Analysis

  • max time kernel
    1191s
  • max time network
    1151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    23/09/2023, 13:15

General

  • Target

    Illegal_Services-main/Illegal_Services.exe

  • Size

    401KB

  • MD5

    4e1ec29a1b1c04253beef0652a4480cc

  • SHA1

    9b7852f19ec37d3cf1f92acfad0f08d644950105

  • SHA256

    144bd8cca10ca792802f3d3d71048ec507da2e4ab83e13c0ee0b10cabfb91936

  • SHA512

    40a8e55594fe268738fbd7ab46dc89c37a60b351a35603861f203da4f45ca9b0352ef1ea8e2f2fdb748315abb53bea0a9d16621b51d4111a1ac157889690ddad

  • SSDEEP

    6144:pFJppEPA9emp6QSA8FmI3AcFAwtGzLj3dN4WRfHwBom4/iM+cdUkaNBo:pHGA9emsFmRcXo3dDRPSMZUkaQ

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\Illegal_Services.exe
    "C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\Illegal_Services.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\system32\cmd.exe
      C:\Windows\Sysnative\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat" "C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\Illegal_Services.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4296
      • C:\Windows\system32\attrib.exe
        attrib -s -h "C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat"
        3⤵
        • Views/modifies file attributes
        PID:4680
      • C:\Windows\system32\attrib.exe
        attrib +s +h +i "C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat"
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:568
      • C:\Windows\system32\findstr.exe
        findstr /v "$" "C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat"
        3⤵
          PID:4328
        • C:\Windows\system32\findstr.exe
          findstr /v "$" "C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat"
          3⤵
            PID:3784
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c chcp
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1760
            • C:\Windows\system32\chcp.com
              chcp
              4⤵
                PID:3348
            • C:\Windows\system32\chcp.com
              chcp 65001
              3⤵
                PID:1936
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c copy /z "Illegal_Services.exe" nul
                3⤵
                  PID:2724
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c forfiles /m "Illegal_Services.exe" /c "cmd /c echo 0x1B"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4316
                  • C:\Windows\system32\forfiles.exe
                    forfiles /m "Illegal_Services.exe" /c "cmd /c echo 0x1B"
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3888
                    • C:\Windows\system32\cmd.exe
                      /c echo 
                      5⤵
                        PID:2516
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c set
                    3⤵
                      PID:4864
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3660
                      • C:\Windows\system32\reg.exe
                        reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language"
                        4⤵
                          PID:4324
                      • C:\Windows\system32\reg.exe
                        reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language"
                        3⤵
                          PID:1956
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Control\Nls\Language" /v "InstallLanguage"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4804
                          • C:\Windows\system32\reg.exe
                            reg query "HKLM\SYSTEM\CurrentControlSet\Control\Nls\Language" /v "InstallLanguage"
                            4⤵
                              PID:3912
                          • C:\Windows\system32\reg.exe
                            reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language" /t REG_SZ /d EN /f
                            3⤵
                              PID:2712
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language"
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4980
                              • C:\Windows\system32\reg.exe
                                reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language"
                                4⤵
                                  PID:2748
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "Personal"
                                3⤵
                                • Suspicious use of WriteProcessMemory
                                PID:4472
                                • C:\Windows\system32\reg.exe
                                  reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "Personal"
                                  4⤵
                                    PID:4624
                                • C:\Windows\system32\chcp.com
                                  chcp 437
                                  3⤵
                                    PID:3220
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell /?
                                    3⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1972
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    3⤵
                                      PID:4664
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ver
                                      3⤵
                                        PID:2508
                                      • C:\Windows\system32\where.exe
                                        where mode.com
                                        3⤵
                                          PID:1368
                                        • C:\Windows\system32\reg.exe
                                          reg query "HKEY_CURRENT_USER\Console\%%Startup" /v "DelegationTerminal"
                                          3⤵
                                            PID:964
                                          • C:\Windows\system32\find.exe
                                            find "{00000000-0000-0000-0000-000000000000}"
                                            3⤵
                                              PID:2480
                                            • C:\Windows\system32\tasklist.exe
                                              tasklist /nh /fo csv /fi "imagename eq WindowsTerminal.exe"
                                              3⤵
                                              • Enumerates processes with tasklist
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2624
                                            • C:\Windows\system32\find.exe
                                              find """WindowsTerminal.exe"""
                                              3⤵
                                                PID:3616
                                              • C:\Windows\system32\mode.com
                                                mode 125,19
                                                3⤵
                                                  PID:2856
                                                • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\cmdwiz.exe
                                                  lib\cmdwiz.exe setquickedit 0
                                                  3⤵
                                                    PID:2540
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username"
                                                    3⤵
                                                      PID:3488
                                                      • C:\Windows\system32\reg.exe
                                                        reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username"
                                                        4⤵
                                                          PID:2760
                                                      • C:\Windows\system32\reg.exe
                                                        reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username"
                                                        3⤵
                                                          PID:3668
                                                        • C:\Windows\system32\reg.exe
                                                          reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username" /t REG_SZ /d "Admin" /f
                                                          3⤵
                                                            PID:5072
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username"
                                                            3⤵
                                                              PID:3264
                                                              • C:\Windows\system32\reg.exe
                                                                reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username"
                                                                4⤵
                                                                  PID:3400
                                                              • C:\Windows\system32\reg.exe
                                                                reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username" /t REG_SZ /d "Admin" /f
                                                                3⤵
                                                                  PID:1396
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c 2>nul tasklist /nh /fo csv /fi "imagename eq Illegal_Services.exe" | find """Illegal_Services.exe"""
                                                                  3⤵
                                                                    PID:1296
                                                                    • C:\Windows\system32\tasklist.exe
                                                                      tasklist /nh /fo csv /fi "imagename eq Illegal_Services.exe"
                                                                      4⤵
                                                                      • Enumerates processes with tasklist
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3820
                                                                    • C:\Windows\system32\find.exe
                                                                      find """Illegal_Services.exe"""
                                                                      4⤵
                                                                        PID:3456
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c 2>nul dir "C:\Users\Admin\AppData\Local\Temp\????????.bat" /a:-d /o:-d /b | findstr /rxc:"........\.bat"
                                                                      3⤵
                                                                        PID:1720
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /S /D /c" dir "C:\Users\Admin\AppData\Local\Temp\????????.bat" /a:-d /o:-d /b 2>nul"
                                                                          4⤵
                                                                            PID:1624
                                                                          • C:\Windows\system32\findstr.exe
                                                                            findstr /rxc:"........\.bat"
                                                                            4⤵
                                                                              PID:1780
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c 2>nul dir "C:\Users\Admin\AppData\Local\Temp\URL????.url" /a:-d /b | findstr /rc:"URL....\.url"
                                                                            3⤵
                                                                              PID:780
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /S /D /c" dir "C:\Users\Admin\AppData\Local\Temp\URL????.url" /a:-d /b 2>nul"
                                                                                4⤵
                                                                                  PID:3780
                                                                                • C:\Windows\system32\findstr.exe
                                                                                  findstr /rc:"URL....\.url"
                                                                                  4⤵
                                                                                    PID:1568
                                                                                • C:\Windows\system32\where.exe
                                                                                  where curl.exe
                                                                                  3⤵
                                                                                    PID:860
                                                                                  • C:\Windows\system32\curl.exe
                                                                                    curl.exe -fIkLs -X GET -o NUL "https://1.1.1.1/"
                                                                                    3⤵
                                                                                      PID:2352
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Proxy"
                                                                                      3⤵
                                                                                        PID:2648
                                                                                        • C:\Windows\system32\reg.exe
                                                                                          reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Proxy"
                                                                                          4⤵
                                                                                            PID:2344
                                                                                        • C:\Windows\system32\reg.exe
                                                                                          reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Proxy"
                                                                                          3⤵
                                                                                            PID:3792
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            reg delete "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Proxy" /f
                                                                                            3⤵
                                                                                              PID:1384
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c curl.exe -fIks -X GET -o NUL "https://github.com/Illegal-Services/Illegal_Services" -w "%{response_code}"
                                                                                              3⤵
                                                                                                PID:3944
                                                                                                • C:\Windows\system32\curl.exe
                                                                                                  curl.exe -fIks -X GET -o NUL "https://github.com/Illegal-Services/Illegal_Services" -w "%{response_code}"
                                                                                                  4⤵
                                                                                                    PID:3884
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Proxy" /t REG_SZ /d "https://github.com/Illegal-Services/Illegal_Services" /f
                                                                                                  3⤵
                                                                                                    PID:4456
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant"
                                                                                                    3⤵
                                                                                                      PID:4788
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant"
                                                                                                        4⤵
                                                                                                          PID:2432
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant"
                                                                                                        3⤵
                                                                                                          PID:1232
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant" /t REG_DWORD /d 0 /f
                                                                                                          3⤵
                                                                                                            PID:4856
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant"
                                                                                                            3⤵
                                                                                                              PID:980
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant"
                                                                                                                4⤵
                                                                                                                  PID:4744
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c curl.exe -fkLs "https://github.com/Illegal-Services/Illegal_Services/raw/version/version.txt"
                                                                                                                3⤵
                                                                                                                  PID:1640
                                                                                                                  • C:\Windows\system32\curl.exe
                                                                                                                    curl.exe -fkLs "https://github.com/Illegal-Services/Illegal_Services/raw/version/version.txt"
                                                                                                                    4⤵
                                                                                                                      PID:396
                                                                                                                  • C:\Windows\system32\curl.exe
                                                                                                                    curl.exe -fIkLs -X GET -o NUL "https://1.1.1.1/"
                                                                                                                    3⤵
                                                                                                                      PID:1944
                                                                                                                    • C:\Windows\system32\curl.exe
                                                                                                                      curl.exe -f#kLo "lib\speak\extd.exe" "https://github.com/Illegal-Services/Illegal_Services/raw/main/lib/speak/extd.exe"
                                                                                                                      3⤵
                                                                                                                        PID:3100
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\binread\x64\binread.exe
                                                                                                                        lib\binread\x64\binread.exe "lib\binread\x64\binread.exe" 0
                                                                                                                        3⤵
                                                                                                                          PID:3972
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c lib\binread\x64\binread.exe "C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\speak\extd.exe" 8
                                                                                                                          3⤵
                                                                                                                            PID:4612
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\binread\x64\binread.exe
                                                                                                                              lib\binread\x64\binread.exe "C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\speak\extd.exe" 8
                                                                                                                              4⤵
                                                                                                                                PID:1844
                                                                                                                            • C:\Windows\system32\where.exe
                                                                                                                              where chcp.com
                                                                                                                              3⤵
                                                                                                                                PID:2984
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c chcp
                                                                                                                                3⤵
                                                                                                                                  PID:3348
                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                    chcp
                                                                                                                                    4⤵
                                                                                                                                      PID:1348
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency"
                                                                                                                                    3⤵
                                                                                                                                      PID:4904
