Overview
overview
8Static
static
7Illegal_Se...in.rar
windows10-2004-x64
3Illegal_Se...LA.rtf
windows10-2004-x64
1Illegal_Se...es.exe
windows10-2004-x64
8Illegal_Se...l.html
windows10-2004-x64
1Illegal_Se...za.dll
windows10-2004-x64
1Illegal_Se...za.exe
windows10-2004-x64
1Illegal_Se...xa.dll
windows10-2004-x64
1Illegal_Se...za.dll
windows10-2004-x64
3Illegal_Se...za.exe
windows10-2004-x64
1Illegal_Se...xa.dll
windows10-2004-x64
3Illegal_Se...ox.exe
windows10-2004-x64
3Illegal_Se...ox.exe
windows10-2004-x64
3Illegal_Se...-1.jpg
windows10-2004-x64
3Illegal_Se...10.jpg
windows10-2004-x64
3Illegal_Se...11.jpg
windows10-2004-x64
3Illegal_Se...12.jpg
windows10-2004-x64
3Illegal_Se...-2.jpg
windows10-2004-x64
3Illegal_Se...-3.jpg
windows10-2004-x64
3Illegal_Se...-4.jpg
windows10-2004-x64
3Illegal_Se...-5.jpg
windows10-2004-x64
3Illegal_Se...-6.jpg
windows10-2004-x64
3Illegal_Se...-7.jpg
windows10-2004-x64
3Illegal_Se...-8.ps1
windows10-2004-x64
1Illegal_Se...-9.jpg
windows10-2004-x64
3Illegal_Se...ad.exe
windows10-2004-x64
1Illegal_Se...ad.exe
windows10-2004-x64
1Illegal_Se...er.exe
windows10-2004-x64
7Illegal_Se...kg.exe
windows10-2004-x64
1Illegal_Se...iz.exe
windows10-2004-x64
1Illegal_Se...rl.exe
windows10-2004-x64
1Illegal_Se...N.lang
windows10-2004-x64
3Illegal_Se...R.lang
windows10-2004-x64
3Analysis
-
max time kernel
1191s -
max time network
1151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
23/09/2023, 13:15
Behavioral task
behavioral1
Sample
Illegal_Services-main.rar
Resource
win10v2004-20230915-es
Behavioral task
behavioral2
Sample
Illegal_Services-main/EULA.rtf
Resource
win10v2004-20230915-es
Behavioral task
behavioral3
Sample
Illegal_Services-main/Illegal_Services.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral4
Sample
Illegal_Services-main/Tutorial.html
Resource
win10v2004-20230915-es
Behavioral task
behavioral5
Sample
Illegal_Services-main/lib/7za/x64/7za.dll
Resource
win10v2004-20230915-es
Behavioral task
behavioral6
Sample
Illegal_Services-main/lib/7za/x64/7za.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral7
Sample
Illegal_Services-main/lib/7za/x64/7zxa.dll
Resource
win10v2004-20230915-es
Behavioral task
behavioral8
Sample
Illegal_Services-main/lib/7za/x86/7za.dll
Resource
win10v2004-20230915-es
Behavioral task
behavioral9
Sample
Illegal_Services-main/lib/7za/x86/7za.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral10
Sample
Illegal_Services-main/lib/7za/x86/7zxa.dll
Resource
win10v2004-20230915-es
Behavioral task
behavioral11
Sample
Illegal_Services-main/lib/OpenFileBox.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral12
Sample
Illegal_Services-main/lib/SaveFileBox.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral13
Sample
Illegal_Services-main/lib/backgrounds/background-1.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral14
Sample
Illegal_Services-main/lib/backgrounds/background-10.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral15
Sample
Illegal_Services-main/lib/backgrounds/background-11.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral16
Sample
Illegal_Services-main/lib/backgrounds/background-12.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral17
Sample
Illegal_Services-main/lib/backgrounds/background-2.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral18
Sample
Illegal_Services-main/lib/backgrounds/background-3.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral19
Sample
Illegal_Services-main/lib/backgrounds/background-4.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral20
Sample
Illegal_Services-main/lib/backgrounds/background-5.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral21
Sample
Illegal_Services-main/lib/backgrounds/background-6.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral22
Sample
Illegal_Services-main/lib/backgrounds/background-7.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral23
Sample
Illegal_Services-main/lib/backgrounds/background-8.ps1
Resource
win10v2004-20230915-es
Behavioral task
behavioral24
Sample
Illegal_Services-main/lib/backgrounds/background-9.jpg
Resource
win10v2004-20230915-es
Behavioral task
behavioral25
Sample
Illegal_Services-main/lib/binread/x64/binread.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral26
Sample
Illegal_Services-main/lib/binread/x86/binread.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral27
Sample
Illegal_Services-main/lib/bookmarks_parser.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral28
