Overview
overview
9Static
static
3Cleaner1 R...IN.bat
windows7-x64
8Cleaner1 R...IN.bat
windows10-2004-x64
8Cleaner2.bat
windows7-x64
7Cleaner2.bat
windows10-2004-x64
1Cleaner3.bat
windows7-x64
1Cleaner3.bat
windows10-2004-x64
1Cleaner4.bat
windows7-x64
8Cleaner4.bat
windows10-2004-x64
8Cleaner5.bat
windows7-x64
7Cleaner5.bat
windows10-2004-x64
5Cleaner6.bat
windows7-x64
7Cleaner6.bat
windows10-2004-x64
7Cleaner7.bat
windows7-x64
8Cleaner7.bat
windows10-2004-x64
8MAC.cmd
windows7-x64
1MAC.cmd
windows10-2004-x64
1PH Spoofer.exe
windows7-x64
9PH Spoofer.exe
windows10-2004-x64
9Analysis
-
max time kernel
66s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
Cleaner1 RUN ALL AS ADMIN.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Cleaner1 RUN ALL AS ADMIN.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Cleaner2.bat
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Cleaner2.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Cleaner3.bat
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Cleaner3.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Cleaner4.bat
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Cleaner4.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Cleaner5.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Cleaner5.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
Cleaner6.bat
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Cleaner6.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Cleaner7.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Cleaner7.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
MAC.cmd
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
MAC.cmd
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
PH Spoofer.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
PH Spoofer.exe
Resource
win10v2004-20240426-en
General
-
Target
Cleaner7.bat
-
Size
253KB
-
MD5
c26c52657c60cd9590dc11c8d6f563a5
-
SHA1
7517d767b64d983fa28545dbedb76c937049e775
-
SHA256
54ed81f8e76aba8298bd302f872b4e1bbabaee272575c39e0f18ddc23ad6c2f3
-
SHA512
8844ec48ee632c59d4cd7421856e4cd160bdea86e4100fac72ae321cd6cb934352f85aaa3b727fd17a9e96c10592c013d44fe12d5850edfbc479df23b92cf00a
-
SSDEEP
1536:VNoZxBOz2oCfgCWfr3bwUWgn8q01L5LvLpLjL5sff4oH9sffzs:UfgCW4UWgnh4oH9qzs
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 4540 sc.exe 4396 sc.exe 60 sc.exe 432 sc.exe -
Kills process with taskkill 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4236 taskkill.exe 2108 taskkill.exe 1436 taskkill.exe 3820 taskkill.exe 5068 taskkill.exe 2044 taskkill.exe 2492 taskkill.exe 1864 taskkill.exe 4860 taskkill.exe 3368 taskkill.exe 2852 taskkill.exe 552 taskkill.exe 4244 taskkill.exe 3012 taskkill.exe 4768 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2108 taskkill.exe Token: SeDebugPrivilege 4860 taskkill.exe Token: SeDebugPrivilege 1436 taskkill.exe Token: SeDebugPrivilege 552 taskkill.exe Token: SeDebugPrivilege 3368 taskkill.exe Token: SeDebugPrivilege 3820 taskkill.exe Token: SeDebugPrivilege 4244 taskkill.exe Token: SeDebugPrivilege 5068 taskkill.exe Token: SeDebugPrivilege 1864 taskkill.exe Token: SeDebugPrivilege 2044 taskkill.exe Token: SeDebugPrivilege 3012 taskkill.exe Token: SeDebugPrivilege 2492 taskkill.exe Token: SeDebugPrivilege 4768 taskkill.exe Token: SeDebugPrivilege 4236 taskkill.exe Token: SeDebugPrivilege 2852 taskkill.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
cmd.exedescription pid process target process PID 2652 wrote to memory of 3864 2652 cmd.exe cacls.exe PID 2652 wrote to memory of 3864 2652 cmd.exe cacls.exe PID 2652 wrote to memory of 2108 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 2108 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 4860 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 4860 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 1436 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 1436 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 552 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 552 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 3368 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 3368 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 3820 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 3820 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 4244 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 4244 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 5068 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 5068 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 1864 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 1864 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 2044 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 2044 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 3012 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 3012 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 2492 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 2492 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 4768 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 4768 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 4236 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 4236 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 2852 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 2852 2652 cmd.exe taskkill.exe PID 2652 wrote to memory of 60 2652 cmd.exe sc.exe PID 2652 wrote to memory of 60 2652 cmd.exe sc.exe PID 2652 wrote to memory of 432 2652 cmd.exe sc.exe PID 2652 wrote to memory of 432 2652 cmd.exe sc.exe PID 2652 wrote to memory of 4540 2652 cmd.exe sc.exe PID 2652 wrote to memory of 4540 2652 cmd.exe sc.exe PID 2652 wrote to memory of 4396 2652 cmd.exe sc.exe PID 2652 wrote to memory of 4396 2652 cmd.exe sc.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Cleaner7.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:3864
-
C:\Windows\system32\taskkill.exetaskkill /f /im epicgameslauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_EAC.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4860 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_BE.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:552 -
C:\Windows\system32\taskkill.exetaskkill /f /im OneDrive.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3368 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4244 -
C:\Windows\system32\taskkill.exetaskkill /f /im UnrealCEFSubProcess.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5068 -
C:\Windows\system32\taskkill.exetaskkill /f /im CEFProcess.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Windows\system32\taskkill.exetaskkill /f /im BEService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Windows\system32\taskkill.exetaskkill /f /im BEServices.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2492 -
C:\Windows\system32\taskkill.exetaskkill /f /im BattleEye.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4768 -
C:\Windows\system32\taskkill.exetaskkill /f /im PerfWatson2.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Windows\system32\taskkill.exetaskkill /f /im vgtray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852 -
C:\Windows\system32\sc.exeSc stop EasyAntiCheat2⤵
- Launches sc.exe
PID:60 -
C:\Windows\system32\sc.exeSc stop FortniteClient-Win64-Shipping_EAC2⤵
- Launches sc.exe
PID:432 -
C:\Windows\system32\sc.exeSc stop BattleEye2⤵
- Launches sc.exe
PID:4540 -
C:\Windows\system32\sc.exeSc stop FortniteClient-Win64-Shipping_BE2⤵
- Launches sc.exe
PID:4396