Analysis
-
max time kernel
1695s -
max time network
1174s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2023, 20:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Google.exe
Resource
win10v2004-20230915-en
9 signatures
1800 seconds
General
-
Target
Google.exe
-
Size
22.8MB
-
MD5
3cf3ee2eb8f0e74cafca2a41f80decc6
-
SHA1
f1f26c28f6b03f824470afebc65c2bd725c210ff
-
SHA256
4d01b76695d542981e21d77b2f786051a1388b609e245bd828ad567edb8af4bc
-
SHA512
fae8d0604061df5750aa80b438c6d8032a60ca1a09bfc912b527d0c35807150d790a8b6325fd2ca4b8891a7ae1726bc13f47fdc86d975cdf9c3c16467b6f7950
-
SSDEEP
393216:U7L3sNAAW4U29yInXaP5zuN3Jc8ZTvRbFJ22qmRMglCHuY0Cdab6DVArWcQXA3:k7sNAAdUlIXNss42qeCECdaYVASch
Score
8/10
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4712 Google.exe 4712 Google.exe -
Launches sc.exe 19 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1180 sc.exe 3628 sc.exe 4296 sc.exe 2952 sc.exe 4396 sc.exe 3244 sc.exe 2108 sc.exe 3944 sc.exe 5000 sc.exe 940 sc.exe 1800 sc.exe 4608 sc.exe 4292 sc.exe 2436 sc.exe 3924 sc.exe 844 sc.exe 3516 sc.exe 1240 sc.exe 1132 sc.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1268 timeout.exe -
Kills process with taskkill 13 IoCs
pid Process 2136 taskkill.exe 1060 taskkill.exe 3080 taskkill.exe 1376 taskkill.exe 4988 taskkill.exe 4736 taskkill.exe 2080 taskkill.exe 1924 taskkill.exe 1456 taskkill.exe 1656 taskkill.exe 2584 taskkill.exe 4432 taskkill.exe 1728 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe 4712 Google.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1924 taskkill.exe Token: SeDebugPrivilege 1456 taskkill.exe Token: SeDebugPrivilege 1656 taskkill.exe Token: SeDebugPrivilege 2584 taskkill.exe Token: SeDebugPrivilege 4432 taskkill.exe Token: SeDebugPrivilege 2136 taskkill.exe Token: SeDebugPrivilege 1728 taskkill.exe Token: SeDebugPrivilege 4736 taskkill.exe Token: SeDebugPrivilege 1060 taskkill.exe Token: SeDebugPrivilege 3080 taskkill.exe Token: SeDebugPrivilege 2080 taskkill.exe Token: SeDebugPrivilege 1376 taskkill.exe Token: SeDebugPrivilege 4988 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 224 4712 Google.exe 89 PID 4712 wrote to memory of 224 4712 Google.exe 89 PID 224 wrote to memory of 2308 224 cmd.exe 90 PID 224 wrote to memory of 2308 224 cmd.exe 90 PID 2308 wrote to memory of 3080 2308 net.exe 91 PID 2308 wrote to memory of 3080 2308 net.exe 91 PID 4712 wrote to memory of 1572 4712 Google.exe 92 PID 4712 wrote to memory of 1572 4712 Google.exe 92 PID 1572 wrote to memory of 4464 1572 cmd.exe 93 PID 1572 wrote to memory of 4464 1572 cmd.exe 93 PID 4464 wrote to memory of 2344 4464 net.exe 96 PID 4464 wrote to memory of 2344 4464 net.exe 96 PID 4712 wrote to memory of 4236 4712 Google.exe 97 PID 4712 wrote to memory of 4236 4712 Google.exe 97 PID 4236 wrote to memory of 1800 4236 cmd.exe 123 PID 4236 wrote to memory of 1800 4236 cmd.exe 123 PID 4712 wrote to memory of 2696 4712 Google.exe 98 PID 4712 wrote to memory of 2696 4712 Google.exe 98 PID 2696 wrote to memory of 3628 2696 cmd.exe 122 PID 2696 wrote to memory of 3628 2696 cmd.exe 122 PID 4712 wrote to memory of 2352 4712 Google.exe 99 PID 4712 wrote to memory of 2352 4712 Google.exe 99 PID 2352 wrote to memory of 2108 2352 cmd.exe 100 PID 2352 wrote to memory of 2108 2352 cmd.exe 100 PID 4712 wrote to memory of 4284 4712 Google.exe 101 PID 4712 wrote to memory of 4284 4712 Google.exe 101 PID 4284 wrote to memory of 3944 4284 cmd.exe 102 PID 4284 wrote to memory of 3944 4284 cmd.exe 102 PID 4712 wrote to memory of 2776 4712 Google.exe 103 PID 4712 wrote to memory of 2776 4712 Google.exe 103 PID 2776 wrote to memory of 5000 2776 cmd.exe 104 PID 2776 wrote to memory of 5000 2776 cmd.exe 104 PID 4712 wrote to memory of 3744 4712 Google.exe 105 PID 4712 wrote to memory of 3744 4712 Google.exe 105 PID 3744 wrote to memory of 4608 3744 cmd.exe 106 PID 3744 wrote to memory of 4608 3744 cmd.exe 106 PID 4712 wrote to memory of 4112 4712 Google.exe 107 PID 4712 wrote to memory of 4112 4712 Google.exe 107 PID 4112 wrote to memory of 2852 4112 cmd.exe 108 PID 4112 wrote to memory of 2852 4112 cmd.exe 108 PID 2852 wrote to memory of 3204 2852 net.exe 109 PID 2852 wrote to memory of 3204 2852 net.exe 109 PID 4712 wrote to memory of 5012 4712 Google.exe 110 PID 4712 wrote to memory of 5012 4712 Google.exe 110 PID 5012 wrote to memory of 2736 5012 cmd.exe 111 PID 5012 wrote to memory of 2736 5012 cmd.exe 111 PID 2736 wrote to memory of 4020 2736 net.exe 112 PID 2736 wrote to memory of 4020 2736 net.exe 112 PID 4712 wrote to memory of 636 4712 Google.exe 113 PID 4712 wrote to memory of 636 4712 Google.exe 113 PID 636 wrote to memory of 3516 636 cmd.exe 114 PID 636 wrote to memory of 3516 636 cmd.exe 114 PID 4712 wrote to memory of 1364 4712 Google.exe 115 PID 4712 wrote to memory of 1364 4712 Google.exe 115 PID 1364 wrote to memory of 4292 1364 cmd.exe 116 PID 1364 wrote to memory of 4292 1364 cmd.exe 116 PID 4712 wrote to memory of 3664 4712 Google.exe 117 PID 4712 wrote to memory of 3664 4712 Google.exe 117 PID 3664 wrote to memory of 940 3664 cmd.exe 118 PID 3664 wrote to memory of 940 3664 cmd.exe 118 PID 4712 wrote to memory of 856 4712 Google.exe 119 PID 4712 wrote to memory of 856 4712 Google.exe 119 PID 856 wrote to memory of 1180 856 cmd.exe 120 PID 856 wrote to memory of 1180 856 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\Google.exe"C:\Users\Admin\AppData\Local\Temp\Google.