Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2024 01:24

General

  • Target

    SHADOW BP + HAX 3.4/SETUP/Kill_Gameloop.bat

  • Size

    507B

  • MD5

    9b1141afa4c3fa4711363995f50293f9

  • SHA1

    a42e270c2c3d42626607ede069ddbc88a62efee0

  • SHA256

    3fc915854738ccfa1e5340a353fb11627c9a02fe956dcf29807b8e7b2dc4550c

  • SHA512

    d57915a1df776ea0d3b1a6d4e285387d396f0c232f810a8b8be9c51737a0c90a2dac7b22224327fc60470b5d435f060f3bceacff75b1aadbf07167bdd130b198

Score
1/10

Malware Config

Signatures

  • Kills process with taskkill 12 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\SHADOW BP + HAX 3.4\SETUP\Kill_Gameloop.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Windows\system32\net.exe
      net stop aow_drv
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 stop aow_drv
        3⤵
          PID:2824
      • C:\Windows\system32\net.exe
        net stop Tensafe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Tensafe
          3⤵
            PID:1688
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im appmarket.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1668
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im androidemulator.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2212
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im aow_exe.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2792
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im QMEmulatorService.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2844
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im RuntimeBroker.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2760
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im adb.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2424
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im GameLoader.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2848
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im TSettingCenter.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2908
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im syzs_dl_svr.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2756
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im AndroidEmulator.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2616
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im AndroidEmulatorEn.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2592
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im AndroidEmulatorEx.exe
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3044
        • C:\Windows\system32\net.exe
          net stop aow_drv
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2396
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop aow_drv
            3⤵
              PID:3056
          • C:\Windows\system32\net.exe
            net stop Tensafe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop Tensafe
              3⤵
                PID:832

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads