Overview
overview
10Static
static
10UnBan Guid...er.url
windows7-x64
1UnBan Guid...er.url
windows10-2004-x64
1UnBan Guid...or.lnk
windows7-x64
3UnBan Guid...or.lnk
windows10-2004-x64
7UnBan Guid...or.url
windows7-x64
1UnBan Guid...or.url
windows10-2004-x64
1UnBan Guid...Ds.cmd
windows7-x64
1UnBan Guid...Ds.cmd
windows10-2004-x64
1UnBan Guid...Ds.cmd
windows7-x64
1UnBan Guid...Ds.cmd
windows10-2004-x64
1UnBan Guid...RU.exe
windows7-x64
1UnBan Guid...RU.exe
windows10-2004-x64
1UnBan Guid...ll.exe
windows7-x64
1UnBan Guid...ll.exe
windows10-2004-x64
1UnBan Guid...rt.exe
windows7-x64
4UnBan Guid...rt.exe
windows10-2004-x64
5UnBan Guid...64.exe
windows7-x64
4UnBan Guid...64.exe
windows10-2004-x64
5UnBan Guid...E).bat
windows7-x64
10UnBan Guid...E).bat
windows10-2004-x64
8UnBan Guid...er.bat
windows7-x64
1UnBan Guid...er.bat
windows10-2004-x64
1UnBan Guid...64.exe
windows7-x64
1UnBan Guid...64.exe
windows10-2004-x64
1UnBan Guid...64.sys
windows7-x64
1UnBan Guid...64.sys
windows10-2004-x64
1UnBan Guid...er.bat
windows7-x64
5UnBan Guid...er.bat
windows10-2004-x64
UnBan Guid...ew.exe
windows7-x64
6UnBan Guid...ew.exe
windows10-2004-x64
6UnBan Guid...md.exe
windows7-x64
1UnBan Guid...md.exe
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
UnBan Guide/step 1/Download Revo Uninstaller.url
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
UnBan Guide/step 1/Download Revo Uninstaller.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
UnBan Guide/step 2/Registry Editor.lnk
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
UnBan Guide/step 2/Registry Editor.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
UnBan Guide/step 2/guid generator.url
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
UnBan Guide/step 2/guid generator.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
UnBan Guide/step 3/Change Disk IDs.cmd
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
UnBan Guide/step 3/Change Disk IDs.cmd
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
UnBan Guide/step 4/Change HWIDs.cmd
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
UnBan Guide/step 4/Change HWIDs.cmd
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
UnBan Guide/step 5/CRU.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
UnBan Guide/step 5/CRU.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
UnBan Guide/step 5/ignore/reset-all.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
UnBan Guide/step 5/ignore/reset-all.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
UnBan Guide/step 5/ignore/restart.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
UnBan Guide/step 5/ignore/restart.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
UnBan Guide/step 5/ignore/restart64.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
UnBan Guide/step 5/ignore/restart64.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
UnBan Guide/step 6/1. Spoofer (RUN ME).bat
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
UnBan Guide/step 6/1. Spoofer (RUN ME).bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
UnBan Guide/step 6/2. SerialsChecker.bat
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
UnBan Guide/step 6/2. SerialsChecker.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
UnBan Guide/step 6/AMIDEWINx64.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
UnBan Guide/step 6/AMIDEWINx64.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
UnBan Guide/step 6/AMIFLDRV64.sys
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
UnBan Guide/step 6/AMIFLDRV64.sys
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
UnBan Guide/step 6/Cleaner.bat
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
UnBan Guide/step 6/Cleaner.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
UnBan Guide/step 6/DevManView.exe
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
UnBan Guide/step 6/DevManView.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
UnBan Guide/step 6/DeviceCleanupCmd.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
UnBan Guide/step 6/DeviceCleanupCmd.exe
Resource
win10v2004-20240508-en
General
-
Target
UnBan Guide/step 6/2. SerialsChecker.bat
-
Size
573B
-
MD5
6a896cfd61884e9b42f78b270e5c22cf
-
SHA1
f228f1b281724015b9460969381af9a1afe06046
-
SHA256
5cd676d9bc7e707ad7e8dc48dabf9af733c81d1b836486ff5eb9d44cba788e46
-
SHA512
17982e060867e323fe83908b4735f44e5fc8353608c50f3c6e9ee5c3b97643045d764f21eb402b9b3fbee0e19669391b6eab6dc0bf28e92bb1fb4a898a668eb9
