Overview
overview
8Static
static
5zapret-winws/1.cmd
windows7-x64
5zapret-winws/1.cmd
windows10-2004-x64
5zapret-winws/2.cmd
windows7-x64
5zapret-winws/2.cmd
windows10-2004-x64
5zapret-win...rt.dll
windows7-x64
1zapret-win...rt.dll
windows10-2004-x64
1zapret-win...64.sys
windows10-2004-x64
1zapret-winws/all.cmd
windows7-x64
5zapret-winws/all.cmd
windows10-2004-x64
5zapret-win...n1.dll
windows7-x64
5zapret-win...n1.dll
windows10-2004-x64
5zapret-win...or.vbs
windows7-x64
1zapret-win...or.vbs
windows10-2004-x64
1zapret-win...st.cmd
windows7-x64
5zapret-win...st.cmd
windows10-2004-x64
5zapret-win...te.cmd
windows7-x64
8zapret-win...te.cmd
windows10-2004-x64
8zapret-win...el.cmd
windows7-x64
8zapret-win...el.cmd
windows10-2004-x64
8zapret-win...rt.cmd
windows7-x64
4zapret-win...rt.cmd
windows10-2004-x64
4zapret-win...op.cmd
windows7-x64
1zapret-win...op.cmd
windows10-2004-x64
1zapret-win...te.cmd
windows7-x64
1zapret-win...te.cmd
windows10-2004-x64
1zapret-win...ve.cmd
windows7-x64
1zapret-win...ve.cmd
windows10-2004-x64
1zapret-win...rt.cmd
windows7-x64
1zapret-win...rt.cmd
windows10-2004-x64
1zapret-win...op.cmd
windows7-x64
1zapret-win...op.cmd
windows10-2004-x64
1zapret-win...ws.exe
windows7-x64
5Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 15:05
Behavioral task
behavioral1
Sample
zapret-winws/1.cmd
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
zapret-winws/1.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
zapret-winws/2.cmd
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
zapret-winws/2.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
zapret-winws/WinDivert.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
zapret-winws/WinDivert.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
zapret-winws/WinDivert64.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
zapret-winws/all.cmd
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
zapret-winws/all.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
zapret-winws/cygwin1.dll
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
zapret-winws/cygwin1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
zapret-winws/elevator.vbs
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
zapret-winws/elevator.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
zapret-winws/preset_russia_autohostlist.cmd
Resource
win7-20240704-en
Behavioral task
behavioral15
Sample
zapret-winws/preset_russia_autohostlist.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
zapret-winws/service_create.cmd
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
zapret-winws/service_create.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
zapret-winws/service_del.cmd
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
zapret-winws/service_del.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
zapret-winws/service_start.cmd
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
zapret-winws/service_start.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
zapret-winws/service_stop.cmd
Resource
win7-20240708-en
Behavioral task
behavioral23
Sample
zapret-winws/service_stop.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
zapret-winws/task_create.cmd
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
zapret-winws/task_create.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
zapret-winws/task_remove.cmd
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
zapret-winws/task_remove.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
zapret-winws/task_start.cmd
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
zapret-winws/task_start.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
zapret-winws/task_stop.cmd
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
zapret-winws/task_stop.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
zapret-winws/winws.exe
Resource
win7-20240903-en
General
-
Target
zapret-winws/service_create.cmd
-
Size
439B
-
MD5
9ad68202b56eda9a58dd27ca81837453
-
SHA1
4257694d7a5ae28ef13051588ad500dab8468877
-
SHA256
cd8dd82e233cf00a738f4fb8756df529813279018d11453e9c0f0f7556cdd054
-
SHA512
ea1f44cfd23ee3ce50defdc3c05116d109a7af1ff6a2f63f74970d199e451bda018bee7b5bff1904d30f7b7fa2ec832f2770c002a14e8f15f8606f76f0f4a74d
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
resource yara_rule behavioral17/memory/408-1-0x00007FFA2F0F0000-0x00007FFA2F402000-memory.dmp upx behavioral17/memory/408-5-0x00007FFA2F0F0000-0x00007FFA2F402000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3716 sc.exe 4404 sc.exe 2904 sc.exe 980 sc.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 408 winws.exe Token: SeBackupPrivilege 408 winws.exe Token: SeDebugPrivilege 408 winws.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4736 wrote to memory of 1724 4736 cmd.exe 85 PID 4736 wrote to memory of 1724 4736 cmd.exe 85 PID 1724 wrote to memory of 4996 1724 net.exe 86 PID 1724 wrote to memory of 4996 1724 net.exe 86 PID 4736 wrote to memory of 4404 4736 cmd.exe 87 PID 4736 wrote to memory of 4404 4736 cmd.exe 87 PID 4736 wrote to memory of 2904 4736 cmd.exe 88 PID 4736 wrote to memory of 2904 4736 cmd.exe 88 PID 4736 wrote to memory of 980 4736 cmd.exe 89 PID 4736 wrote to memory of 980 4736 cmd.exe 89 PID 4736 wrote to memory of 3716 4736 cmd.exe 90 PID 4736 wrote to memory of 3716 4736 cmd.exe 90
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\zapret-winws\service_create.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\net.exenet stop winws12⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winws13⤵PID:4996
-
-
-
C:\Windows\system32\sc.exesc delete winws12⤵
- Launches sc.exe
PID:4404
-
-
C:\Windows\system32\sc.exesc create winws1 binPath= "\"C:\Users\Admin\AppData\Local\Temp\zapret-winws\winws.exe\" --wf-l3=ipv4,ipv6 --wf-tcp=80,443 --dpi-desync=fake,split --dpi-desync-ttl=7 --dpi-desync-fooling=md5sig" DisplayName= "zapret DPI bypass : winws1" start= auto2⤵
- Launches sc.exe
PID:2904
-
-
C:\Windows\system32\sc.exesc description winws1 "zapret DPI bypass software"2⤵
- Launches sc.exe
PID:980
-
-
C:\Windows\system32\sc.exesc start winws12⤵
- Launches sc.exe
PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\zapret-winws\winws.exe"C:\Users\Admin\AppData\Local\Temp\zapret-winws\winws.exe" --wf-l3=ipv4,ipv6 --wf-tcp=80,443 --dpi-desync=fake,split --dpi-desync-ttl=7 --dpi-desync-fooling=md5sig1⤵
- Suspicious use of AdjustPrivilegeToken
PID:408