Overview
overview
8Static
static
3UDWoof 2.1...01.zip
windows7-x64
1UDWoof 2.1...01.zip
windows10-2004-x64
1UDWoof 2.1...s).bat
windows7-x64
8UDWoof 2.1...s).bat
windows10-2004-x64
8UDWoof 2.1...E).txt
windows7-x64
1UDWoof 2.1...E).txt
windows10-2004-x64
1UDWoof 2.1...er.exe
windows7-x64
UDWoof 2.1...er.exe
windows10-2004-x64
Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 16:26
Static task
static1
Behavioral task
behavioral1
Sample
UDWoof 2.1.1-20230605T162318Z-001.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
UDWoof 2.1.1-20230605T162318Z-001.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
UDWoof 2.1.1/DeepClean (dels some files).bat
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
UDWoof 2.1.1/DeepClean (dels some files).bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
UDWoof 2.1.1/TUTORIAL (README).txt
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
UDWoof 2.1.1/TUTORIAL (README).txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
UDWoof 2.1.1/hwid_spoofer.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
UDWoof 2.1.1/hwid_spoofer.exe
Resource
win10v2004-20230220-en
General
-
Target
UDWoof 2.1.1/DeepClean (dels some files).bat
-
Size
902KB
-
MD5
602ac0bd731b2615933dde1442e96ff7
-
SHA1
586be9b5bb086aa301eea7df5ee998390756b912
-
SHA256
97c781dfaa813232a8d13f7dcdfd1490f355ab85823b2cd73b9dd259d3a1ad07
-
SHA512
d5cee12b3c99cae442808c463636faa0f96cdae24d6caff13fd5e27a40f74ce58cd15f43430d5ebd15d968588d491dee17bb31b3f7c19ed7d55e2882a25d30eb
-
SSDEEP
3072:kOW9mafKzoz3g8gzRnvplYSc5mzozEzoz6zozn:5ykyuykyn
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4072 sc.exe -
Kills process with taskkill 40 IoCs
pid Process 4736 taskkill.exe 1836 taskkill.exe 1892 taskkill.exe 3384 taskkill.exe 2552 taskkill.exe 1880 taskkill.exe 3812 taskkill.exe 2416 taskkill.exe 2816 taskkill.exe 4324 taskkill.exe 636 taskkill.exe 4248 taskkill.exe 4316 taskkill.exe 1972 taskkill.exe 4668 taskkill.exe 780 taskkill.exe 4364 taskkill.exe 4428 taskkill.exe 2376 taskkill.exe 536 taskkill.exe 2092 taskkill.exe 4568 taskkill.exe 676 taskkill.exe 2928 taskkill.exe 4000 taskkill.exe 908 taskkill.exe 2596 taskkill.exe 1548 taskkill.exe 1048 taskkill.exe 4872 taskkill.exe 1060 taskkill.exe 1628 taskkill.exe 2024 taskkill.exe 1684 taskkill.exe 692 taskkill.exe 1320 taskkill.exe 3832 taskkill.exe 3456 taskkill.exe 3084 taskkill.exe 4344 taskkill.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3756 reg.exe 2828 reg.exe 1488 reg.exe 3640 reg.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeDebugPrivilege 780 taskkill.exe Token: SeDebugPrivilege 636 taskkill.exe Token: SeDebugPrivilege 4248 taskkill.exe Token: SeDebugPrivilege 2928 taskkill.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 1320 taskkill.exe Token: SeDebugPrivilege 4364 taskkill.exe Token: SeDebugPrivilege 4316 taskkill.exe Token: SeDebugPrivilege 4344 taskkill.exe Token: SeDebugPrivilege 4324 taskkill.exe Token: SeDebugPrivilege 4000 taskkill.exe Token: SeDebugPrivilege 4428 taskkill.exe Token: SeDebugPrivilege 1892 taskkill.exe Token: SeDebugPrivilege 4872 taskkill.exe Token: SeDebugPrivilege 2376 taskkill.exe Token: SeDebugPrivilege 3832 taskkill.exe Token: SeDebugPrivilege 3384 taskkill.exe Token: SeDebugPrivilege 1060 taskkill.exe Token: SeDebugPrivilege 1836 taskkill.exe Token: SeDebugPrivilege 1048 taskkill.exe Token: SeDebugPrivilege 3456 taskkill.exe Token: SeDebugPrivilege 908 taskkill.exe Token: SeDebugPrivilege 3084 taskkill.exe Token: SeDebugPrivilege 1548 taskkill.exe Token: SeDebugPrivilege 1628 taskkill.exe Token: SeDebugPrivilege 536 taskkill.exe Token: SeDebugPrivilege 2092 