Overview
overview
9Static
static
3PH Spoofer1.1.rar
windows7-x64
3PH Spoofer1.1.rar
windows10-2004-x64
3Cleaner1 R...IN.bat
windows7-x64
8Cleaner1 R...IN.bat
windows10-2004-x64
8Cleaner2.bat
windows7-x64
7Cleaner2.bat
windows10-2004-x64
1Cleaner3.bat
windows7-x64
1Cleaner3.bat
windows10-2004-x64
1Cleaner4.bat
windows7-x64
8Cleaner4.bat
windows10-2004-x64
8Cleaner5.bat
windows7-x64
7Cleaner5.bat
windows10-2004-x64
5Cleaner6.bat
windows7-x64
7Cleaner6.bat
windows10-2004-x64
7Cleaner7.bat
windows7-x64
8Cleaner7.bat
windows10-2004-x64
8MAC.cmd
windows7-x64
1MAC.cmd
windows10-2004-x64
1PH Spoofer.exe
windows7-x64
9PH Spoofer.exe
windows10-2004-x64
9Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
PH Spoofer1.1.rar
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
PH Spoofer1.1.rar
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Cleaner1 RUN ALL AS ADMIN.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Cleaner1 RUN ALL AS ADMIN.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Cleaner2.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Cleaner2.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Cleaner3.bat
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
Cleaner3.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Cleaner4.bat
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Cleaner4.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
Cleaner5.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Cleaner5.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Cleaner6.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Cleaner6.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
Cleaner7.bat
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
Cleaner7.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
MAC.cmd
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
MAC.cmd
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
PH Spoofer.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
PH Spoofer.exe
Resource
win10v2004-20240419-en
General
-
Target
Cleaner4.bat
-
Size
111KB
-
MD5
7d29dc3ace16b45ae3b437cf8aa7d65f
-
SHA1
fbcfde13c5522d808c321c58291cfa962f104655
-
SHA256
317142fae707cbac948083d56b1163aa5a6a1b9270031d9e49ea79214ebe99ef
-
SHA512
333d36985afdbe68fbe455d3f59cbe6fc77b0669de44194e07ca28dece06505a1bd5c354ef132df70b936f7ba2740241046b75ab86afbd4728c0da5371e576d9
-
SSDEEP
768:zo9R/KZzmezF/svUsfg8gVhCBL1oPYdxCA1n5xpoL8oPlRPrPEPupL5LvLpLjLg3:E9xg8gUDRnvplQL5LvLpLjLnC
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2928 netsh.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1684 cmd.exe -
Kills process with taskkill 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2504 taskkill.exe 2696 taskkill.exe 2560 taskkill.exe 2512 taskkill.exe 2412 taskkill.exe 2332 taskkill.exe 2544 taskkill.exe 2508 taskkill.exe 2232 taskkill.exe 2728 taskkill.exe 776 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2332 taskkill.exe Token: SeDebugPrivilege 2544 taskkill.exe Token: SeDebugPrivilege 2504 taskkill.exe Token: SeDebugPrivilege 2696 taskkill.exe Token: SeDebugPrivilege 2508 taskkill.exe Token: SeDebugPrivilege 2232 taskkill.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 2728 taskkill.exe Token: SeDebugPrivilege 776 taskkill.exe Token: SeDebugPrivilege 2512 taskkill.exe Token: SeDebugPrivilege 2412 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exedescription pid process target process PID 1684 wrote to memory of 2316 1684 cmd.exe cacls.exe PID 1684 wrote to memory of 2316 1684 cmd.exe cacls.exe PID 1684 wrote to memory of 2316 1684 cmd.exe cacls.exe PID 1684 wrote to memory of 2332 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2332 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2332 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2544 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2544 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2544 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2504 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2504 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2504 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2696 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2696 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2696 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2508 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2508 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2508 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2232 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2232 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2232 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2560 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2560 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2560 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2728 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2728 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2728 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 776 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 776 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 776 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2512 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2512 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2512 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2412 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2412 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2412 1684 cmd.exe taskkill.exe PID 1684 wrote to memory of 2476 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2476 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2476 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1048 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1048 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1048 1684 cmd.exe reg.exe PID 1684 wrote to memory of 3000 1684 cmd.exe reg.exe PID 1684 wrote to memory of 3000 1684 cmd.exe reg.exe PID 1684 wrote to memory of 3000 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2452 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2452 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2452 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2920 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2920 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2920 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1324 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1324 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1324 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1448 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1448 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1448 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1832 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1832 1684 cmd.exe reg.exe PID 1684 wrote to memory of 1832 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2292 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2292 1684 cmd.exe reg.exe PID 1684 wrote to memory of 2292 1684 cmd.exe reg.exe PID 1684 wrote to memory of 824 1684 cmd.exe reg.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Cleaner4.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:2316
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im epicgameslauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EpicWebHelper.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_EAC.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_BE.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEServices.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im BattleEye.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\ControlSet001\Services\EpicOnlineServices" /f2⤵PID:2476
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Epic Games" /f2⤵PID:1048
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\com.epicgames.launcher" /f2⤵PID:3000
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\ControlSet001\Services\BEService" /f2⤵PID:2452
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\ControlSet001\Services\BEDaisy" /f2⤵PID:2920
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\BEDaisy" /f2⤵PID:1324
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\ControlSet001\Services\EasyAntiCheat" /f2⤵PID:1448
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\EasyAntiCheat" /f2⤵PID:1832
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\BEService" /f2⤵PID:2292
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\WOW6432Node\EasyAntiCheat" /f2⤵PID:824
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\WOW6432Node\Epic Games" /f2⤵PID:2756
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\microphone\NonPackaged" /f2⤵PID:2488
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\RADAR\HeapLeakDetection\DiagnosedApplications" /f2⤵PID:2580
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\com.epicgames.launcher" /f2⤵PID:2780
-
-
C:\Windows\system32\reg.exereg delete "HKCR\com.epicgames.eos" /f2⤵PID:2796
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\RADAR\HeapLeakDetection\DiagnosedApplications" /f2⤵PID:2908
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-18\Software\Epic Games" /f2⤵PID:2896
-
-
C:\Windows\system32\netsh.exenetsh advfirewall reset2⤵
- Modifies Windows Firewall
PID:2928
-