Analysis
-
max time kernel
54s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 05:01
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10v2004-20240426-en
General
-
Target
Loader.exe
-
Size
3.4MB
-
MD5
31718a8cc11d08a8d32292ce022b67e0
-
SHA1
6714f288d498562f8dbb8e3a2e9ee3d20d71c658
-
SHA256
66c3dd691e89e216bae7b3dd20598b80469bd868267183eb21acab5a563a4ea9
-
SHA512
477651c024c4bb3f364cc1fff28382fb5b33ac76d1c138e31846ce3afcd602d40014ab622bbf6418a69075311d76aed52c72fee90bbedbdf15b85859e75329a2
-
SSDEEP
49152:MxmvumkQ9lY9sgUXdTPSxdQ8KX75IyuWuCjcCqWOyxNL9bzjEj+O93+xr:Mxx9NUFkQx753uWuCyyxXOru9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
Processes:
icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exeLoader.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Loader.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorer.exespoolsv.exeLoader.exeicsys.icn.exespoolsv.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe -
Executes dropped EXE 6 IoCs
Processes:
loader.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 3208 loader.exe 3336 icsys.icn.exe 3856 explorer.exe 4560 spoolsv.exe 3264 svchost.exe 4432 spoolsv.exe -
Processes:
resource yara_rule behavioral1/memory/5084-0-0x0000000000400000-0x0000000000A0E000-memory.dmp themida C:\Windows\Resources\Themes\icsys.icn.exe themida behavioral1/memory/3336-13-0x0000000000400000-0x0000000000A0E000-memory.dmp themida C:\Windows\Resources\Themes\explorer.exe themida behavioral1/memory/3856-22-0x0000000000400000-0x0000000000A0E000-memory.dmp themida C:\Windows\Resources\spoolsv.exe themida behavioral1/memory/4560-31-0x0000000000400000-0x0000000000A0E000-memory.dmp themida \??\c:\windows\resources\svchost.exe themida behavioral1/memory/3264-40-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/4432-45-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/3336-53-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/5084-56-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/4560-55-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/4432-50-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/3856-57-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/3264-58-0x0000000000400000-0x0000000000A0E000-memory.dmp themida behavioral1/memory/3856-66-0x0000000000400000-0x0000000000A0E000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Processes:
spoolsv.exeLoader.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Loader.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
Loader.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 5084 Loader.exe 3336 icsys.icn.exe 3856 explorer.exe 4560 spoolsv.exe 3264 svchost.exe 4432 spoolsv.exe -
Drops file in Windows directory 4 IoCs
Processes:
spoolsv.exeLoader.exeicsys.icn.exeexplorer.exedescription ioc process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe Loader.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1632 sc.exe 4264 sc.exe 3100 sc.exe 1424 sc.exe 3900 sc.exe 1148 sc.exe 1280 sc.exe -
Kills process with taskkill 28 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3804 taskkill.exe 4276 taskkill.exe 2720 taskkill.exe 2476 taskkill.exe 4912 taskkill.exe 1312 taskkill.exe 3424 taskkill.exe 1572 taskkill.exe 4400 taskkill.exe 244 taskkill.exe 1404 taskkill.exe 1688 taskkill.exe 2568 taskkill.exe 1508 taskkill.exe 1456 taskkill.exe 4584 taskkill.exe 4456 taskkill.exe 3364 taskkill.exe 992 taskkill.exe 5032 taskkill.exe 4480 taskkill.exe 836 taskkill.exe 2024 taskkill.exe 4592 taskkill.exe 4712 taskkill.exe 2988 taskkill.exe 4888 taskkill.exe 3048 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Loader.exeicsys.icn.exepid process 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 5084 Loader.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3336 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 3856 explorer.exe 3264 svchost.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3424 taskkill.exe Token: SeDebugPrivilege 3804 taskkill.exe Token: SeDebugPrivilege 2568 taskkill.exe Token: SeDebugPrivilege 992 taskkill.exe Token: SeDebugPrivilege 1572 taskkill.exe Token: SeDebugPrivilege 2024 taskkill.exe Token: SeDebugPrivilege 1456 taskkill.exe Token: SeDebugPrivilege 1508 taskkill.exe Token: SeDebugPrivilege 5032 taskkill.exe Token: SeDebugPrivilege 4480 taskkill.exe Token: SeDebugPrivilege 4400 taskkill.exe Token: SeDebugPrivilege 4584 taskkill.exe Token: SeDebugPrivilege 2720 taskkill.exe Token: SeDebugPrivilege 4276 taskkill.exe Token: SeDebugPrivilege 3048 taskkill.exe Token: SeDebugPrivilege 4912 taskkill.exe Token: SeDebugPrivilege 4456 taskkill.exe Token: SeDebugPrivilege 4592 taskkill.exe Token: SeDebugPrivilege 836 taskkill.exe Token: SeDebugPrivilege 244 taskkill.exe Token: SeDebugPrivilege 4712 taskkill.exe Token: SeDebugPrivilege 1404 taskkill.exe Token: SeDebugPrivilege 2476 taskkill.exe Token: SeDebugPrivilege 2988 taskkill.exe Token: SeDebugPrivilege 1312 taskkill.exe Token: SeDebugPrivilege 3364 taskkill.exe Token: SeDebugPrivilege 4888 taskkill.exe Token: SeDebugPrivilege 1688 taskkill.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
