Overview
overview
10Static
static
7Badware Wo...ee.exe
windows7-x64
5Badware Wo...ee.exe
windows10-2004-x64
5Badware Wo...er.bat
windows7-x64
1Badware Wo...er.bat
windows10-2004-x64
1Badware Wo...er.exe
windows7-x64
9Badware Wo...er.exe
windows10-2004-x64
9Badware Wo...EL.exe
windows7-x64
9Badware Wo...EL.exe
windows10-2004-x64
9Badware Wo...er.exe
windows7-x64
10Badware Wo...er.exe
windows10-2004-x64
10Badware Wo...er.exe
windows7-x64
10Badware Wo...er.exe
windows10-2004-x64
10Badware Wo...er.exe
windows7-x64
9Badware Wo...er.exe
windows10-2004-x64
9Badware Wo...er.bat
windows7-x64
8Badware Wo...er.bat
windows10-2004-x64
8Badware Wo...er.bat
windows7-x64
1Badware Wo...er.bat
windows10-2004-x64
1Badware Wo...er.exe
windows7-x64
7Badware Wo...er.exe
windows10-2004-x64
10Badware Wo...ol.bat
windows7-x64
8Badware Wo...ol.bat
windows10-2004-x64
8Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 00:13
Behavioral task
behavioral1
Sample
Badware Woofer/BadwareFree.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Badware Woofer/BadwareFree.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Badware Woofer/Serials_Checker.bat
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Badware Woofer/Serials_Checker.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Badware Woofer/cleaners/AppleCleaner.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Badware Woofer/cleaners/AppleCleaner.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Badware Woofer/cleaners/AppleS5-DEL.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Badware Woofer/cleaners/AppleS5-DEL.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Badware Woofer/cleaners/BadwareCleaner.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Badware Woofer/cleaners/BadwareCleaner.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Badware Woofer/cleaners/BadwareDeepCleaner.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Badware Woofer/cleaners/BadwareDeepCleaner.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Badware Woofer/cleaners/EventCleaner.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
Badware Woofer/cleaners/EventCleaner.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Badware Woofer/cleaners/Fivem-Cleaner.bat
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
Badware Woofer/cleaners/Fivem-Cleaner.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Badware Woofer/cleaners/FortniteCleaner.bat
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Badware Woofer/cleaners/FortniteCleaner.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Badware Woofer/cleaners/NXTcleaner.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Badware Woofer/cleaners/NXTcleaner.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Badware Woofer/cleaners/full deep cleaner by nigga mhatt lol.bat
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Badware Woofer/cleaners/full deep cleaner by nigga mhatt lol.bat
Resource
win10v2004-20240226-en
General
-
Target
Badware Woofer/cleaners/full deep cleaner by nigga mhatt lol.bat
-
Size
902KB
-
MD5
602ac0bd731b2615933dde1442e96ff7
-
SHA1
586be9b5bb086aa301eea7df5ee998390756b912
-
SHA256
97c781dfaa813232a8d13f7dcdfd1490f355ab85823b2cd73b9dd259d3a1ad07
-
SHA512
d5cee12b3c99cae442808c463636faa0f96cdae24d6caff13fd5e27a40f74ce58cd15f43430d5ebd15d968588d491dee17bb31b3f7c19ed7d55e2882a25d30eb
-
SSDEEP
3072:kOW9mafKzoz3g8gzRnvplYSc5mzozEzoz6zozn:5ykyuykyn
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4592 sc.exe -
Kills process with taskkill 40 IoCs
pid Process 3100 taskkill.exe 820 taskkill.exe 3852 taskkill.exe 2980 taskkill.exe 2280 taskkill.exe 3828 taskkill.exe 3564 taskkill.exe 4952 taskkill.exe 2880 taskkill.exe 1496 taskkill.exe 4572 taskkill.exe 1540 taskkill.exe 2256 taskkill.exe 4244 taskkill.exe 5100 taskkill.exe 5080 taskkill.exe 3960 taskkill.exe 2196 taskkill.exe 4856 taskkill.exe 4440 taskkill.exe 3316 taskkill.exe 3404 taskkill.exe 4532 taskkill.exe 1632 taskkill.exe 1720 taskkill.exe 2420 taskkill.exe 1596 taskkill.exe 4684 taskkill.exe 2532 taskkill.exe 4584 taskkill.exe 4300 taskkill.exe 3152 taskkill.exe 4820 taskkill.exe 3372 taskkill.exe 4372 taskkill.exe 896 taskkill.exe 3572 taskkill.exe 2760 taskkill.exe 4068 taskkill.exe 2344 taskkill.