Sample
Illegal_Services-main/lib/cmdbkg.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral29
Sample
Illegal_Services-main/lib/cmdwiz.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral30
Sample
Illegal_Services-main/lib/curl/x64/curl.exe
Resource
win10v2004-20230915-es
Behavioral task
behavioral31
Sample
Illegal_Services-main/lib/speak/EN.lang
Resource
win10v2004-20230915-es
Behavioral task
behavioral32
Sample
Illegal_Services-main/lib/speak/FR.lang
Resource
win10v2004-20230915-es
General
-
Target
Illegal_Services-main/Illegal_Services.exe
-
Size
401KB
-
MD5
4e1ec29a1b1c04253beef0652a4480cc
-
SHA1
9b7852f19ec37d3cf1f92acfad0f08d644950105
-
SHA256
144bd8cca10ca792802f3d3d71048ec507da2e4ab83e13c0ee0b10cabfb91936
-
SHA512
40a8e55594fe268738fbd7ab46dc89c37a60b351a35603861f203da4f45ca9b0352ef1ea8e2f2fdb748315abb53bea0a9d16621b51d4111a1ac157889690ddad
-
SSDEEP
6144:pFJppEPA9emp6QSA8FmI3AcFAwtGzLj3dN4WRfHwBom4/iM+cdUkaNBo:pHGA9emsFmRcXo3dDRPSMZUkaQ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 568 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 1720 extd.exe -
resource yara_rule behavioral3/files/0x0008000000023261-19.dat upx behavioral3/files/0x0008000000023261-24.dat upx behavioral3/memory/1720-25-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral3/memory/1720-31-0x0000000000400000-0x00000000004A5000-memory.dmp upx behavioral3/memory/1720-32-0x0000000000400000-0x00000000004A5000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2624 tasklist.exe 3820 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1972 powershell.exe 4248 cmdbkg.exe 4248 cmdbkg.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1972 powershell.exe Token: SeDebugPrivilege 2624 tasklist.exe Token: SeDebugPrivilege 3820 tasklist.exe Token: 33 2716 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2716 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1648 wrote to memory of 4296 1648 Illegal_Services.exe 85 PID 1648 wrote to memory of 4296 1648 Illegal_Services.exe 85 PID 4296 wrote to memory of 4680 4296 cmd.exe 86 PID 4296 wrote to memory of 4680 4296 cmd.exe 86 PID 4296 wrote to memory of 568 4296 cmd.exe 87 PID 4296 wrote to memory of 568 4296 cmd.exe 87 PID 4296 wrote to memory of 4328 4296 cmd.exe 88 PID 4296 wrote to memory of 4328 4296 cmd.exe 88 PID 4296 wrote to memory of 3784 4296 cmd.exe 89 PID 4296 wrote to memory of 3784 4296 cmd.exe 89 PID 4296 wrote to memory of 1760 4296 cmd.exe 90 PID 4296 wrote to memory of 1760 4296 cmd.exe 90 PID 1760 wrote to memory of 3348 1760 cmd.exe 91 PID 1760 wrote to memory of 3348 1760 cmd.exe 91 PID 4296 wrote to memory of 1936 4296 cmd.exe 92 PID 4296 wrote to memory of 1936 4296 cmd.exe 92 PID 4296 wrote to memory of 2724 4296 cmd.exe 93 PID 4296 wrote to memory of 2724 4296 cmd.exe 93 PID 4296 wrote to memory of 4316 4296 cmd.exe 94 PID 4296 wrote to memory of 4316 4296 cmd.exe 94 PID 4316 wrote to memory of 3888 4316 cmd.exe 95 PID 4316 wrote to memory of 3888 4316 cmd.exe 95 PID 3888 wrote to memory of 2516 3888 forfiles.exe 96 PID 3888 wrote to memory of 2516 3888 forfiles.exe 96 PID 4296 wrote to memory of 4864 4296 cmd.exe 97 PID 4296 wrote to memory of 4864 4296 cmd.exe 97 PID 4296 wrote to memory of 3660 4296 cmd.exe 98 PID 4296 wrote to memory of 3660 4296 cmd.exe 98 PID 3660 wrote to memory of 4324 3660 cmd.exe 99 PID 3660 wrote to memory of 4324 3660 cmd.exe 99 PID 4296 wrote to memory of 1956 4296 cmd.exe 100 PID 4296 wrote to memory of 1956 4296 cmd.exe 100 PID 4296 wrote to memory of 4804 4296 cmd.exe 101 PID 4296 wrote to memory of 4804 4296 cmd.exe 101 PID 4804 wrote to memory of 3912 4804 cmd.exe 102 PID 4804 wrote to memory of 3912 4804 cmd.exe 102 PID 4296 wrote to memory of 2712 4296 cmd.exe 103 PID 4296 wrote to memory of 2712 4296 cmd.exe 103 PID 4296 wrote to memory of 4980 4296 cmd.exe 104 PID 4296 wrote to memory of 4980 4296 cmd.exe 104 PID 4980 wrote to memory of 2748 4980 cmd.exe 105 PID 4980 wrote to memory of 2748 4980 cmd.exe 105 PID 4296 wrote to memory of 4472 4296 cmd.exe 106 PID 4296 wrote to memory of 4472 4296 cmd.exe 106 PID 4472 wrote to memory of 4624 4472 cmd.exe 107 PID 4472 wrote to memory of 4624 4472 cmd.exe 107 PID 4296 wrote to memory of 3220 4296 cmd.exe 108 PID 4296 wrote to memory of 3220 4296 cmd.exe 108 PID 4296 wrote to memory of 1972 4296 cmd.exe 109 PID 4296 wrote to memory of 1972 4296 cmd.exe 109 PID 4296 wrote to memory of 4664 4296 cmd.exe 