Overview
overview
9Static
static
7Downloads ...v2.exe
windows7-x64
9Downloads ...v2.exe
windows10-2004-x64
9Downloads ...S2.exe
windows7-x64
1Downloads ...S2.exe
windows10-2004-x64
1Downloads ...ir.exe
windows7-x64
1Downloads ...ir.exe
windows10-2004-x64
8Downloads ...er.exe
windows7-x64
9Downloads ...er.exe
windows10-2004-x64
9Downloads ...or.exe
windows7-x64
9Downloads ...or.exe
windows10-2004-x64
9Downloads ...q1.exe
windows7-x64
5Downloads ...q1.exe
windows10-2004-x64
5Downloads ...ix.bat
windows7-x64
1Downloads ...ix.bat
windows10-2004-x64
1Downloads ...ix.bat
windows7-x64
9Downloads ...ix.bat
windows10-2004-x64
9Downloads ...ix.bat
windows7-x64
1Downloads ...ix.bat
windows10-2004-x64
1Downloads ...b1.exe
windows7-x64
5Downloads ...b1.exe
windows10-2004-x64
5Downloads ...ix.bat
windows7-x64
9Downloads ...ix.bat
windows10-2004-x64
9Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 23:20
Behavioral task
behavioral1
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Blocker v2.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Blocker v2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/CS2.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/CS2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Loud Chair.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Loud Chair.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Perm Woofer.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Perm Woofer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Privacy Protector.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Privacy Protector.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/Byr723V3Cq1.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/Byr723V3Cq1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/bsod fix.bat
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/bsod fix.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/w11 fix.bat
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Silent Chair/w11 fix.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/bsod fix.bat
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/bsod fix.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/nRi28Wtqb1.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/nRi28Wtqb1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/w11 fix.bat
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/w11 fix.bat
Resource
win10v2004-20240802-en
General
-
Target
Downloads 12.6.24/Downloads 12.6.24/Downloads/Unlock All/w11 fix.bat
-
Size
507B
-
MD5
6fb44052dc5a85a097feeb91d7a81712
-
SHA1
29db33e6cf3286a6ba82af684ac535d42b43d257
-
SHA256
7ec1b31de3b0114c266df0b475c5c582a504c7c38f7127949df27f78a5d1c026
-
SHA512
ee9dbcc0a7340ec6fe968ba611f0849fd1b77b88cb5deaad4c6a516a417abaf14055021e949ca04fde979364f060504c911fede81b0c492b651ea1b3f246494a
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
-
Modify Registry: Disable Windows Driver Blocklist 2 TTPs 1 IoCs
Disable Windows Driver Blocklist via Registry.
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\VulnerableDriverBlocklistEnable = "0" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1984 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1984 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 2000 wrote to memory of 1312 2000 cmd.exe net.exe PID 2000 wrote to memory of 1312 2000 cmd.exe net.exe PID 2000 wrote to memory of 1312 2000 cmd.exe net.exe PID 1312 wrote to memory of 1944 1312 net.exe net1.exe PID 1312 wrote to memory of 1944 1312 net.exe net1.exe PID 1312 wrote to memory of 1944 1312 net.exe net1.exe PID 2000 wrote to memory of 2264 2000 cmd.exe bcdedit.exe PID 2000 wrote to memory of 2264 2000 cmd.exe bcdedit.exe PID 2000 wrote to memory of 2264 2000 cmd.exe bcdedit.exe PID 2000 wrote to memory of 1984 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 1984 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 1984 2000 cmd.exe powershell.exe PID 2000 wrote to memory of 2832 2000 cmd.exe reg.exe PID 2000 wrote to memory of 2832 2000 cmd.exe reg.exe PID 2000 wrote to memory of 2832 2000 cmd.exe reg.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Downloads 12.6.24\Downloads 12.6.24\Downloads\Unlock All\w11 fix.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:1944
-
C:\Windows\system32\bcdedit.exebcdedit /set hypervisorlaunchtype off2⤵
- Modifies boot configuration data using bcdedit
PID:2264 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -Command "Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\system32\reg.exereg add HKLM\SYSTEM\CurrentControlSet\Control\CI\Config /v VulnerableDriverBlocklistEnable /t REG_DWORD /d 0x0000002⤵
- Modify Registry: Disable Windows Driver Blocklist
- Modifies registry key
PID:2832