                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                        reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency"
                                                                                                                                        4⤵
                                                                                                                                          PID:4108
                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                        reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency"
                                                                                                                                        3⤵
                                                                                                                                          PID:2768
                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                          reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency" /t REG_DWORD /d 1 /f
                                                                                                                                          3⤵
                                                                                                                                            PID:4332
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency"
                                                                                                                                            3⤵
                                                                                                                                              PID:3136
                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency"
                                                                                                                                                4⤵
                                                                                                                                                  PID:3268
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled"
                                                                                                                                                3⤵
                                                                                                                                                  PID:3812
                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                    reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:592
                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                    reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled"
                                                                                                                                                    3⤵
                                                                                                                                                      PID:4808
                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                      reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled" /t REG_DWORD /d 0 /f
                                                                                                                                                      3⤵
                                                                                                                                                        PID:1292
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:3288
                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                            reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:2488
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:2976
                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency"
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:3628
                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:1352
                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                  reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency" /t REG_DWORD /d 10 /f
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:2956
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency"
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:2988
                                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                                        reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:3280
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:4920
                                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                                            reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:3856
                                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                                            reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:2568
                                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                                              reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper" /t REG_DWORD /d 6 /f
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:2536
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:4484
                                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                                    reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:1972
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\cmdbkg.exe
                                                                                                                                                                                    lib\cmdbkg.exe lib\backgrounds\background-6.jpg
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:4664
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\cmdbkg.exe
                                                                                                                                                                                        lib\cmdbkg.exe lib\backgrounds\background-6.jpg
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                        PID:4248
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\cmdwiz.exe
                                                                                                                                                                                      lib\cmdwiz.exe delay 500
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:964
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\cmdwiz.exe
                                                                                                                                                                                        lib\cmdwiz.exe setwindowtransparency 10
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:2836
                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning"
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:4440
                                                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                                                              reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:3864
                                                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                                                              reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning"
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:4480
                                                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                                                reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning" /t REG_DWORD /d 1 /f
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:1052
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning"
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:2592
                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                      reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:2604
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:1136
                                                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                                                          reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:1472
                                                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                                                          reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:2472
                                                                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                                                                            reg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice" /t REG_DWORD /d 1 /f
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:1764
                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:3592
                                                                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                  reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:1296
                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c findstr /bc:"[First Launch]=" "lib\speak\EN.lang"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:3796
                                                                                                                                                                                                                    • C:\Windows\system32\findstr.exe
                                                                                                                                                                                                                      findstr /bc:"[First Launch]=" "lib\speak\EN.lang"
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:3700
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\speak\extd.exe
                                                                                                                                                                                                                      lib\speak\extd.exe /speak "Welcome to Illegal Services. My name is Rose, and I will be, your personal voice assistant. If you wish, you can deactivate me in the menu that appears."
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                      PID:1720
                                                                                                                                                                                                                    • C:\Windows\system32\cscript.exe
                                                                                                                                                                                                                      cscript //nologo "C:\Users\Admin\AppData\Local\Temp\msgbox.vbs" "Do you want to disable Rose voice assistant ?" 69668 "Illegal Services"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:4428
                                                                                                                                                                                                                  • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                                                    C:\Windows\system32\AUDIODG.EXE 0x4a4 0x4cc
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                    PID:2716

