Overview
overview
9Static
static
3Cleaner1 R...IN.bat
windows7-x64
8Cleaner1 R...IN.bat
windows10-2004-x64
8Cleaner2.bat
windows7-x64
7Cleaner2.bat
windows10-2004-x64
1Cleaner3.bat
windows7-x64
1Cleaner3.bat
windows10-2004-x64
1Cleaner4.bat
windows7-x64
8Cleaner4.bat
windows10-2004-x64
8Cleaner5.bat
windows7-x64
7Cleaner5.bat
windows10-2004-x64
5Cleaner6.bat
windows7-x64
7Cleaner6.bat
windows10-2004-x64
7Cleaner7.bat
windows7-x64
8Cleaner7.bat
windows10-2004-x64
8MAC.cmd
windows7-x64
1MAC.cmd
windows10-2004-x64
1PH Spoofer.exe
windows7-x64
9PH Spoofer.exe
windows10-2004-x64
9Analysis
-
max time kernel
25s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
Cleaner1 RUN ALL AS ADMIN.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Cleaner1 RUN ALL AS ADMIN.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Cleaner2.bat
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Cleaner2.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Cleaner3.bat
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Cleaner3.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Cleaner4.bat
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Cleaner4.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Cleaner5.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Cleaner5.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
Cleaner6.bat
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Cleaner6.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Cleaner7.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Cleaner7.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
MAC.cmd
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
MAC.cmd
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
PH Spoofer.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
PH Spoofer.exe
Resource
win10v2004-20240426-en
General
-
Target
MAC.cmd
-
Size
2KB
-
MD5
9bb3424ce0882c73682a407477af163e
-
SHA1
c50786f19c4301d186db5fc1b56b8824013f1207
-
SHA256
9c1cc4852d290f352f4ba6c6eca68a4ffb1fc19a514fbbda644855a7f23c0c61
-
SHA512
f530673e63f10f684416624f53aeeda6430a552d2d32b776f026e42f34e28b7f9f19bc6c61298dfaf0b5e1c104ad681433997646a277f889c9af2df9cec601ce
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 2580 WMIC.exe Token: SeSecurityPrivilege 2580 WMIC.exe Token: SeTakeOwnershipPrivilege 2580 WMIC.exe Token: SeLoadDriverPrivilege 2580 WMIC.exe Token: SeSystemProfilePrivilege 2580 WMIC.exe Token: SeSystemtimePrivilege 2580 WMIC.exe Token: SeProfSingleProcessPrivilege 2580 WMIC.exe Token: SeIncBasePriorityPrivilege 2580 WMIC.exe Token: SeCreatePagefilePrivilege 2580 WMIC.exe Token: SeBackupPrivilege 2580 WMIC.exe Token: SeRestorePrivilege 2580 WMIC.exe Token: SeShutdownPrivilege 2580 WMIC.exe Token: SeDebugPrivilege 2580 WMIC.exe Token: SeSystemEnvironmentPrivilege 2580 WMIC.exe Token: SeRemoteShutdownPrivilege 2580 WMIC.exe Token: SeUndockPrivilege 2580 WMIC.exe Token: SeManageVolumePrivilege 2580 WMIC.exe Token: 33 2580 WMIC.exe Token: 34 2580 WMIC.exe Token: 35 2580 WMIC.exe Token: SeIncreaseQuotaPrivilege 2580 WMIC.exe Token: SeSecurityPrivilege 2580 WMIC.exe Token: SeTakeOwnershipPrivilege 2580 WMIC.exe Token: SeLoadDriverPrivilege 2580 WMIC.exe Token: SeSystemProfilePrivilege 2580 WMIC.exe Token: SeSystemtimePrivilege 2580 WMIC.exe Token: SeProfSingleProcessPrivilege 2580 WMIC.exe Token: SeIncBasePriorityPrivilege 2580 WMIC.exe Token: SeCreatePagefilePrivilege 2580 WMIC.exe Token: SeBackupPrivilege 2580 WMIC.exe Token: SeRestorePrivilege 2580 WMIC.exe Token: SeShutdownPrivilege 2580 WMIC.exe Token: SeDebugPrivilege 2580 WMIC.exe Token: SeSystemEnvironmentPrivilege 2580 WMIC.exe Token: SeRemoteShutdownPrivilege 2580 WMIC.exe Token: SeUndockPrivilege 2580 WMIC.exe Token: SeManageVolumePrivilege 2580 WMIC.exe Token: 33 2580 WMIC.exe Token: 34 2580 WMIC.exe Token: 35 2580 WMIC.exe Token: SeIncreaseQuotaPrivilege 2556 WMIC.exe Token: SeSecurityPrivilege 2556 WMIC.exe Token: SeTakeOwnershipPrivilege 2556 WMIC.exe Token: SeLoadDriverPrivilege 2556 WMIC.exe Token: SeSystemProfilePrivilege 2556 WMIC.exe Token: SeSystemtimePrivilege 2556 WMIC.exe Token: SeProfSingleProcessPrivilege 2556 WMIC.exe Token: SeIncBasePriorityPrivilege 2556 WMIC.exe Token: SeCreatePagefilePrivilege 2556 WMIC.exe Token: SeBackupPrivilege 2556 WMIC.exe Token: SeRestorePrivilege 2556 WMIC.exe Token: SeShutdownPrivilege 2556 WMIC.exe Token: SeDebugPrivilege 2556 WMIC.exe Token: SeSystemEnvironmentPrivilege 2556 WMIC.exe Token: SeRemoteShutdownPrivilege 2556 WMIC.exe Token: SeUndockPrivilege 2556 WMIC.exe Token: SeManageVolumePrivilege 2556 WMIC.exe Token: 33 2556 WMIC.exe Token: 34 2556 WMIC.exe Token: 35 2556 WMIC.exe Token: SeIncreaseQuotaPrivilege 2556 WMIC.exe Token: SeSecurityPrivilege 2556 WMIC.exe Token: SeTakeOwnershipPrivilege 2556 WMIC.exe Token: SeLoadDriverPrivilege 2556 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.execmd.execmd.execmd.exedescription pid process target process PID 2180 wrote to memory of 1048 2180 cmd.exe mode.com PID 2180 wrote to memory of 1048 2180 cmd.exe mode.com PID 2180 wrote to memory of 1048 2180 cmd.exe mode.com PID 2180 wrote