:
takeown.exeicacls.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exetakeown.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exepid process 3564 takeown.exe 4632 icacls.exe 4844 takeown.exe 3492 takeown.exe 1756 icacls.exe 4936 icacls.exe 216 icacls.exe 3552 takeown.exe 872 takeown.exe 3448 icacls.exe 228 takeown.exe 1412 icacls.exe 4848 takeown.exe 4568 icacls.exe -
Sets file execution options in registry 2 TTPs 49 IoCs
Processes:
Abantes.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WindowsAnytimeUpgradeui.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\StikyNot.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mstsc.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DVDMaker.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ehshell.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdge.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\resmon.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp64.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspaint.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspaint.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DVDMaker.exe Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xpsrchvw.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeCP.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdge.exe Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\calc.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\calc.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmplayer.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SnippingTool.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SnippingTool.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WindowsAnytimeUpgrade.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeCP.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp64.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mstsc.exe Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HelpPane.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HelpPane.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wordpad.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WindowsAnytimeUpgradeui.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WindowsAnytimeUpgrade.exe Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\StikyNot.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xpsrchvw.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wmplayer.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wordpad.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ehshell.exe Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\resmon.exe\Debugger = "C:\\Windows\\Defender\\IFEO.exe" Abantes.exe -
Modifies file permissions 1 TTPs 14 IoCs
Processes:
takeown.exeicacls.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exetakeown.exetakeown.exetakeown.exeicacls.exeicacls.exeicacls.exeicacls.exepid process 872 takeown.exe 1412 icacls.exe 1756 icacls.exe 4844 takeown.exe 3564 takeown.exe 4848 takeown.exe 216 icacls.exe 228 takeown.exe 3552 takeown.exe 3492 takeown.exe 3448 icacls.exe 4936 icacls.exe 4632 icacls.exe 4568 icacls.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
Abantes.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "C:\\Windows\\Defender\\icon.ico" Abantes.exe -
Processes:
Abantes.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Abantes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Abantes.exe -
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
Abantes.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\AutoRestartShell = "0" Abantes.exe -
Drops file in System32 directory 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\SysWOW64\en-US\authui.dll.mui cmd.exe File opened for modification C:\Windows\SysWOW64\en-US\authui.dll.mui cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
Abantes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wallpaper.bmp" Abantes.exe -
Drops file in Windows directory 17 IoCs
Processes:
Abantes.execmd.exedescription ioc process File created C:\Windows\Defender\cursor.cur Abantes.exe File created C:\Windows\Defender\IFEO.exe Abantes.exe File created C:\Windows\Defender\LogonUi.exe Abantes.exe File created C:\Windows\Defender\authui.dll.mui Abantes.exe File opened for modification C:\Windows\Defender\wallpaper.jpg Abantes.exe File created C:\Windows\Defender\Abantes.exe Abantes.exe File created C:\Windows\Defender\Action.bat Abantes.exe File created C:\Windows\Defender\LogonUIStart.exe Abantes.exe File created C:\Windows\Defender\Payloads.dll Abantes.exe File created C:\Windows\Defender\explorer.exe.mui Abantes.exe File opened for modification C:\Windows\en-US\explorer.exe.mui cmd.exe File created C:\Windows\Defender\logonOverwrite.bat Abantes.exe File created C:\Windows\Defender\icon.ico Abantes.exe File created C:\Windows\Defender\Rules.exe Abantes.exe File created C:\Windows\Defender\data.bin Abantes.exe File opened for modification C:\Windows\Defender\Abantes.exe Abantes.exe File opened for modification C:\Windows\Defender Abantes.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 3768 timeout.exe 1296 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4812 taskkill.exe -
Modifies Control Panel 16 IoCs
Processes:
Abantes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\Arrow = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\Hand = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\SizeNS = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\SizeAll = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\NWPen = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\AppStarting = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\UpArrow = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\No = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\SizeNWSE = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\SizeNESW = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\WallpaperStyle = "2" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\TileWallpaper = "0" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\Help = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Mouse\MouseTrails = "7" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\Wait = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Cursors\SizeWE = "C:\\Windows\\Defender\\cursor.cur" Abantes.exe -
Modifies registry class 2 IoCs
Processes:
Abantes.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\DefaultIcon\ = "C:\\Windows\\Defender\\icon.ico" Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "C:\\Windows\\Defender\\icon.ico" Abantes.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Abantes.exepid process 1312 Abantes.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Abantes.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 1312 Abantes.exe Token: SeTakeOwnershipPrivilege 4844 takeown.exe Token: SeTakeOwnershipPrivilege 228 takeown.exe Token: SeTakeOwnershipPrivilege 3552 takeown.exe Token: SeTakeOwnershipPrivilege 872 takeown.exe Token: SeTakeOwnershipPrivilege 3492 takeown.exe Token: SeTakeOwnershipPrivilege 4848 takeown.exe Token: SeIncreaseQuotaPrivilege 4312 WMIC.exe Token: SeSecurityPrivilege 4312 WMIC.exe Token: SeTakeOwnershipPrivilege 4312 WMIC.exe Token: SeLoadDriverPrivilege 4312 WMIC.exe Token: SeSystemProfilePrivilege 4312 WMIC.exe Token: SeSystemtimePrivilege 4312 WMIC.exe Token: SeProfSingleProcessPrivilege 4312 WMIC.exe Token: SeIncBasePriorityPrivilege 4312 WMIC.exe Token: SeCreatePagefilePrivilege 4312 WMIC.exe Token: SeBackupPrivilege 4312 WMIC.exe Token: SeRestorePrivilege 4312 WMIC.exe Token: SeShutdownPrivilege 4312 WMIC.exe Token: SeDebugPrivilege 4312 WMIC.exe Token: SeSystemEnvironmentPrivilege 4312 WMIC.exe Token: SeRemoteShutdownPrivilege 4312 WMIC.exe Token: SeUndockPrivilege 4312 WMIC.exe Token: SeManageVolumePrivilege 4312 WMIC.exe Token: 33 4312 WMIC.exe Token: 34 4312 WMIC.exe Token: 35 4312 WMIC.exe Token: 36 4312 WMIC.exe Token: SeIncreaseQuotaPrivilege 4312 WMIC.exe Token: SeSecurityPrivilege 4312 WMIC.exe Token: SeTakeOwnershipPrivilege 4312 WMIC.exe Token: SeLoadDriverPrivilege 4312 WMIC.exe Token: SeSystemProfilePrivilege 4312 WMIC.exe Token: SeSystemtimePrivilege 4312 WMIC.exe Token: SeProfSingleProcessPrivilege 4312 WMIC.exe Token: SeIncBasePriorityPrivilege 4312 WMIC.exe Token: SeCreatePagefilePrivilege 4312 WMIC.exe Token: SeBackupPrivilege 4312 WMIC.exe Token: SeRestorePrivilege 4312 WMIC.exe Token: SeShutdownPrivilege 4312 WMIC.exe Token: SeDebugPrivilege 4312 WMIC.exe Token: SeSystemEnvironmentPrivilege 4312 WMIC.exe Token: SeRemoteShutdownPrivilege 4312 WMIC.exe Token: SeUndockPrivilege 4312 WMIC.exe Token: SeManageVolumePrivilege 4312 WMIC.exe Token: 33 4312 WMIC.exe Token: 34 4312 WMIC.exe Token: 35 4312 WMIC.exe Token: 36 4312 WMIC.exe Token: SeIncreaseQuotaPrivilege 5104 WMIC.exe Token: SeSecurityPrivilege 5104 WMIC.exe Token: SeTakeOwnershipPrivilege 5104 WMIC.exe Token: SeLoadDriverPrivilege 5104 WMIC.exe Token: SeSystemProfilePrivilege 5104 WMIC.exe Token: SeSystemtimePrivilege 5104 WMIC.exe Token: SeProfSingleProcessPrivilege 5104 WMIC.exe Token: SeIncBasePriorityPrivilege 5104 WMIC.exe Token: SeCreatePagefilePrivilege 5104 WMIC.exe Token: SeBackupPrivilege 5104 WMIC.exe Token: SeRestorePrivilege 5104 WMIC.exe Token: SeShutdownPrivilege 5104 WMIC.exe Token: SeDebugPrivilege 5104 WMIC.exe Token: SeSystemEnvironmentPrivilege 5104 WMIC.exe Token: SeRemoteShutdownPrivilege 5104 WMIC.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
Abantes.execmd.exedescription pid process target process PID 1312 wrote to memory of 4296 1312 Abantes.exe cmd.exe PID 1312 wrote to memory of 4296 1312 Abantes.exe cmd.exe PID 1312 wrote to memory of 4296 1312 Abantes.exe cmd.exe PID 4296 wrote to memory of 4844 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 4844 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 4844 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 216 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 216 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 216 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 228 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 228 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 228 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 1412 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 1412 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 1412 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 3552 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 3552 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 3552 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 872 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 872 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 872 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 3492 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 3492 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 3492 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 3564 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 3564 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 3564 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 4848 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 4848 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 4848 4296 cmd.exe takeown.exe PID 4296 wrote to memory of 1756 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 