110 PID 4296 wrote to memory of 4664 4296 cmd.exe 110 PID 4296 wrote to memory of 2508 4296 cmd.exe 111 PID 4296 wrote to memory of 2508 4296 cmd.exe 111 PID 4296 wrote to memory of 1368 4296 cmd.exe 112 PID 4296 wrote to memory of 1368 4296 cmd.exe 112 PID 4296 wrote to memory of 964 4296 cmd.exe 113 PID 4296 wrote to memory of 964 4296 cmd.exe 113 PID 4296 wrote to memory of 2480 4296 cmd.exe 114 PID 4296 wrote to memory of 2480 4296 cmd.exe 114 PID 4296 wrote to memory of 2624 4296 cmd.exe 115 PID 4296 wrote to memory of 2624 4296 cmd.exe 115 PID 4296 wrote to memory of 3616 4296 cmd.exe 116 PID 4296 wrote to memory of 3616 4296 cmd.exe 116 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4680 attrib.exe 568 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\Illegal_Services.exe"C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\Illegal_Services.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat" "C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\Illegal_Services.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\system32\attrib.exeattrib -s -h "C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat"3⤵
- Views/modifies file attributes
PID:4680
-
-
C:\Windows\system32\attrib.exeattrib +s +h +i "C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:568
-
-
C:\Windows\system32\findstr.exefindstr /v "$" "C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat"3⤵PID:4328
-
-
C:\Windows\system32\findstr.exefindstr /v "$" "C:\Users\Admin\AppData\Local\Temp\006YAC0Y.bat"3⤵PID:3784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp3⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\chcp.comchcp4⤵PID:3348
-
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:1936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c copy /z "Illegal_Services.exe" nul3⤵PID:2724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c forfiles /m "Illegal_Services.exe" /c "cmd /c echo 0x1B"3⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\system32\forfiles.exeforfiles /m "Illegal_Services.exe" /c "cmd /c echo 0x1B"4⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\system32\cmd.exe/c echo5⤵PID:2516
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c set3⤵PID:4864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language"3⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language"4⤵PID:4324
-
-
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language"3⤵PID:1956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Control\Nls\Language" /v "InstallLanguage"3⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\system32\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Control\Nls\Language" /v "InstallLanguage"4⤵PID:3912
-
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language" /t REG_SZ /d EN /f3⤵PID:2712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language"3⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Language"4⤵PID:2748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "Personal"3⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v "Personal"4⤵PID:4624
-
-
-
C:\Windows\system32\chcp.comchcp 4373⤵PID:3220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell /?3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:4664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver3⤵PID:2508
-
-
C:\Windows\system32\where.exewhere mode.com3⤵PID:1368
-
-
C:\Windows\system32\reg.exereg query "HKEY_CURRENT_USER\Console\%%Startup" /v "DelegationTerminal"3⤵PID:964
-
-
C:\Windows\system32\find.exefind "{00000000-0000-0000-0000-000000000000}"3⤵PID:2480
-
-
C:\Windows\system32\tasklist.exetasklist /nh /fo csv /fi "imagename eq WindowsTerminal.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\system32\find.exefind """WindowsTerminal.exe"""3⤵PID:3616
-
-
C:\Windows\system32\mode.commode 125,193⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\cmdwiz.exelib\cmdwiz.exe setquickedit 03⤵PID:2540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username"3⤵PID:3488
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username"4⤵PID:2760
-
-
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username"3⤵PID:3668
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username" /t REG_SZ /d "Admin" /f3⤵PID:5072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username"3⤵PID:3264
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username"4⤵PID:3400
-