                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    273KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    03b7dc354e2c63089afc60eca5628b53

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    84b3dd54c1a2d482cab4f2427923c6d1ef97bc3d

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    f74b1dcc75bc39215f38a45a823f2f36036b003e86d46c5ec77edf914f7acd05

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    6a949f2a8a79ae41dc9b5e7a6c5526910ae3a7561cc4d2effaa052b7b45834c8f1ba31041e2204d12948a1ed602c0157461eef47cebd843a108dd72dd44e4965

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\speak\extd.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    259KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    139b5ce627bc9ec1040a91ebe7830f7c

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    c7e8154ebed98bea9d1f12b08139d130b6836826

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    d4b9b8b1f9ab2fbca7b55c4068bdcefae50ad3994924d67607fc9ae859003332

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    8cc0e484ddb2e8bed4b8554e65ab8e3bfbe2a8f1c554a7aec9eac4c9555396e21c4bc2840d499ce4baffed2a4966a7d742c7c3ada58d039630b03472e322042b

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\speak\extd.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    259KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    139b5ce627bc9ec1040a91ebe7830f7c

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    c7e8154ebed98bea9d1f12b08139d130b6836826

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    d4b9b8b1f9ab2fbca7b55c4068bdcefae50ad3994924d67607fc9ae859003332

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    8cc0e484ddb2e8bed4b8554e65ab8e3bfbe2a8f1c554a7aec9eac4c9555396e21c4bc2840d499ce4baffed2a4966a7d742c7c3ada58d039630b03472e322042b

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cstifeo3.1wi.ps1

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    60B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\msgbox.vbs

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    159B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    90b924c8d449073b02af7b0d83f50983

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    9e3ef2591194004f256146f1632531e8bf846372

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    9317acb89938472a8e7af2fa7d93bd503c5fc95b0f31ea64b558ae859eac36c6

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    0d14616dcf5c39c44b5863d9810abe9ef8fc84744316345d7240d01115d09057f427c870588b1d116bde77e10bffe45fc842c710b54a5db93f420ea2bf78cd45

                                                                                                                                                                                                                  • memory/964-22-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                  • memory/1648-20-0x0000000000400000-0x000000000046D000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    436KB

                                                                                                                                                                                                                  • memory/1720-25-0x0000000000400000-0x00000000004A5000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    660KB

                                                                                                                                                                                                                  • memory/1720-31-0x0000000000400000-0x00000000004A5000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    660KB

                                                                                                                                                                                                                  • memory/1720-32-0x0000000000400000-0x00000000004A5000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    660KB

                                                                                                                                                                                                                  • memory/1972-16-0x00007FFF525E0000-0x00007FFF530A1000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    10.8MB

                                                                                                                                                                                                                  • memory/1972-13-0x00000299CECE0000-0x00000299CECF0000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    64KB

                                                                                                                                                                                                                  • memory/1972-8-0x00000299E7280000-0x00000299E72A2000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                  • memory/1972-2-0x00000299E73D0000-0x00000299E7452000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    520KB

                                                                                                                                                                                                                  • memory/2540-17-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                  • memory/2836-23-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    92KB

                                                                                                                                                                                                                  • memory/4248-30-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    48KB

                                                                                                                                                                                                                  • memory/4664-21-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    48KB