Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 08:34
Static task
static1
Behavioral task
behavioral1
Sample
KernelOS21H2 (2).bat
Resource
win10v2004-20230221-en
General
-
Target
KernelOS21H2 (2).bat
-
Size
38KB
-
MD5
b2c39c94a67e89dc4a633889f0575650
-
SHA1
e8dc50ebfb34dfef62a83b328e4e5f61e6bc3a49
-
SHA256
892043f3b79d937ac74943bee419135aaf64370b627313c4efd0919bcdbace62
-
SHA512
7222655c44c39101c863ca95d862072abcd3c0eb28944301bb8c256f25bdb103d841df63f7af9d473656e8fa22985ba7fb9f80870abae55bf7a24ac5bba4799f
-
SSDEEP
768:+TOLfw09oGDbfrdAUY5eCNldf2BWt9vOjfEv+/ZcbXmB9ofdfv3h8f+q1wqk:iku
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 7 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 3540 bcdedit.exe 4748 bcdedit.exe 4532 bcdedit.exe 3232 bcdedit.exe 3904 bcdedit.exe 4584 bcdedit.exe 3420 bcdedit.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
setup.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe -
Stops running service(s) 3 TTPs
-
Registers COM server for autorun 1 TTPs 2 IoCs
Processes:
setup.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LOCALSERVER32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32 setup.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
setup.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\Run setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce setup.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
setup.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} setup.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3604 sc.exe 2380 sc.exe 4908 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
wermgr.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe -
Delays execution with timeout.exe 15 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 3476 timeout.exe 3724 timeout.exe 3092 timeout.exe 1556 timeout.exe 3092 timeout.exe 4232 timeout.exe 4844 timeout.exe 2376 timeout.exe 3776 timeout.exe 1256 timeout.exe 4916 timeout.exe 2532 timeout.exe 3056 timeout.exe 3968 timeout.exe 3308 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
wermgr.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3576 taskkill.exe -
Processes:
setup.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "241" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Modifies registry class 64 IoCs
Processes:
setup.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\INTERFACE\{C9C2B807-7731-4F34-81B7-44FF7779522B}\TYPELIB setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CLSID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEHTM\DEFAULTICON setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\runas setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\ie_to_edge_bho.dll setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEPDF\APPLICATION setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\shell setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LOCALSERVER32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEMHT\APPLICATION setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\shell\open setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\runas setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEPDF\DEFAULTICON setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEPDF\SHELL\RUNAS\COMMAND setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\open setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{31575964-95F7-414B-85E4-0E9A93699E13} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\TYPELIB\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\WIN64 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEMHT\SHELL\OPEN\COMMAND setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1FCBE96C-1697-43AF-9140-2897C7C69767} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\TYPELIB\{C9C2B807-7731-4F34-81B7-44FF7779522B}\1.0\0\WIN32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEPDF\SHELL\OPEN\COMMAND setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\shell\runas setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEMHT\SHELL\RUNAS\COMMAND setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell\open setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\INTERFACE\{C9C2B807-7731-4F34-81B7-44FF7779522B}\PROXYSTUBCLSID32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeHTM\shell\open\command setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEHTM\SHELL\RUNAS\COMMAND setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEMHT\DEFAULTICON setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\MSEDGEHTM\APPLICATION setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\shell setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\microsoft-edge\shell\open\command setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1\CLSID setup.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
powershell.exepowershell.exesetup.exepid process 2900 powershell.exe 2900 powershell.exe 2900 powershell.exe 1752 powershell.exe 1752 powershell.exe 3928 setup.exe 3928 setup.exe 3928 setup.exe 3928 setup.exe 3928 setup.exe 3928 setup.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
Processes:
taskkill.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowershell.exeWMIC.exesetup.exeshutdown.exedescription pid process Token: SeDebugPrivilege 3576 taskkill.exe Token: SeDebugPrivilege 2900 powershell.exe Token: SeShutdownPrivilege 4008 powercfg.exe Token: SeCreatePagefilePrivilege 4008 powercfg.exe Token: SeShutdownPrivilege 3412 powercfg.exe Token: SeCreatePagefilePrivilege 3412 powercfg.exe Token: SeShutdownPrivilege 1872 powercfg.exe Token: SeCreatePagefilePrivilege 1872 powercfg.exe Token: SeShutdownPrivilege 3308 powercfg.exe Token: SeCreatePagefilePrivilege 3308 powercfg.exe Token: SeShutdownPrivilege 1092 powercfg.exe Token: SeCreatePagefilePrivilege 1092 powercfg.exe Token: SeShutdownPrivilege 756 powercfg.exe Token: SeCreatePagefilePrivilege 756 powercfg.exe Token: SeDebugPrivilege 1752 powershell.exe Token: SeIncreaseQuotaPrivilege 3200 WMIC.exe Token: SeSecurityPrivilege 3200 WMIC.exe Token: SeTakeOwnershipPrivilege 3200 WMIC.exe Token: SeLoadDriverPrivilege 3200 WMIC.exe Token: SeSystemProfilePrivilege 3200 WMIC.exe Token: SeSystemtimePrivilege 3200 WMIC.exe Token: SeProfSingleProcessPrivilege 3200 WMIC.exe Token: SeIncBasePriorityPrivilege 3200 WMIC.exe Token: SeCreatePagefilePrivilege 3200 WMIC.exe Token: SeBackupPrivilege 3200 WMIC.exe Token: SeRestorePrivilege 3200 WMIC.exe Token: SeShutdownPrivilege 3200 WMIC.exe Token: SeDebugPrivilege 3200 WMIC.exe Token: SeSystemEnvironmentPrivilege 3200 WMIC.exe Token: SeRemoteShutdownPrivilege 3200 WMIC.exe Token: SeUndockPrivilege 3200 WMIC.exe Token: SeManageVolumePrivilege 3200 WMIC.exe Token: 33 3200 WMIC.exe Token: 34 3200 WMIC.exe Token: 35 3200 WMIC.exe Token: 36 3200 WMIC.exe Token: SeIncreaseQuotaPrivilege 3200 WMIC.exe Token: SeSecurityPrivilege 3200 WMIC.exe Token: SeTakeOwnershipPrivilege 3200 WMIC.exe Token: SeLoadDriverPrivilege 3200 WMIC.exe Token: SeSystemProfilePrivilege 3200 WMIC.exe Token: SeSystemtimePrivilege 3200 WMIC.exe Token: SeProfSingleProcessPrivilege 3200 WMIC.exe Token: SeIncBasePriorityPrivilege 3200 WMIC.exe Token: SeCreatePagefilePrivilege 3200 WMIC.exe Token: SeBackupPrivilege 3200 WMIC.exe Token: SeRestorePrivilege 3200 WMIC.exe Token: SeShutdownPrivilege 3200 WMIC.exe Token: SeDebugPrivilege 3200 WMIC.exe Token: SeSystemEnvironmentPrivilege 3200 WMIC.exe Token: SeRemoteShutdownPrivilege 3200 WMIC.exe Token: SeUndockPrivilege 3200 WMIC.exe Token: SeManageVolumePrivilege 3200 WMIC.exe Token: 33 3200 WMIC.exe Token: 34 3200 WMIC.exe Token: 35 3200 WMIC.exe Token: 36 3200 WMIC.exe Token: SeBackupPrivilege 3928 setup.exe Token: SeRestorePrivilege 3928 setup.exe Token: SeShutdownPrivilege 4348 shutdown.exe Token: SeRemoteShutdownPrivilege 4348 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 4008 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.execmd.execmd.execmd.exedescription pid process target process PID 4152 wrote to memory of 2692 4152 cmd.exe cmd.exe PID 4152 wrote to memory of 2692 4152 cmd.exe cmd.exe PID 2692 wrote to memory of 4552 2692 cmd.exe chcp.com PID 2692 wrote to memory of 4552 2692 cmd.exe chcp.com PID 4152 wrote to memory of 1268 4152 cmd.exe chcp.com PID 4152 wrote to memory of 1268 4152 cmd.exe chcp.com PID 4152 wrote to memory of 1516 4152 cmd.exe cmd.exe PID 4152 wrote to memory of 1516 4152 cmd.exe cmd.exe PID 1516 wrote to memory of 3576 1516 cmd.exe taskkill.exe PID 1516 wrote to memory of 3576 1516 cmd.exe taskkill.exe PID 1516 wrote to memory of 2900 1516 cmd.exe powershell.exe PID 1516 wrote to memory of 2900 1516 cmd.exe powershell.exe PID 1516 wrote to memory of 3724 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3724 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 4008 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 4008 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 3412 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 3412 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 1872 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 1872 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 3308 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 3308 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 1092 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 1092 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 756 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 756 1516 cmd.exe powercfg.exe PID 1516 wrote to memory of 4844 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 4844 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3056 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3056 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3092 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3092 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 1752 1516 cmd.exe powershell.exe PID 1516 wrote to memory of 1752 1516 cmd.exe powershell.exe PID 1516 wrote to memory of 3476 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3476 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 2376 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 2376 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 1556 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 1556 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3092 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3092 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3540 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 3540 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 4748 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 4748 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 4532 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 4532 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 3232 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 3232 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 3904 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 3904 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 4584 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 4584 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 3420 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 3420 1516 cmd.exe bcdedit.exe PID 1516 wrote to memory of 3776 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3776 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3968 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 3968 1516 cmd.exe timeout.exe PID 1516 wrote to memory of 4012 1516 cmd.exe cmd.exe PID 1516 wrote to memory of 4012 1516 cmd.exe cmd.exe PID 4012 wrote to memory of 3200 4012 cmd.exe WMIC.exe PID 4012 wrote to memory of 3200 4012 cmd.exe WMIC.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KernelOS21H2 (2).bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp3⤵