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Username" /t REG_SZ /d "Admin" /f3⤵PID:1396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul tasklist /nh /fo csv /fi "imagename eq Illegal_Services.exe" | find """Illegal_Services.exe"""3⤵PID:1296
-
C:\Windows\system32\tasklist.exetasklist /nh /fo csv /fi "imagename eq Illegal_Services.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
C:\Windows\system32\find.exefind """Illegal_Services.exe"""4⤵PID:3456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul dir "C:\Users\Admin\AppData\Local\Temp\????????.bat" /a:-d /o:-d /b | findstr /rxc:"........\.bat"3⤵PID:1720
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" dir "C:\Users\Admin\AppData\Local\Temp\????????.bat" /a:-d /o:-d /b 2>nul"4⤵PID:1624
-
-
C:\Windows\system32\findstr.exefindstr /rxc:"........\.bat"4⤵PID:1780
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul dir "C:\Users\Admin\AppData\Local\Temp\URL????.url" /a:-d /b | findstr /rc:"URL....\.url"3⤵PID:780
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" dir "C:\Users\Admin\AppData\Local\Temp\URL????.url" /a:-d /b 2>nul"4⤵PID:3780
-
-
C:\Windows\system32\findstr.exefindstr /rc:"URL....\.url"4⤵PID:1568
-
-
-
C:\Windows\system32\where.exewhere curl.exe3⤵PID:860
-
-
C:\Windows\system32\curl.execurl.exe -fIkLs -X GET -o NUL "https://1.1.1.1/"3⤵PID:2352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Proxy"3⤵PID:2648
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Proxy"4⤵PID:2344
-
-
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Proxy"3⤵PID:3792
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Proxy" /f3⤵PID:1384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl.exe -fIks -X GET -o NUL "https://github.com/Illegal-Services/Illegal_Services" -w "%{response_code}"3⤵PID:3944
-
C:\Windows\system32\curl.execurl.exe -fIks -X GET -o NUL "https://github.com/Illegal-Services/Illegal_Services" -w "%{response_code}"4⤵PID:3884
-
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "Proxy" /t REG_SZ /d "https://github.com/Illegal-Services/Illegal_Services" /f3⤵PID:4456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant"3⤵PID:4788
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant"4⤵PID:2432
-
-
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant"3⤵PID:1232
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant" /t REG_DWORD /d 0 /f3⤵PID:4856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant"3⤵PID:980
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistant"4⤵PID:4744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl.exe -fkLs "https://github.com/Illegal-Services/Illegal_Services/raw/version/version.txt"3⤵PID:1640
-
C:\Windows\system32\curl.execurl.exe -fkLs "https://github.com/Illegal-Services/Illegal_Services/raw/version/version.txt"4⤵PID:396
-
-
-
C:\Windows\system32\curl.execurl.exe -fIkLs -X GET -o NUL "https://1.1.1.1/"3⤵PID:1944
-
-
C:\Windows\system32\curl.execurl.exe -f#kLo "lib\speak\extd.exe" "https://github.com/Illegal-Services/Illegal_Services/raw/main/lib/speak/extd.exe"3⤵PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\binread\x64\binread.exelib\binread\x64\binread.exe "lib\binread\x64\binread.exe" 03⤵PID:3972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c lib\binread\x64\binread.exe "C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\speak\extd.exe" 83⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\binread\x64\binread.exelib\binread\x64\binread.exe "C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\speak\extd.exe" 84⤵PID:1844
-
-
-
C:\Windows\system32\where.exewhere chcp.com3⤵PID:2984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp3⤵PID:3348
-
C:\Windows\system32\chcp.comchcp4⤵PID:1348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency"3⤵PID:4904
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency"4⤵PID:4108
-
-
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency"3⤵PID:2768
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency" /t REG_DWORD /d 1 /f3⤵PID:4332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency"3⤵PID:3136
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundBorderTransparency"4⤵PID:3268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled"3⤵PID:3812
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled"4⤵PID:592
-
-
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled"3⤵PID:4808
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled" /t REG_DWORD /d 0 /f3⤵PID:1292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled"3⤵PID:3288