1756 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 1756 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 3448 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 3448 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 3448 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 4936 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 4936 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 4936 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 4632 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 4632 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 4632 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 4568 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 4568 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 4568 4296 cmd.exe icacls.exe PID 4296 wrote to memory of 4312 4296 cmd.exe WMIC.exe PID 4296 wrote to memory of 4312 4296 cmd.exe WMIC.exe PID 4296 wrote to memory of 4312 4296 cmd.exe WMIC.exe PID 4296 wrote to memory of 5104 4296 cmd.exe WMIC.exe PID 4296 wrote to memory of 5104 4296 cmd.exe WMIC.exe PID 4296 wrote to memory of 5104 4296 cmd.exe WMIC.exe PID 4296 wrote to memory of 3720 4296 cmd.exe netsh.exe PID 4296 wrote to memory of 3720 4296 cmd.exe netsh.exe PID 4296 wrote to memory of 3720 4296 cmd.exe netsh.exe PID 4296 wrote to memory of 4812 4296 cmd.exe taskkill.exe PID 4296 wrote to memory of 4812 4296 cmd.exe taskkill.exe PID 4296 wrote to memory of 4812 4296 cmd.exe taskkill.exe PID 4296 wrote to memory of 3768 4296 cmd.exe timeout.exe PID 4296 wrote to memory of 3768 4296 cmd.exe timeout.exe PID 4296 wrote to memory of 3768 4296 cmd.exe timeout.exe PID 4296 wrote to memory of 1296 4296 cmd.exe timeout.exe PID 4296 wrote to memory of 1296 4296 cmd.exe timeout.exe PID 4296 wrote to memory of 1296 4296 cmd.exe timeout.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
Abantes.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "Welcome To Hell" Abantes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "This Computer has been Infected by the Abantes Trojan. Hope You Enjoy." Abantes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Abantes.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" Abantes.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Abantes.exe"C:\Users\Admin\AppData\Local\Temp\Abantes.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Sets file execution options in registry
- Modifies system executable filetype association
- Checks whether UAC is enabled
- Modifies WinLogon
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\Defender\Action.bat""2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\takeown.exetakeown /f logonui.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\SysWOW64\icacls.exeicacls logonui.exe /granted Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:216
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\en-US" /r /d y3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\en-US" /granted Admin:F /T /C3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1412
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f explorer.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f regedit.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f HelpPane.exe3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\Temp" /r /d y3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3564
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\en-US" /r /d y3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Temp" /granted Admin:F /T /C3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1756
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\en-US" /granted Admin:F /T /C3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3448
-
-
C:\Windows\SysWOW64\icacls.exeicacls regedit.exe /granted Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4936
-
-
C:\Windows\SysWOW64\icacls.exeicacls explorer.exe /granted Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4632
-
-
C:\Windows\SysWOW64\icacls.exeicacls HelpPane.exe /granted Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4568
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic useraccount where name='Admin' set FullName='Abantes Was Here'3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic useraccount where name='Admin' rename 'Abantes Was Here'3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Windows\SysWOW64\netsh.exeNetSh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:3720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
PID:4812
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT 13⤵
- Delays execution with timeout.exe
PID:3768
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT 23⤵
- Delays execution with timeout.exe
PID:1296
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58b3585b4f84496c306b6c082ea6e52ef
SHA104bf1cf0f68a571e746fb7c863f71fa70e0e79d3
SHA256d06d5f8501501af5677b133ff7aa531ccf1bf9b2673a1f26117f0420532b599e
SHA512733bb98473fc8b3c8f0f96ff5ccec9212c36f7162742ee124d6a0edd0186e171ec61de97a3268663812802c90d29cd1e5077af72e02f550d94d67ebe106c0591
-
Filesize
21KB
MD5a3a8fb6325f2f4fd31039775be19a9a4
SHA1dba1acba938c8720b23b992ef77f130b6dbe7428
SHA2566baf83c2c45f0e3a1a1dedc799cce6adb766dabe25baa847f9dd308aae0218eb
SHA5129a03528d3b1a6a0bc3fbce6149d1cf6e21fe629c53d1b93954e6147cdfbf95eb272e75dbf906e38a1981706e71f679fda680cdf8601491ba792576c9b54d043e
-
Filesize
15KB
MD539f1a6a8b713fcf30afc03ea3c936f85
SHA19209b25730c7896e047e5a4fc1da73c294e55c0e
SHA256b69b61675531060d350a795a53568ccf19a146060cebb659ebc658a0e8b27fc9
SHA51282b402b1c94fb8444e9d32f10becad994715667fc36d427faf6ae4f433c8e7025c3ca387e6cae7fb4e14f2e9f36446354c1c2585445fd79e7673b78419232780