taskkill.exe Token: SeDebugPrivilege 4568 taskkill.exe Token: SeDebugPrivilege 2024 taskkill.exe Token: SeDebugPrivilege 2552 taskkill.exe Token: SeDebugPrivilege 1880 taskkill.exe Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 692 taskkill.exe Token: SeDebugPrivilege 4736 taskkill.exe Token: SeDebugPrivilege 3812 taskkill.exe Token: SeDebugPrivilege 2416 taskkill.exe Token: SeDebugPrivilege 2816 taskkill.exe Token: SeDebugPrivilege 676 taskkill.exe Token: SeDebugPrivilege 1972 taskkill.exe Token: SeDebugPrivilege 4668 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 780 1992 cmd.exe 84 PID 1992 wrote to memory of 780 1992 cmd.exe 84 PID 1992 wrote to memory of 636 1992 cmd.exe 85 PID 1992 wrote to memory of 636 1992 cmd.exe 85 PID 1992 wrote to memory of 4248 1992 cmd.exe 86 PID 1992 wrote to memory of 4248 1992 cmd.exe 86 PID 1992 wrote to memory of 2928 1992 cmd.exe 87 PID 1992 wrote to memory of 2928 1992 cmd.exe 87 PID 1992 wrote to memory of 2596 1992 cmd.exe 88 PID 1992 wrote to memory of 2596 1992 cmd.exe 88 PID 1992 wrote to memory of 1320 1992 cmd.exe 89 PID 1992 wrote to memory of 1320 1992 cmd.exe 89 PID 1992 wrote to memory of 4364 1992 cmd.exe 90 PID 1992 wrote to memory of 4364 1992 cmd.exe 90 PID 1992 wrote to memory of 4316 1992 cmd.exe 91 PID 1992 wrote to memory of 4316 1992 cmd.exe 91 PID 1992 wrote to memory of 4344 1992 cmd.exe 92 PID 1992 wrote to memory of 4344 1992 cmd.exe 92 PID 1992 wrote to memory of 4324 1992 cmd.exe 93 PID 1992 wrote to memory of 4324 1992 cmd.exe 93 PID 1992 wrote to memory of 4000 1992 cmd.exe 94 PID 1992 wrote to memory of 4000 1992 cmd.exe 94 PID 1992 wrote to memory of 4428 1992 cmd.exe 95 PID 1992 wrote to memory of 4428 1992 cmd.exe 95 PID 1992 wrote to memory of 1892 1992 cmd.exe 96 PID 1992 wrote to memory of 1892 1992 cmd.exe 96 PID 1992 wrote to memory of 4872 1992 cmd.exe 97 PID 1992 wrote to memory of 4872 1992 cmd.exe 97 PID 1992 wrote to memory of 2376 1992 cmd.exe 98 PID 1992 wrote to memory of 2376 1992 cmd.exe 98 PID 1992 wrote to memory of 3832 1992 cmd.exe 99 PID 1992 wrote to memory of 3832 1992 cmd.exe 99 PID 1992 wrote to memory of 3384 1992 cmd.exe 100 PID 1992 wrote to memory of 3384 1992 cmd.exe 100 PID 1992 wrote to memory of 1060 1992 cmd.exe 101 PID 1992 wrote to memory of 1060 1992 cmd.exe 101 PID 1992 wrote to memory of 1836 1992 cmd.exe 102 PID 1992 wrote to memory of 1836 1992 cmd.exe 102 PID 1992 wrote to memory of 1048 1992 cmd.exe 103 PID 1992 wrote to memory of 1048 1992 cmd.exe 103 PID 1992 wrote to memory of 3456 1992 cmd.exe 104 PID 1992 wrote to memory of 3456 1992 cmd.exe 104 PID 1992 wrote to memory of 908 1992 cmd.exe 105 PID 1992 wrote to memory of 908 1992 cmd.exe 105 PID 1992 wrote to memory of 3084 1992 cmd.exe 106 PID 1992 wrote to memory of 3084 1992 cmd.exe 106 PID 1992 wrote to memory of 1548 1992 cmd.exe 107 PID 1992 wrote to memory of 1548 1992 cmd.exe 107 PID 1992 wrote to memory of 1628 1992 cmd.exe 108 PID 1992 wrote to memory of 1628 1992 cmd.exe 108 PID 1992 wrote to memory of 536 1992 cmd.exe 109 PID 1992 wrote to memory of 536 1992 cmd.exe 109 PID 1992 wrote to memory of 2092 1992 cmd.exe 110 PID 1992 wrote to memory of 2092 1992 cmd.exe 110 PID 1992 wrote to memory of 4568 1992 cmd.exe 111 PID 1992 wrote to memory of 4568 1992 cmd.exe 111 PID 1992 wrote to memory of 2024 1992 cmd.exe 112 PID 1992 wrote to memory of 2024 1992 cmd.exe 112 PID 1992 wrote to memory of 2552 1992 cmd.exe 113 PID 1992 wrote to memory of 2552 1992 cmd.exe 113 PID 1992 wrote to memory of 1880 1992 cmd.exe 114 PID 1992 wrote to memory of 1880 1992 cmd.exe 114 PID 1992 wrote to memory of 1684 1992 cmd.exe 115 PID 1992 wrote to memory of 1684 1992 cmd.exe 115