Loader.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 5084 Loader.exe 5084 Loader.exe 3336 icsys.icn.exe 3336 icsys.icn.exe 3856 explorer.exe 3856 explorer.exe 4560 spoolsv.exe 4560 spoolsv.exe 3264 svchost.exe 3264 svchost.exe 4432 spoolsv.exe 4432 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Loader.exeloader.exe cmd.execmd.execmd.execmd.execmd.execmd.exeicsys.icn.execmd.execmd.execmd.execmd.execmd.exeexplorer.exedescription pid process target process PID 5084 wrote to memory of 3208 5084 Loader.exe loader.exe PID 5084 wrote to memory of 3208 5084 Loader.exe loader.exe PID 5084 wrote to memory of 3336 5084 Loader.exe icsys.icn.exe PID 5084 wrote to memory of 3336 5084 Loader.exe icsys.icn.exe PID 5084 wrote to memory of 3336 5084 Loader.exe icsys.icn.exe PID 3208 wrote to memory of 1196 3208 loader.exe cmd.exe PID 3208 wrote to memory of 1196 3208 loader.exe cmd.exe PID 3208 wrote to memory of 3688 3208 loader.exe cmd.exe PID 3208 wrote to memory of 3688 3208 loader.exe cmd.exe PID 3208 wrote to memory of 3284 3208 loader.exe cmd.exe PID 3208 wrote to memory of 3284 3208 loader.exe cmd.exe PID 3208 wrote to memory of 4260 3208 loader.exe cmd.exe PID 3208 wrote to memory of 4260 3208 loader.exe cmd.exe PID 3208 wrote to memory of 532 3208 loader.exe cmd.exe PID 3208 wrote to memory of 532 3208 loader.exe cmd.exe PID 3208 wrote to memory of 3216 3208 loader.exe cmd.exe PID 3208 wrote to memory of 3216 3208 loader.exe cmd.exe PID 3208 wrote to memory of 2420 3208 loader.exe cmd.exe PID 3208 wrote to memory of 2420 3208 loader.exe cmd.exe PID 3208 wrote to memory of 3896 3208 loader.exe cmd.exe PID 3208 wrote to memory of 3896 3208 loader.exe cmd.exe PID 3896 wrote to memory of 2160 3896 cmd.exe certutil.exe PID 3896 wrote to memory of 2160 3896 cmd.exe certutil.exe PID 3216 wrote to memory of 3804 3216 cmd.exe taskkill.exe PID 3216 wrote to memory of 3804 3216 cmd.exe taskkill.exe PID 3688 wrote to memory of 2568 3688 cmd.exe taskkill.exe PID 3688 wrote to memory of 2568 3688 cmd.exe taskkill.exe PID 3284 wrote to memory of 3424 3284 cmd.exe taskkill.exe PID 3284 wrote to memory of 3424 3284 cmd.exe taskkill.exe PID 532 wrote to memory of 1148 532 cmd.exe sc.exe PID 532 wrote to memory of 1148 532 cmd.exe sc.exe PID 4260 wrote to memory of 992 4260 cmd.exe taskkill.exe PID 4260 wrote to memory of 992 4260 cmd.exe taskkill.exe PID 3208 wrote to memory of 2264 3208 loader.exe cmd.exe PID 3208 wrote to memory of 2264 3208 loader.exe cmd.exe PID 3208 wrote to memory of 5092 3208 loader.exe cmd.exe PID 3208 wrote to memory of 5092 3208 loader.exe cmd.exe PID 3208 wrote to memory of 1220 3208 loader.exe cmd.exe PID 3208 wrote to memory of 1220 3208 loader.exe cmd.exe PID 3208 wrote to memory of 3184 3208 loader.exe cmd.exe PID 3208 wrote to memory of 3184 3208 loader.exe cmd.exe PID 3208 wrote to memory of 4920 3208 loader.exe cmd.exe PID 3208 wrote to memory of 4920 3208 loader.exe cmd.exe PID 3208 wrote to memory of 1424 3208 loader.exe cmd.exe PID 3208 wrote to memory of 1424 3208 loader.exe cmd.exe PID 3336 wrote to memory of 3856 3336 icsys.icn.exe explorer.exe PID 3336 wrote to memory of 3856 3336 icsys.icn.exe explorer.exe PID 3336 wrote to memory of 3856 3336 icsys.icn.exe explorer.exe PID 2264 wrote to memory of 1572 2264 cmd.exe taskkill.exe PID 2264 wrote to memory of 1572 2264 cmd.exe taskkill.exe PID 1220 wrote to memory of 1456 1220 cmd.exe taskkill.exe PID 1220 wrote to memory of 1456 1220 cmd.exe taskkill.exe PID 4920 wrote to memory of 2024 4920 cmd.exe taskkill.exe PID 4920 wrote to memory of 2024 4920 cmd.exe taskkill.exe PID 3184 wrote to memory of 1280 3184 cmd.exe sc.exe PID 3184 wrote to memory of 1280 3184 cmd.exe sc.exe PID 5092 wrote to memory of 1508 5092 cmd.exe taskkill.exe PID 5092 wrote to memory of 1508 5092 cmd.exe taskkill.exe PID 3856 wrote to memory of 4560 3856 explorer.exe spoolsv.exe PID 3856 wrote to memory of 4560 3856 explorer.exe spoolsv.exe PID 3856 wrote to memory of 4560 3856 explorer.exe spoolsv.exe PID 3208 wrote to memory of 2308 3208 loader.exe cmd.exe PID 3208 wrote to memory of 2308 3208 loader.exe cmd.exe PID 3208 wrote to memory of 824 3208 loader.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\users\admin\appdata\local\temp\loader.exec:\users\admin\appdata\local\temp\loader.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 43⤵PID:1196