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2140 WMIC.exe Token: SeSecurityPrivilege 2140 WMIC.exe Token: SeTakeOwnershipPrivilege 2140 WMIC.exe Token: SeLoadDriverPrivilege 2140 WMIC.exe Token: SeSystemProfilePrivilege 2140 WMIC.exe Token: SeSystemtimePrivilege 2140 WMIC.exe Token: SeProfSingleProcessPrivilege 2140 WMIC.exe Token: SeIncBasePriorityPrivilege 2140 WMIC.exe Token: SeCreatePagefilePrivilege 2140 WMIC.exe Token: SeBackupPrivilege 2140 WMIC.exe Token: SeRestorePrivilege 2140 WMIC.exe Token: SeShutdownPrivilege 2140 WMIC.exe Token: SeDebugPrivilege 2140 WMIC.exe Token: SeSystemEnvironmentPrivilege 2140 WMIC.exe Token: SeRemoteShutdownPrivilege 2140 WMIC.exe Token: SeUndockPrivilege 2140 WMIC.exe Token: SeManageVolumePrivilege 2140 WMIC.exe Token: 33 2140 WMIC.exe Token: 34 2140 WMIC.exe Token: 35 2140 WMIC.exe Token: SeIncreaseQuotaPrivilege 2140 WMIC.exe Token: SeSecurityPrivilege 2140 WMIC.exe Token: SeTakeOwnershipPrivilege 2140 WMIC.exe Token: SeLoadDriverPrivilege 2140 WMIC.exe Token: SeSystemProfilePrivilege 2140 WMIC.exe Token: SeSystemtimePrivilege 2140 WMIC.exe Token: SeProfSingleProcessPrivilege 2140 WMIC.exe Token: SeIncBasePriorityPrivilege 2140 WMIC.exe Token: SeCreatePagefilePrivilege 2140 WMIC.exe Token: SeBackupPrivilege 2140 WMIC.exe Token: SeRestorePrivilege 2140 WMIC.exe Token: SeShutdownPrivilege 2140 WMIC.exe Token: SeDebugPrivilege 2140 WMIC.exe Token: SeSystemEnvironmentPrivilege 2140 WMIC.exe Token: SeRemoteShutdownPrivilege 2140 WMIC.exe Token: SeUndockPrivilege 2140 WMIC.exe Token: SeManageVolumePrivilege 2140 WMIC.exe Token: 33 2140 WMIC.exe Token: 34 2140 WMIC.exe Token: 35 2140 WMIC.exe Token: SeIncreaseQuotaPrivilege 2712 WMIC.exe Token: SeSecurityPrivilege 2712 WMIC.exe Token: SeTakeOwnershipPrivilege 2712 WMIC.exe Token: SeLoadDriverPrivilege 2712 WMIC.exe Token: SeSystemProfilePrivilege 2712 WMIC.exe Token: SeSystemtimePrivilege 2712 WMIC.exe Token: SeProfSingleProcessPrivilege 2712 WMIC.exe Token: SeIncBasePriorityPrivilege 2712 WMIC.exe Token: SeCreatePagefilePrivilege 2712 WMIC.exe Token: SeBackupPrivilege 2712 WMIC.exe Token: SeRestorePrivilege 2712 WMIC.exe Token: SeShutdownPrivilege 2712 WMIC.exe Token: SeDebugPrivilege 2712 WMIC.exe Token: SeSystemEnvironmentPrivilege 2712 WMIC.exe Token: SeRemoteShutdownPrivilege 2712 WMIC.exe Token: SeUndockPrivilege 2712 WMIC.exe Token: SeManageVolumePrivilege 2712 WMIC.exe Token: 33 2712 WMIC.exe Token: 34 2712 WMIC.exe Token: 35 2712 WMIC.exe Token: SeIncreaseQuotaPrivilege 2712 WMIC.exe Token: SeSecurityPrivilege 2712 WMIC.exe Token: SeTakeOwnershipPrivilege 2712 WMIC.exe Token: SeLoadDriverPrivilege 2712 WMIC.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3020 2928 cmd.exe 29 PID 2928 wrote to memory of 3020 2928 cmd.exe 29 PID 2928 wrote to memory of 3020 2928 cmd.exe 29 PID 2928 wrote to memory of 2140 2928 cmd.exe 30 PID 2928 wrote to memory of 2140 2928 cmd.exe 30 PID 2928 wrote to memory of 2140 2928 cmd.exe 30 PID 2928 wrote to memory of 2712 2928 cmd.exe 32 PID 2928 wrote to memory of 2712 2928 cmd.exe 32 PID 2928 wrote to memory of 2712 2928 cmd.exe 32 PID 2928 wrote to memory of 2620 2928 cmd.exe 33 PID 2928 wrote to memory of 2620 2928 cmd.exe 33 PID 2928 wrote to memory of 2620 2928 cmd.exe 33 PID 2928 wrote to memory of 2604 2928 cmd.exe 34 PID 2928 wrote to memory of 2604 2928 cmd.exe 34 PID 2928 wrote to memory of 2604 2928 cmd.exe 34 PID 2928 wrote to memory of 2588 2928 cmd.exe 35 PID 2928 wrote to memory of 2588 2928 cmd.exe 35 PID 2928 wrote to memory of 2588 2928 cmd.exe 35 PID 2928 wrote to memory of 2692 2928 cmd.exe 36 PID 2928 wrote to memory of 2692 2928 cmd.exe 36 PID 2928 wrote to memory of 2692 2928 cmd.exe 36 PID 2928 wrote to memory of 2636 2928 cmd.exe 37 PID 2928 wrote to memory of 2636 2928 cmd.exe 37 PID 2928 wrote to memory of 2636 2928 cmd.exe 37 PID 2928 wrote to memory of 2464 2928 cmd.exe 38 PID 2928 wrote to memory of 2464 2928 cmd.exe 38 PID 2928 wrote to memory of 2464 2928 cmd.exe 38
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\UnBan Guide\step 6\2. SerialsChecker.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\mode.commode con: cols=70 lines=352⤵PID:3020
-
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get serialnumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get serialnumber2⤵PID:2620
-
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get processorid2⤵PID:2604
-
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber2⤵PID:2588
-
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get serialnumber2⤵PID:2692
-
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get manufacturer2⤵PID:2636
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_NetworkAdapter where "PNPDeviceID like '%PCI%' AND NetConnectionStatus=2 AND AdapterTypeID='0'" get MacAddress2⤵PID:2464
-