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundDisabled"4⤵PID:2488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency"3⤵PID:2976
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency"4⤵PID:3628
-
-
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency"3⤵PID:1352
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency" /t REG_DWORD /d 10 /f3⤵PID:2956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency"3⤵PID:2988
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundTransparency"4⤵PID:3280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper"3⤵PID:4920
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper"4⤵PID:3856
-
-
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper"3⤵PID:2568
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper" /t REG_DWORD /d 6 /f3⤵PID:2536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper"3⤵PID:4484
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "BackgroundWallpaper"4⤵PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\cmdbkg.exelib\cmdbkg.exe lib\backgrounds\background-6.jpg3⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\cmdbkg.exelib\cmdbkg.exe lib\backgrounds\background-6.jpg4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\cmdwiz.exelib\cmdwiz.exe delay 5003⤵PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\cmdwiz.exelib\cmdwiz.exe setwindowtransparency 103⤵PID:2836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning"3⤵PID:4440
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning"4⤵PID:3864
-
-
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning"3⤵PID:4480
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning" /t REG_DWORD /d 1 /f3⤵PID:1052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning"3⤵PID:2592
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "UntrustedWebsitesWarning"4⤵PID:2604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice"3⤵PID:1136
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice"4⤵PID:1472
-
-
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice"3⤵PID:2472
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice" /t REG_DWORD /d 1 /f3⤵PID:1764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>nul reg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice"3⤵PID:3592
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\IB_U_Z_Z_A_R_Dl\Illegal Services" /v "VoiceAssistantChoice"4⤵PID:1296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /bc:"[First Launch]=" "lib\speak\EN.lang"3⤵PID:3796
-
C:\Windows\system32\findstr.exefindstr /bc:"[First Launch]=" "lib\speak\EN.lang"4⤵PID:3700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services-main\lib\speak\extd.exelib\speak\extd.exe /speak "Welcome to Illegal Services. My name is Rose, and I will be, your personal voice assistant. If you wish, you can deactivate me in the menu that appears."3⤵
- Executes dropped EXE
PID:1720
-
-
C:\Windows\system32\cscript.execscript //nologo "C:\Users\Admin\AppData\Local\Temp\msgbox.vbs" "Do you want to disable Rose voice assistant ?" 69668 "Illegal Services"3⤵PID:4428
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a4 0x4cc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD503b7dc354e2c63089afc60eca5628b53
SHA184b3dd54c1a2d482cab4f2427923c6d1ef97bc3d
SHA256f74b1dcc75bc39215f38a45a823f2f36036b003e86d46c5ec77edf914f7acd05
SHA5126a949f2a8a79ae41dc9b5e7a6c5526910ae3a7561cc4d2effaa052b7b45834c8f1ba31041e2204d12948a1ed602c0157461eef47cebd843a108dd72dd44e4965
-
Filesize
259KB
MD5139b5ce627bc9ec1040a91ebe7830f7c
SHA1c7e8154ebed98bea9d1f12b08139d130b6836826
SHA256d4b9b8b1f9ab2fbca7b55c4068bdcefae50ad3994924d67607fc9ae859003332
SHA5128cc0e484ddb2e8bed4b8554e65ab8e3bfbe2a8f1c554a7aec9eac4c9555396e21c4bc2840d499ce4baffed2a4966a7d742c7c3ada58d039630b03472e322042b
-
Filesize
259KB
MD5139b5ce627bc9ec1040a91ebe7830f7c
SHA1c7e8154ebed98bea9d1f12b08139d130b6836826
SHA256d4b9b8b1f9ab2fbca7b55c4068bdcefae50ad3994924d67607fc9ae859003332
SHA5128cc0e484ddb2e8bed4b8554e65ab8e3bfbe2a8f1c554a7aec9eac4c9555396e21c4bc2840d499ce4baffed2a4966a7d742c7c3ada58d039630b03472e322042b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
159B
MD590b924c8d449073b02af7b0d83f50983
SHA19e3ef2591194004f256146f1632531e8bf846372
SHA2569317acb89938472a8e7af2fa7d93bd503c5fc95b0f31ea64b558ae859eac36c6
SHA5120d14616dcf5c39c44b5863d9810abe9ef8fc84744316345d7240d01115d09057f427c870588b1d116bde77e10bffe45fc842c710b54a5db93f420ea2bf78cd45