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net stop FACEIT >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\system32\net.exenet stop FACEIT3⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop FACEIT4⤵PID:3080
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net stop ESEADriver2 >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\system32\net.exenet stop ESEADriver23⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ESEADriver24⤵PID:2344
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:1800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\sc.exesc stop KProcessHacker33⤵
- Launches sc.exe
PID:3628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\sc.exesc stop KProcessHacker23⤵
- Launches sc.exe
PID:2108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\system32\sc.exesc stop KProcessHacker13⤵
- Launches sc.exe
PID:3944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\sc.exesc stop wireshark3⤵
- Launches sc.exe
PID:5000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\system32\sc.exesc stop npf3⤵
- Launches sc.exe
PID:4608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net stop FACEIT >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\system32\net.exenet stop FACEIT3⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop FACEIT4⤵PID:3204
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net stop ESEADriver2 >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\system32\net.exenet stop ESEADriver23⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ESEADriver24⤵PID:4020
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:3516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\system32\sc.exesc stop KProcessHacker33⤵
- Launches sc.exe
PID:4292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\system32\sc.exesc stop KProcessHacker23⤵
- Launches sc.exe
PID:940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\system32\sc.exesc stop KProcessHacker13⤵
- Launches sc.exe
PID:1180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&12⤵PID:3316
-
C:\Windows\system32\sc.exesc stop wireshark3⤵
- Launches sc.exe
PID:1240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&12⤵PID:2744
-
C:\Windows\system32\sc.exesc stop npf3⤵
- Launches sc.exe
PID:4296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:1440
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3464
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4728
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:3804
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4872
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:440
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3656
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:3560
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T >nul 2>&12⤵PID:1716
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:4356
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:220
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:568
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:896
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2788
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&12⤵PID:5016
-
C:\Windows\system32\sc.exesc stop KProcessHacker33⤵
- Launches sc.exe
PID:3244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&12⤵PID:4516
-
C:\Windows\system32\sc.exesc stop KProcessHacker23⤵
- Launches sc.exe
PID:2436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&12⤵PID:2316
-
C:\Windows\system32\sc.exesc stop KProcessHacker13⤵
- Launches sc.exe
PID:1132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&12⤵PID:3512
-
C:\Windows\system32\sc.exesc stop wireshark3⤵
- Launches sc.exe
PID:3924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&12⤵PID:4852
-
C:\Windows\system32\sc.exesc stop npf3⤵
- Launches sc.exe
PID:844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Google.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵PID:2004
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Google.exe" MD53⤵PID:4936
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1628
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo Couldn't resolve host name && timeout /t 5"2⤵PID:4068
-
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo Couldn't resolve host name && timeout /t 5"3⤵PID:2952
-
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:1268
-
-
-
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1376