Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 12:06
Static task
static1
General
-
Target
Registry.exe
-
Size
47.6MB
-
MD5
b16181d4ad0da57024cc3cc5935147e8
-
SHA1
5ca16ea55827db634cd570ac3952bc4a31ec27f5
-
SHA256
1f39254002bc937c4ac94701dc1f033102cf2b00533eb99a30fba3db87148bfc
-
SHA512
93b79f3577c895eaa662edcfc7ac7c46ed2c10c57aa6cad164ac6208e94a74ba6092f45c6e77fce3bcc52f1e875d65189f846a12db4273e69a7adfefc30fe00e
-
SSDEEP
786432:2inB7YtysOsApEGkEi2I/jbh8S36ipzROU8Bwrm3Ov+GFcOmFAFW1f2u:DnB7YtrOBg2I/jbh8VQt8erzHmFIWR2u
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Registry.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2988 sc.exe 4128 sc.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Registry.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Registry.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Kills process with taskkill 10 IoCs
pid Process 3920 taskkill.exe 1612 taskkill.exe 1244 taskkill.exe 4984 taskkill.exe 2864 taskkill.exe 4028 taskkill.exe 3224 taskkill.exe 2796 taskkill.exe 5088 taskkill.exe 2160 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe 1732 Registry.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4984 taskkill.exe Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 4028 taskkill.exe Token: SeDebugPrivilege 3920 taskkill.exe Token: SeDebugPrivilege 3224 taskkill.exe Token: SeDebugPrivilege 2796 taskkill.exe Token: SeDebugPrivilege 5088 taskkill.exe Token: SeDebugPrivilege 2160 taskkill.exe Token: SeDebugPrivilege 1612 taskkill.exe Token: SeDebugPrivilege 1244 taskkill.exe Token: SeDebugPrivilege 3676 taskmgr.exe Token: SeSystemProfilePrivilege 3676 taskmgr.exe Token: SeCreateGlobalPrivilege 3676 taskmgr.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe -
Suspicious use of SendNotifyMessage 39 IoCs
pid Process 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe 3676 taskmgr.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1732 wrote to memory of 3948 1732 Registry.exe 85 PID 1732 wrote to memory of 3948 1732 Registry.exe 85 PID 1732 wrote to memory of 2228 1732 Registry.exe 86 PID 1732 wrote to memory of 2228 1732 Registry.exe 86 PID 2228 wrote to memory of 4984 2228 cmd.exe 87 PID 2228 wrote to memory of 4984 2228 cmd.exe 87 PID 1732 wrote to memory of 3856 1732 Registry.exe 89 PID 1732 wrote to memory of 3856 1732 Registry.exe 89 PID 3856 wrote to memory of 2864 3856 cmd.exe 90 PID 3856 wrote to memory of 2864 3856 cmd.exe 90 PID 1732 wrote to memory of 3376 1732 Registry.exe 91 PID 1732 wrote to memory of 3376 1732 Registry.exe 91 PID 3376 wrote to memory of 2988 3376 cmd.exe 92 PID 3376 wrote to memory of 2988 3376 cmd.exe 92 PID 1732 wrote to memory of 2200 1732 Registry.exe 93 PID 1732 wrote to memory of 2200 1732 Registry.exe 93 PID 2200 wrote to memory of 4028 2200 cmd.exe 94 PID 2200 wrote to memory of 4028 2200 cmd.exe 94 PID 1732 wrote to memory of 4400 1732 Registry.exe 95 PID 1732 wrote to memory of 4400 1732 Registry.exe 95 PID 4400 wrote to memory of 3920 4400 cmd.exe 96 PID 4400 wrote to memory of 3920 4400 cmd.exe 96 PID 1732 wrote to memory of 116 1732 Registry.exe 97 PID 1732 wrote to memory of 116 1732 Registry.exe 97 PID 116 wrote to memory of 3224 116 cmd.exe 98 PID 116 wrote to memory of 3224 116 cmd.exe 98 PID 1732 wrote to memory of 3676 1732 Registry.exe 99 PID 1732 wrote to memory of 3676 1732 Registry.exe 99 PID 1732 wrote to memory of 1772 1732 Registry.exe 100 PID 1732 wrote to memory of 1772 1732 Registry.exe 100 PID 1772 wrote to memory of 2796 1772 cmd.exe 101 PID 1772 wrote to memory of 2796 1772 cmd.exe 101 PID 1732 wrote to memory of 368 1732 Registry.exe 102 PID 1732 wrote to memory of 368 1732 Registry.exe 102 PID 368 wrote to memory of 5088 368 cmd.exe 103 PID 368 wrote to memory of 5088 368 cmd.exe 103 PID 1732 wrote to memory of 4912 1732 Registry.exe 104 PID 1732 wrote to memory of 4912 1732 Registry.exe 104 PID 4912 wrote to memory of 4128 4912 cmd.exe 105 PID 4912 wrote to memory of 4128 4912 cmd.exe 105 PID 1732 wrote to memory of 3248 1732 Registry.exe 106 PID 1732 wrote to memory of 3248 1732 Registry.exe 106 PID 3248 wrote to memory of 2160 3248 cmd.exe 107 PID 3248 wrote to memory of 2160 3248 cmd.exe 107 PID 1732 wrote to memory of 3348 1732 Registry.exe 108 PID 1732 wrote to memory of 3348 1732 Registry.exe 108 PID 3348 wrote to memory of 1612 3348 cmd.exe 109 PID 3348 wrote to memory of 1612 3348 cmd.exe 109 PID 1732 wrote to memory of 3464 1732 Registry.exe 110 PID 1732 wrote to memory of 3464 1732 Registry.exe 110 PID 3464 wrote to memory of 1244 3464 cmd.exe 111 PID 3464 wrote to memory of 1244 3464 cmd.exe 111 PID 1732 wrote to memory of 1092 1732 Registry.exe 120 PID 1732 wrote to memory of 1092 1732 Registry.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\Registry.exe"C:\Users\Admin\AppData\Local\Temp\Registry.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color b2⤵PID:3948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1092
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3676