to memory of 2060 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2060 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2060 2180 cmd.exe cmd.exe PID 2060 wrote to memory of 2580 2060 cmd.exe WMIC.exe PID 2060 wrote to memory of 2580 2060 cmd.exe WMIC.exe PID 2060 wrote to memory of 2580 2060 cmd.exe WMIC.exe PID 2060 wrote to memory of 2568 2060 cmd.exe findstr.exe PID 2060 wrote to memory of 2568 2060 cmd.exe findstr.exe PID 2060 wrote to memory of 2568 2060 cmd.exe findstr.exe PID 2180 wrote to memory of 2696 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2696 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2696 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2684 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2684 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2684 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2448 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2448 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2448 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2660 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2660 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2660 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2864 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2864 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2864 2180 cmd.exe cmd.exe PID 2864 wrote to memory of 2556 2864 cmd.exe WMIC.exe PID 2864 wrote to memory of 2556 2864 cmd.exe WMIC.exe PID 2864 wrote to memory of 2556 2864 cmd.exe WMIC.exe PID 2864 wrote to memory of 2692 2864 cmd.exe findstr.exe PID 2864 wrote to memory of 2692 2864 cmd.exe findstr.exe PID 2864 wrote to memory of 2692 2864 cmd.exe findstr.exe PID 2180 wrote to memory of 1936 2180 cmd.exe reg.exe PID 2180 wrote to memory of 1936 2180 cmd.exe reg.exe PID 2180 wrote to memory of 1936 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2680 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2680 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2680 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2612 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2612 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2612 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2608 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2608 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2608 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2488 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2488 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2488 2180 cmd.exe cmd.exe PID 2488 wrote to memory of 2552 2488 cmd.exe WMIC.exe PID 2488 wrote to memory of 2552 2488 cmd.exe WMIC.exe PID 2488 wrote to memory of 2552 2488 cmd.exe WMIC.exe PID 2180 wrote to memory of 1948 2180 cmd.exe netsh.exe PID 2180 wrote to memory of 1948 2180 cmd.exe netsh.exe PID 2180 wrote to memory of 1948 2180 cmd.exe netsh.exe PID 2180 wrote to memory of 1048 2180 cmd.exe mode.com PID 2180 wrote to memory of 1048 2180 cmd.exe mode.com PID 2180 wrote to memory of 1048 2180 cmd.exe mode.com PID 2180 wrote to memory of 2060 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2060 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2060 2180 cmd.exe cmd.exe PID 2060 wrote to memory of 2580 2060 cmd.exe WMIC.exe PID 2060 wrote to memory of 2580 2060 cmd.exe WMIC.exe PID 2060 wrote to memory of 2580 2060 cmd.exe WMIC.exe PID 2060 wrote to memory of 2568 2060 cmd.exe findstr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MAC.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\system32\mode.commode con: cols=60 lines=82⤵PID:1048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]2⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\System32\Wbem\WMIC.exewmic nic where physicaladapter=true get deviceid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\system32\findstr.exefindstr [0-9]3⤵PID:2568
-
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\072⤵PID:2696
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0072⤵PID:2684
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\00072⤵PID:2448
-
-
C:\Windows\system32\reg.exeREG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007 /v NetworkAddress /t REG_SZ /d 96AB9D6017BD /f2⤵PID:2660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\Wbem\WMIC.exewmic nic where physicaladapter=true get deviceid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\system32\findstr.exefindstr [0-9]3⤵PID:2692
-
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\072⤵PID:1936
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0072⤵PID:2680
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\00072⤵PID:2612
-
-
C:\Windows\system32\reg.exeREG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0007 /v PnPCapabilities /t REG_DWORD /d 24 /f2⤵PID:2608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv"2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\System32\Wbem\WMIC.exewmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv3⤵PID:2552
-
-
-
C:\Windows\system32\netsh.exenetsh interface set interface name="Local Area Connection" disable2⤵PID:1948
-