Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 12:06

General

  • Target

    Registry.exe

  • Size

    47.6MB

  • MD5

    b16181d4ad0da57024cc3cc5935147e8

  • SHA1

    5ca16ea55827db634cd570ac3952bc4a31ec27f5

  • SHA256

    1f39254002bc937c4ac94701dc1f033102cf2b00533eb99a30fba3db87148bfc

  • SHA512

    93b79f3577c895eaa662edcfc7ac7c46ed2c10c57aa6cad164ac6208e94a74ba6092f45c6e77fce3bcc52f1e875d65189f846a12db4273e69a7adfefc30fe00e

  • SSDEEP

    786432:2inB7YtysOsApEGkEi2I/jbh8S36ipzROU8Bwrm3Ov+GFcOmFAFW1f2u:DnB7YtrOBg2I/jbh8VQt8erzHmFIWR2u

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 39 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Registry.exe
    "C:\Users\Admin\AppData\Local\Temp\Registry.exe"
    1⤵
    • Checks BIOS information in registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c color b
      2⤵
        PID:3948
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2228
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im HTTPDebuggerUI.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4984
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3856
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im HTTPDebuggerSvc.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2864
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3376
        • C:\Windows\system32\sc.exe
          sc stop HTTPDebuggerPro
          3⤵
          • Launches sc.exe
          PID:2988
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\system32\taskkill.exe
          taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4028
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4400
        • C:\Windows\system32\taskkill.exe
          taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3920
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:116
        • C:\Windows\system32\taskkill.exe
          taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3224
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c cls
        2⤵
          PID:3676
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im HTTPDebuggerUI.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2796
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:368
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im HTTPDebuggerSvc.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5088
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4912
          • C:\Windows\system32\sc.exe
            sc stop HTTPDebuggerPro
            3⤵
            • Launches sc.exe
            PID:4128
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3248
          • C:\Windows\system32\taskkill.exe
            taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2160
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3348
          • C:\Windows\system32\taskkill.exe
            taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1612
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3464
          • C:\Windows\system32\taskkill.exe
            taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1244
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cls
          2⤵
            PID:1092
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /7
          1⤵
          • Checks SCSI registry key(s)
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3676

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1732-0-0x00007FFECC8D0000-0x00007FFECC8D2000-memory.dmp

          Filesize

          8KB

        • memory/1732-1-0x00007FFECC8E0000-0x00007FFECC8E2000-memory.dmp

          Filesize

          8KB

        • memory/1732-2-0x00007FFECC8F0000-0x00007FFECC8F2000-memory.dmp

          Filesize

          8KB

        • memory/1732-3-0x00007FFECC900000-0x00007FFECC902000-memory.dmp

          Filesize

          8KB

        • memory/1732-4-0x00007FFECC910000-0x00007FFECC912000-memory.dmp

          Filesize

          8KB

        • memory/1732-5-0x00007FFECC920000-0x00007FFECC922000-memory.dmp

          Filesize

          8KB

        • memory/1732-6-0x00007FFECC930000-0x00007FFECC932000-memory.dmp

          Filesize

          8KB

        • memory/1732-7-0x00007FFECC940000-0x00007FFECC942000-memory.dmp

          Filesize

          8KB

        • memory/1732-8-0x00007FFECC950000-0x00007FFECC952000-memory.dmp

          Filesize

          8KB

        • memory/1732-9-0x00007FFECC960000-0x00007FFECC962000-memory.dmp

          Filesize

          8KB

        • memory/1732-10-0x00007FFECC970000-0x00007FFECC972000-memory.dmp

          Filesize

          8KB

        • memory/1732-11-0x00007FFECC980000-0x00007FFECC982000-memory.dmp

          Filesize

          8KB

        • memory/1732-12-0x00007FFECC990000-0x00007FFECC992000-memory.dmp

          Filesize

          8KB

        • memory/1732-13-0x00007FFECC9A0000-0x00007FFECC9A2000-memory.dmp

          Filesize

          8KB

        • memory/1732-14-0x00007FFECC9B0000-0x00007FFECC9B2000-memory.dmp

          Filesize

          8KB

        • memory/1732-15-0x00007FFECC9C0000-0x00007FFECC9C2000-memory.dmp

          Filesize

          8KB

        • memory/1732-16-0x00007FFECC9D0000-0x00007FFECC9D2000-memory.dmp

          Filesize

          8KB

        • memory/1732-17-0x00007FFECC9E0000-0x00007FFECC9E2000-memory.dmp

          Filesize

          8KB

        • memory/1732-18-0x00007FFECC9F0000-0x00007FFECC9F2000-memory.dmp

          Filesize

          8KB

        • memory/1732-19-0x00007FFECCA00000-0x00007FFECCA02000-memory.dmp

          Filesize

          8KB

        • memory/1732-20-0x00007FFECCA10000-0x00007FFECCA12000-memory.dmp

          Filesize

          8KB

        • memory/1732-21-0x00000000001F0000-0x00000000001F9000-memory.dmp

          Filesize

          36KB

        • memory/1732-32-0x00000000020C0000-0x0000000002162000-memory.dmp

          Filesize

          648KB

        • memory/1732-31-0x0000000000400000-0x0000000000422000-memory.dmp

          Filesize

          136KB

        • memory/1732-24-0x0000000000400000-0x0000000000422000-memory.dmp

          Filesize

          136KB

        • memory/1732-40-0x0000000140000000-0x0000000141000000-memory.dmp

          Filesize

          16.0MB

        • memory/3676-43-0x0000020C99AB0000-0x0000020C99AB1000-memory.dmp

          Filesize

          4KB

        • memory/3676-44-0x0000020C99AB0000-0x0000020C99AB1000-memory.dmp

          Filesize

          4KB

        • memory/3676-45-0x0000020C99AB0000-0x0000020C99AB1000-memory.dmp

          Filesize

          4KB

        • memory/3676-49-0x0000020C99AB0000-0x0000020C99AB1000-memory.dmp

          Filesize

          4KB

        • memory/3676-50-0x0000020C99AB0000-0x0000020C99AB1000-memory.dmp

          Filesize

          4KB

        • memory/3676-51-0x0000020C99AB0000-0x0000020C99AB1000-memory.dmp

          Filesize

          4KB

        • memory/3676-52-0x0000020C99AB0000-0x0000020C99AB1000-memory.dmp

          Filesize

          4KB

        • memory/3676-53-0x0000020C99AB0000-0x0000020C99AB1000-memory.dmp

          Filesize

          4KB

        • memory/3676-54-0x0000020C99AB0000-0x0000020C99AB1000-memory.dmp

          Filesize

          4KB

        • memory/3676-55-0x0000020C99AB0000-0x0000020C99AB1000-memory.dmp

          Filesize

          4KB