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3100 reg.exe 4540 reg.exe 2988 reg.exe 3968 reg.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeDebugPrivilege 3960 taskkill.exe Token: SeDebugPrivilege 4572 taskkill.exe Token: SeDebugPrivilege 2344 taskkill.exe Token: SeDebugPrivilege 1540 taskkill.exe Token: SeDebugPrivilege 2532 taskkill.exe Token: SeDebugPrivilege 4532 taskkill.exe Token: SeDebugPrivilege 3372 taskkill.exe Token: SeDebugPrivilege 4440 taskkill.exe Token: SeDebugPrivilege 2280 taskkill.exe Token: SeDebugPrivilege 4372 taskkill.exe Token: SeDebugPrivilege 3100 taskkill.exe Token: SeDebugPrivilege 4820 taskkill.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 1632 taskkill.exe Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 2420 taskkill.exe Token: SeDebugPrivilege 3828 taskkill.exe Token: SeDebugPrivilege 896 taskkill.exe Token: SeDebugPrivilege 820 taskkill.exe Token: SeDebugPrivilege 3852 taskkill.exe Token: SeDebugPrivilege 2256 taskkill.exe Token: SeDebugPrivilege 3572 taskkill.exe Token: SeDebugPrivilege 2980 taskkill.exe Token: SeDebugPrivilege 1596 taskkill.exe Token: SeDebugPrivilege 3316 taskkill.exe Token: SeDebugPrivilege 2196 taskkill.exe Token: SeDebugPrivilege 3564 taskkill.exe Token: SeDebugPrivilege 4584 taskkill.exe Token: SeDebugPrivilege 4952 taskkill.exe Token: SeDebugPrivilege 4244 taskkill.exe Token: SeDebugPrivilege 4684 taskkill.exe Token: SeDebugPrivilege 5100 taskkill.exe Token: SeDebugPrivilege 4300 taskkill.exe Token: SeDebugPrivilege 2880 taskkill.exe Token: SeDebugPrivilege 2760 taskkill.exe Token: SeDebugPrivilege 3404 taskkill.exe Token: SeDebugPrivilege 3152 taskkill.exe Token: SeDebugPrivilege 5080 taskkill.exe Token: SeDebugPrivilege 4856 taskkill.exe Token: SeDebugPrivilege 4068 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 3960 4776 cmd.exe 89 PID 4776 wrote to memory of 3960 4776 cmd.exe 89 PID 4776 wrote to memory of 4572 4776 cmd.exe 91 PID 4776 wrote to memory of 4572 4776 cmd.exe 91 PID 4776 wrote to memory of 2344 4776 cmd.exe 92 PID 4776 wrote to memory of 2344 4776 cmd.exe 92 PID 4776 wrote to memory of 1540 4776 cmd.exe 93 PID 4776 wrote to memory of 1540 4776 cmd.exe 93 PID 4776 wrote to memory of 2532 4776 cmd.exe 94 PID 4776 wrote to memory of 2532 4776 cmd.exe 94 PID 4776 wrote to memory of 4532 4776 cmd.exe 96 PID 4776 wrote to memory of 4532 4776 cmd.exe 96 PID 4776 wrote to memory of 3372 4776 cmd.exe 97 PID 4776 wrote to memory of 3372 4776 cmd.exe 97 PID 4776 wrote to memory of 4440 4776 cmd.exe 98 PID 4776 wrote to memory of 4440 4776 cmd.exe 98 PID 4776 wrote to memory of 2280 4776 cmd.exe 99 PID 4776 wrote to memory of 2280 4776 cmd.exe 99 PID 4776 wrote to memory of 4372 4776 cmd.exe 100 PID 4776 wrote to memory of 4372 4776 cmd.exe 100 PID 4776 wrote to memory of 3100 4776 cmd.exe 101 PID 4776 wrote to memory of 3100 4776 cmd.exe 101 PID 4776 wrote to memory of 4820 4776 cmd.exe 102 PID 4776 wrote to memory of 4820 4776 cmd.exe 102 PID 4776 wrote to memory of 1496 4776 cmd.exe 103 PID 4776 wrote to memory of 1496 4776 cmd.exe 103 PID 4776 wrote to memory of 1632 4776 cmd.exe 104 PID 4776 wrote to memory of 1632 4776 cmd.exe 104 PID 4776 wrote to memory of 1720 4776 cmd.exe 105 PID 4776 wrote to memory of 1720 4776 cmd.exe 105 PID 4776 wrote to memory of 2420 4776 cmd.exe 107 PID 4776 wrote to memory of 2420 4776 cmd.exe 107 PID 4776 wrote to memory of 3828 4776 cmd.exe 108 PID 4776 wrote to memory of 3828 4776 cmd.exe 108 PID 4776 wrote to memory of 896 4776 cmd.exe 109 PID 4776 wrote to memory of 896 4776 cmd.exe 109 PID 4776 wrote to memory of 820 4776 cmd.exe 110 PID 4776 wrote to memory of 820 4776 cmd.exe 110 PID 4776 wrote to memory of 3852 4776 cmd.exe 111 PID 4776 wrote to memory of 3852 4776 cmd.exe 111 PID 4776 wrote to memory of 2256 4776 cmd.exe 112 PID 4776 wrote to memory of 2256 4776 cmd.exe 112 PID 4776 wrote to memory of 3572 4776 cmd.exe 113 PID 4776 wrote to memory of 3572 4776 cmd.exe 113 PID 4776 wrote to memory of 2980 4776 cmd.exe 115 PID 4776 wrote to memory of 2980 4776 cmd.exe 115 PID 4776 wrote to memory of 1596 4776 cmd.exe 116 PID 4776 wrote to memory of 1596 4776 cmd.exe 116 PID 4776 wrote to memory of 3316 4776 cmd.exe 117 PID 4776 wrote to memory of 3316 4776 cmd.exe 117 PID 4776 wrote to memory of 2196 4776 