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:1148
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:2420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "c:\users\admin\appdata\local\temp\loader.exe " MD53⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\system32\certutil.execertutil -hashfile "c:\users\admin\appdata\local\temp\loader.exe " MD54⤵PID:2160
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:1280
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:1424
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:2308
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:824
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:1172
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:4060
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:4264
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:428
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:3396
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:1616
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:1584
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:4368
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:2712
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:1632
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:3596
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:3108
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:1216
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:4448
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:5088
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:3388
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:3100
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:3820
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:3836
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:2764
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:2992
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:4796
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:3600
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:1424
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:4492
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:5028
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&13⤵PID:716
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&13⤵PID:3256
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&13⤵PID:3984
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&13⤵PID:4416
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro4⤵
- Launches sc.exe
PID:3900
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&13⤵PID:3032
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&13⤵PID:3796
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3336 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3856 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4560 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3264 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4432
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
912KB
MD5c92b21ec0b5b0db8052bf071a2f58b05
SHA1a7456a9a8682546d8501a1f7a8dbabd89b5f815a
SHA256625ec5db1bddfd0b263ec071d149e6c22c6b5843e101640cf592545efe86866b
SHA512b009df619f961f8cfd5fd284ced8c730c5fe27e3bc489ea90cb2ec21b408b22915221d7d647c23a07c9d12a56f2d61bed97edd17ac77d10158f89633e1526abe
-
Filesize
2.5MB
MD59e4b8ecdf0020ae302260c79d557c51e
SHA1c91cfbc27ab391749404e70156d13748cbe82e1b
SHA2563dd81bbf3ebeaa1f667faf3bd568c7aa3596b5e4cbb41a16bb02bc6a240df7b2
SHA51203ba9277f77e5ac204512f7725f28deff7db6e12e7f3e0026efcb0b46dc31f475dc6087ae8313bf5355e4941d98be5559793e4d87fbce01ae7d79c2fe32524ea
-
Filesize
2.5MB
MD53256cc409a27c95b37ba4f22e325a954
SHA19fa06c03016786313b48e8672fabf53fc40e0c88
SHA25698bde60dc3b19b04766ce6409f21639ea9f617a414b77fe4dd4bc00a94823085
SHA51217e6a0c683468749694902b5ec7ec89ac3e5a409f12984fee44f13b2029a500e431fa49df790ec480b301b35ad68e93af44a246665ff23126468390c3bccc99c
-
Filesize
2.5MB
MD52126e5036679daf12a476ebf4cfba90d
SHA12a43758e5c0527e62afbd93d8e2e53a9e780580e
SHA2564796c4ef2dfef71c2af6bdb0c2f083ed0a57ada814ece91c2e773d4c43c544c0
SHA512af076c1fbf1f72253d54b0f62aae207624bd6bc7ead3b34eb26cd5908de11802e868a98f17b78f52d24426fbe3d49632a32e8ada713b3e1f34b3be436db58a4e
-
Filesize
2.5MB
MD536307d266ee4d25895a1356596b8b8b7
SHA1858e3529e53b9533880756cf9940ca19da109bdf
SHA25651935391772cddd0b0259e780a1052248655f59d4b24ed1c741ea9d8b20b3b64
SHA512b5621e854d0b560cfe00f290d790e3482539be621c92578f1cfb0b5c9300dd3781839476c36772e127e15f68eee7c76b9552631c2a4644ef3ad2f10d19b36ff0