Analysis
-
max time kernel
3s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 15:25
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20231215-en
General
-
Target
Loader.exe
-
Size
21.2MB
-
MD5
641724e3d8211104be31438b62dc7d15
-
SHA1
114e784ccc74babf9590583bff1e1e83e8929bb4
-
SHA256
569542c9e1cc03c6e2482db365581e60c94f6fae7e130059ecd6fd4e1501ac2d
-
SHA512
5fc3562e2b0483f9c6ca6b16586d9f15b585b692f98c7547f3ce087114e9c8bb35e7a2d54e0e788489573ebf405650104c8ebf377baddc3cbacc8321916eeb2f
-
SSDEEP
393216:FBKR69QxEl93SQh6mn7tG+vp2jbKmMQL8NGm10C9REV6f01Serw2ngtTV:LKIsGj6CRGu23MBGm9wXzngT
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation Loader.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4408 Loader.exe -
Launches sc.exe 35 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2928 sc.exe 2504 sc.exe 3696 sc.exe 1992 sc.exe 1248 sc.exe 632 sc.exe 2648 sc.exe 5000 sc.exe 1160 sc.exe 4500 sc.exe 1880 sc.exe 4036 sc.exe 3028 sc.exe 2604 sc.exe 3136 sc.exe 1248 sc.exe 4084 sc.exe 3692 sc.exe 3708 sc.exe 2964 sc.exe 4604 sc.exe 1136 sc.exe 4620 sc.exe 2440 sc.exe 2928 sc.exe 4440 sc.exe 1904 sc.exe 3168 sc.exe 4760 sc.exe 2492 sc.exe 4252 sc.exe 1100 sc.exe 2344 sc.exe 1668 sc.exe 3780 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 25 IoCs
pid Process 4544 taskkill.exe 1652 taskkill.exe 3636 taskkill.exe 1836 taskkill.exe 3900 taskkill.exe 3664 taskkill.exe 2656 taskkill.exe 3544 taskkill.exe 1360 taskkill.exe 2752 taskkill.exe 4604 taskkill.exe 4360 taskkill.exe 2520 taskkill.exe 4736 taskkill.exe 880 taskkill.exe 4732 taskkill.exe 3636 taskkill.exe 1680 taskkill.exe 2708 taskkill.exe 4208 taskkill.exe 3284 taskkill.exe 3268 taskkill.exe 1596 taskkill.exe 1100 taskkill.exe 3460 taskkill.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4408 wrote to memory of 684 4408 Loader.exe 163 PID 4408 wrote to memory of 684 4408 Loader.exe 163 PID 4408 wrote to memory of 3080 4408 Loader.exe 88 PID 4408 wrote to memory of 3080 4408 Loader.exe 88 PID 4408 wrote to memory of 2304 4408 Loader.exe 285 PID 4408 wrote to memory of 2304 4408 Loader.exe 285 PID 684 wrote to memory of 1340 684 Conhost.exe 284 PID 684 wrote to memory of 1340 684 Conhost.exe 284 PID 1340 wrote to memory of 2412 1340 net.exe 91 PID 1340 wrote to memory of 2412 1340 net.exe 91 PID 4408 wrote to memory of 1428 4408 Loader.exe 283 PID 4408 wrote to memory of 1428 4408 Loader.exe 283 PID 3080 wrote to memory of 2088 3080 cmd.exe 92 PID 3080 wrote to memory of 2088 3080 cmd.exe 92 PID 2088 wrote to memory of 5076 2088 net.exe 282 PID 2088 wrote to memory of 5076 2088 net.exe 282 PID 2304 wrote to memory of 2440 2304 cmd.exe 94 PID 2304 wrote to memory of 2440 2304 cmd.exe 94 PID 4408 wrote to memory of 1764 4408 Loader.exe 281 PID 4408 wrote to memory of 1764 4408 Loader.exe 281 PID 4408 wrote to memory of 1560 4408 Loader.exe 279 PID 4408 wrote to memory of 1560 4408 Loader.exe 279
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop ESEADriver2 >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\system32\net.exenet stop ESEADriver23⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ESEADriver24⤵PID:5076
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop FACEIT >nul 2>&12⤵PID:684
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop wireshark >nul 2>&12⤵PID:228
-
C:\Windows\system32\sc.exesc stop wireshark3⤵
- Launches sc.exe
PID:3136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2672
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
PID:3636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:856
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker2 >nul 2>&12⤵PID:4108
-
C:\Windows\system32\sc.exesc stop KProcessHacker23⤵
- Launches sc.exe
PID:4084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4292
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
PID:3268
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop FACEIT >nul 2>&12⤵PID:2804
-
C:\Windows\system32\net.exenet stop FACEIT3⤵PID:4712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop HTTPDebuggerPro >nul 2>&12⤵PID:548
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4252 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\system32\net.exenet stop FACEIT5⤵
- Suspicious use of WriteProcessMemory
PID:1340
-
-
-
C:\Windows\system32\net.exenet stop ESEADriver24⤵PID:1616
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop ESEADriver2 >nul 2>&12⤵PID:4140
-
C:\Windows\system32\net.exenet stop ESEADriver23⤵PID:3016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:3784