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\UDWoof 2.1.1\DeepClean (dels some files).bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\taskkill.exetaskkill /f /im epicgameslauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_EAC.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_BE.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im UnrealCEFSubProcess.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im CEFProcess.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEServices.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BattleEye.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im smartscreen.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im smartscreen.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnf.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im DNF.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im CrossProxy.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im tensafe_1.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im TenSafe_1.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im tensafe_2.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im tencentdl.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im TenioDL.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im uishell.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BackgroundDownloader.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im conime.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im QQDL.EXE2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im qqlogin.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnfchina.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnfchinatest.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnf.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im txplatform.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im TXPlatform.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OriginWebHelperService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im Origin.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OriginClientService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OriginER.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OriginThinSetupInternal.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OriginLegacyCLI.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im Agent.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im Client.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\system32\sc.exeSc stop EasyAntiCheat2⤵
- Launches sc.exe
PID:4072
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v HwProfileGuid /t REG_SZ /d {29840-28796-3455-1173} /f2⤵
- Modifies registry key
PID:3756
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v GUID /t REG_SZ /d {29603-11640-7980-4073} /f2⤵
- Modifies registry key
PID:2828
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v GUID /t REG_SZ /d 16855-24212-29687-10092 /f2⤵
- Modifies registry key
PID:1488
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v MachineGuid /t REG_SZ /d 20192-31998-1893-25441 /f2⤵
- Modifies registry key
PID:3640
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:3912
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\com.epicgames.launcher" /f2⤵PID:2216
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\EpicGames" /f2⤵PID:1292
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Epic Games" /f2⤵PID:4208
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CLASSES_ROOT\com.epicgames.launcher" /f2⤵PID:4280
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" /f2⤵PID:2556
-