-
C:\Windows\system32\chcp.comchcp 7082⤵
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KernelOS21H2 (2).bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "Set-ExecutionPolicy -ExecutionPolicy Unrestricted"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\powercfg.exepowercfg /import "C:\KernelOS-Modules\KernelOS Performance v6 IDLE ON.pow" 01001011-0100-1111-0101-0011888888843⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /import "C:\KernelOS-Modules\KernelOS Performance v6.pow" 01001011-0100-1111-0101-0011888888833⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /s 01001011-0100-1111-0101-0011888888843⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg -delete 381b4222-f694-41f0-9685-ff5bb260df2e3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg -delete 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg -delete a1841308-3541-4fab-bc81-f71556f20b4a3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Get-AppxPackage -AllUsers *WindowsStore* | Remove-AppxPackage"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\bcdedit.exebcdedit /timeout 103⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set useplatformtick Yes3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set disabledynamictick Yes3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set bootmenupolicy Legacy3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set quietboot On3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set x2apicpolicy Disable3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set nx OptIn3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path win32_networkadapter get GUID | findstr "{"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_networkadapter get GUID4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\findstr.exefindstr "{"4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{193A5E5D-199E-4B17-9305-E22E12F0F3A9}" /v "TcpAckFrequency" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{193A5E5D-199E-4B17-9305-E22E12F0F3A9}" /v "TcpDelAckTicks" /t REG_DWORD /d "0" /f3⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{193A5E5D-199E-4B17-9305-E22E12F0F3A9}" /v "TCPNoDelay" /t REG_DWORD /d "1" /f3⤵
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3" /V "1806" /T "REG_DWORD" /D "0000000000" /F3⤵
-
C:\Windows\system32\reg.exeREG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3" /V "1806" /T "REG_DWORD" /D "0000000000" /F3⤵
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\Security" /V "DisableSecuritySettingsCheck" /T "REG_DWORD" /D "00000001" /F3⤵
-
C:\Windows\system32\sc.exesc delete nvagent3⤵
- Launches sc.exe
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c where /r "C:\Program Files (x86)\Microsoft\Edge\Application" *setup.exe*3⤵
-
C:\Windows\system32\where.exewhere /r "C:\Program Files (x86)\Microsoft\Edge\Application" *setup.exe*4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --uninstall --system-level --verbose-logging --force-uninstall3⤵
- Modifies Installed Components in the registry
- Registers COM server for autorun
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7eb0f5460,0x7ff7eb0f5470,0x7ff7eb0f54804⤵
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "3928" "1692" "1536" "1696" "0" "0" "0" "0" "0" "0" "0" "0"4⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\system32\sc.exesc delete edgeupdate3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc delete edgeupdatem3⤵
- Launches sc.exe
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\shutdown.exeshutdown -r -f -t 7 -c "Please wait until your PC restarts..."3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout /t 4 /nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3960055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d136d3411d4aa688242c53cafb993aa6
SHA11a81cc78e3ca445d5a5193e49ddce26d5e25179f
SHA25600ae5433c0107cc164516c7849b4cff7b6faeb52e5afa65c01dbd8c7a5efe397
SHA512282ea53f8093c00e8c64d253782068211f8c4187391d5078755f55dedb8825c0042173d82f489d7b6c06e88184b70e83c1e92dadb80f57bd96c95855ac6b3da1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_q5zk410l.5ld.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\TEMP\MsEdgeCrashpad\settings.datFilesize
152B
MD594ce5de3dd1d43af1d7f06fc40f07570
SHA1954bcaf4dbc580794f156e81eb58b90a1c61ccfa
SHA25644d5136d3387f742ecc838244f0b272427ba7702627760e3c452d60702a97537
SHA512aafab33cb88c85b979052e76bc50f3f8bff2672c970f0ac5502afccb2799b95ae9f0044f6dc9e7e0d4e205bed6e5c70fb942a00ffda2fea59c912581746b1e55
-
C:\Windows\TEMP\MsEdgeCrashpad\throttle_store.datFilesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
memory/1752-161-0x000001CA73310000-0x000001CA73326000-memory.dmpFilesize
88KB
-
memory/1752-158-0x000001CA726D0000-0x000001CA726E0000-memory.dmpFilesize
64KB
-
memory/1752-159-0x000001CA726D0000-0x000001CA726E0000-memory.dmpFilesize
64KB
-
memory/1752-160-0x000001CA726D0000-0x000001CA726E0000-memory.dmpFilesize
64KB
-
memory/1752-162-0x000001CA732F0000-0x000001CA732FA000-memory.dmpFilesize
40KB
-
memory/1752-163-0x000001CA73390000-0x000001CA733B6000-memory.dmpFilesize
152KB
-
memory/2900-144-0x000001D750E00000-0x000001D750E10000-memory.dmpFilesize
64KB
-
memory/2900-143-0x000001D750E00000-0x000001D750E10000-memory.dmpFilesize
64KB
-
memory/2900-142-0x000001D750DC0000-0x000001D750DE2000-memory.dmpFilesize
136KB