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
PID:2752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1832
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
PID:1652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:440
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
PID:1680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker3 >nul 2>&12⤵PID:956
-
C:\Windows\system32\sc.exesc stop KProcessHacker33⤵
- Launches sc.exe
PID:2344
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop FACEIT3⤵PID:4476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1992
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop ESEADriver2 >nul 2>&12⤵PID:216
-
C:\Windows\system32\net.exenet stop ESEADriver23⤵PID:3480
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop FACEIT >nul 2>&12⤵PID:876
-
C:\Windows\system32\net.exenet stop FACEIT3⤵PID:2108
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop FACEIT4⤵PID:5044
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker2 >nul 2>&12⤵PID:860
-
C:\Windows\system32\sc.exesc stop KProcessHacker23⤵
- Launches sc.exe
PID:4620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker1 >nul 2>&12⤵PID:3328
-
C:\Windows\system32\sc.exesc stop KProcessHacker13⤵
- Launches sc.exe
PID:632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:1384
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
PID:3544 -
C:\Windows\system32\sc.exesc stop npf4⤵
- Launches sc.exe
PID:1160
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:436
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
PID:3460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2404
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:1668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1276
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
PID:3284
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:912
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2796
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:1248
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker2 >nul 2>&12⤵PID:3724
-
C:\Windows\system32\sc.exesc stop KProcessHacker23⤵
- Launches sc.exe
PID:2504
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker3 >nul 2>&12⤵PID:852
-
C:\Windows\system32\sc.exesc stop KProcessHacker33⤵
- Launches sc.exe
PID:1136
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop wireshark >nul 2>&12⤵PID:3700
-
C:\Windows\system32\sc.exesc stop wireshark3⤵
- Launches sc.exe
PID:4500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4432
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
PID:2656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵PID:2472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:2740
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4996
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop npf >nul 2>&12⤵PID:1644
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker1 >nul 2>&12⤵PID:3716
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop ESEADriver2 >nul 2>&12⤵PID:4252
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop FACEIT >nul 2>&12⤵PID:4624
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop npf >nul 2>&12⤵PID:2144
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop wireshark >nul 2>&12⤵PID:3456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3828
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop npf >nul 2>&12⤵PID:4260
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop wireshark >nul 2>&12⤵PID:3708
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker1 >nul 2>&12⤵PID:1476
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker2 >nul 2>&12⤵PID:4428
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker3 >nul 2>&12⤵PID:2304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4372
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:3820
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop npf >nul 2>&12⤵PID:3544
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop wireshark >nul 2>&12⤵PID:3888
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker1 >nul 2>&12⤵PID:4328
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker3 >nul 2>&12⤵PID:1804
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3276
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop ESEADriver2 >nul 2>&12⤵PID:3180
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C net stop FACEIT >nul 2>&12⤵PID:2644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:3252
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop npf >nul 2>&12⤵PID:4264
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker1 >nul 2>&12⤵PID:1560