cmd.exe 118 PID 4776 wrote to memory of 2196 4776 cmd.exe 118 PID 4776 wrote to memory of 3564 4776 cmd.exe 119 PID 4776 wrote to memory of 3564 4776 cmd.exe 119 PID 4776 wrote to memory of 4584 4776 cmd.exe 120 PID 4776 wrote to memory of 4584 4776 cmd.exe 120 PID 4776 wrote to memory of 4952 4776 cmd.exe 121 PID 4776 wrote to memory of 4952 4776 cmd.exe 121 PID 4776 wrote to memory of 4244 4776 cmd.exe 122 PID 4776 wrote to memory of 4244 4776 cmd.exe 122 PID 4776 wrote to memory of 4684 4776 cmd.exe 123 PID 4776 wrote to memory of 4684 4776 cmd.exe 123 PID 4776 wrote to memory of 5100 4776 cmd.exe 124 PID 4776 wrote to memory of 5100 4776 cmd.exe 124
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Badware Woofer\cleaners\full deep cleaner by nigga mhatt lol.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\system32\taskkill.exetaskkill /f /im epicgameslauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_EAC.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_BE.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im UnrealCEFSubProcess.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im CEFProcess.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEServices.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BattleEye.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im smartscreen.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im smartscreen.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnf.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im DNF.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im CrossProxy.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im tensafe_1.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im TenSafe_1.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im tensafe_2.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im tencentdl.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im TenioDL.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im uishell.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BackgroundDownloader.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im conime.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im QQDL.EXE2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im qqlogin.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnfchina.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnfchinatest.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnf.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im txplatform.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im TXPlatform.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OriginWebHelperService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im Origin.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OriginClientService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OriginER.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OriginThinSetupInternal.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im OriginLegacyCLI.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im Agent.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im Client.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\system32\sc.exeSc stop EasyAntiCheat2⤵
- Launches sc.exe
PID:4592
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v HwProfileGuid /t REG_SZ /d {20318-12441-20926-1917} /f2⤵
- Modifies registry key
PID:4540
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v GUID /t REG_SZ /d {9129-15388-31816-28138} /f2⤵
- Modifies registry key
PID:2988
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v GUID /t REG_SZ /d 22151-10326-871-26218 /f2⤵
- Modifies registry key
PID:3968
-
-
C:\Windows\system32\reg.exeREG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v MachineGuid /t REG_SZ /d 28588-20534-16412-26767 /f2⤵
- Modifies registry key
PID:3100
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:3356
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\com.epicgames.launcher" /f2⤵PID:4852
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\EpicGames" /f2⤵PID:3588
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Epic Games" /f2⤵PID:4368
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CLASSES_ROOT\com.epicgames.launcher" /f2⤵PID:1532
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" /f2⤵PID:1160
-