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker2 >nul 2>&12⤵PID:1764
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop KProcessHacker3 >nul 2>&12⤵PID:1428
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2304
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop FACEIT1⤵PID:2412
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro1⤵
- Launches sc.exe
PID:2440
-
C:\Windows\system32\sc.exesc stop KProcessHacker31⤵
- Launches sc.exe
PID:3028
-
C:\Windows\system32\sc.exesc stop KProcessHacker11⤵
- Launches sc.exe
PID:3708 -
C:\Windows\system32\sc.exesc stop wireshark2⤵
- Launches sc.exe
PID:2492
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe1⤵
- Kills process with taskkill
PID:4736
-
C:\Windows\system32\sc.exesc stop npf1⤵
- Launches sc.exe
PID:2928
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T1⤵
- Kills process with taskkill
PID:1836 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro2⤵
- Launches sc.exe
PID:4604
-
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T1⤵
- Kills process with taskkill
PID:1596
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T1⤵
- Kills process with taskkill
PID:2708
-
C:\Windows\system32\net.exenet stop FACEIT1⤵PID:956
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ESEADriver21⤵PID:3920
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe1⤵
- Kills process with taskkill
PID:4208
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T1⤵
- Kills process with taskkill
PID:880
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T1⤵
- Kills process with taskkill
PID:4544
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T1⤵
- Kills process with taskkill
PID:1360
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop FACEIT1⤵PID:3224
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe1⤵
- Kills process with taskkill
PID:3636
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro1⤵
- Launches sc.exe
PID:1100
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T1⤵
- Kills process with taskkill
PID:4604
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T1⤵
- Kills process with taskkill
PID:4732
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T1⤵
- Kills process with taskkill
PID:4360
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ESEADriver21⤵PID:4084
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T1⤵
- Kills process with taskkill
PID:3900
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T1⤵
- Kills process with taskkill
PID:3664
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop FACEIT1⤵PID:2084
-
C:\Windows\system32\net.exenet stop FACEIT1⤵PID:1560
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ESEADriver21⤵PID:1768
-
C:\Windows\system32\sc.exesc stop npf1⤵
- Launches sc.exe
PID:2964
-
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe1⤵
- Kills process with taskkill
PID:1100 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro2⤵
- Launches sc.exe
PID:3692
-
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T1⤵
- Kills process with taskkill
PID:2520
-
C:\Windows\system32\find.exefind /i /v "certutil"1⤵PID:4236
-
C:\Windows\system32\find.exefind /i /v "md5"1⤵PID:4760
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Loader.exe" MD51⤵PID:3936
-
C:\Windows\system32\sc.exesc stop KProcessHacker11⤵
- Launches sc.exe
PID:2928
-
C:\Windows\system32\sc.exesc stop npf1⤵
- Launches sc.exe
PID:4440
-
C:\Windows\system32\sc.exesc stop wireshark1⤵
- Launches sc.exe
PID:3780
-
C:\Windows\system32\sc.exesc stop npf1⤵
- Launches sc.exe
PID:2648
-
C:\Windows\system32\sc.exesc stop KProcessHacker11⤵
- Launches sc.exe
PID:1880
-
C:\Windows\system32\sc.exesc stop KProcessHacker21⤵
- Launches sc.exe
PID:3696
-
C:\Windows\system32\sc.exesc stop KProcessHacker31⤵
- Launches sc.exe
PID:5000
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ESEADriver21⤵PID:3028
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro1⤵
- Launches sc.exe
PID:4036
-
C:\Windows\system32\sc.exesc stop wireshark1⤵
- Launches sc.exe
PID:1904
-
C:\Windows\system32\sc.exesc stop KProcessHacker11⤵
- Launches sc.exe
PID:2604
-
C:\Windows\system32\sc.exesc stop KProcessHacker31⤵
- Launches sc.exe
PID:1992
-
C:\Windows\system32\net.exenet stop ESEADriver21⤵PID:4024
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro1⤵
- Launches sc.exe
PID:3168
-
C:\Windows\system32\sc.exesc stop KProcessHacker21⤵
- Launches sc.exe
PID:1248
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Defense Evasion
Impair Defenses
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1