Analysis
-
max time kernel
281s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-06-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe
Resource
win10-20230220-en
General
-
Target
8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe
-
Size
1.7MB
-
MD5
a4aab901f5f4662d75a66bdb08971148
-
SHA1
9835bae8776e280b5a6bcf8e204d1bca5e05b0f6
-
SHA256
8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c
-
SHA512
a4a86338d24118d20242714da4ac9df72a0954c7c7cfa4be80cb2495b2ced651e328b4fbf1e66ac844f76f838efd591baade7b2dca019917964ac0b7a73c479f
-
SSDEEP
24576:YwJAcH22+6MA333QaUozWal46B7Owg/63wXByw/OK:bJAcH22KA3339UPaewgrByq
Malware Config
Extracted
redline
090623_11_red
goodlogs.neverever.ug:11615
-
auth_value
ca62706abf6895102883ab0c8a86ddff
Extracted
laplas
http://45.159.189.105
-
api_key
f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 436 created 1204 436 mtaskhost.exe 16 PID 436 created 1204 436 mtaskhost.exe 16 PID 436 created 1204 436 mtaskhost.exe 16 PID 436 created 1204 436 mtaskhost.exe 16 PID 436 created 1204 436 mtaskhost.exe 16 PID 1052 created 1204 1052 updater.exe 16 PID 1052 created 1204 1052 updater.exe 16 PID 1052 created 1204 1052 updater.exe 16 PID 1052 created 1204 1052 updater.exe 16 PID 1052 created 1204 1052 updater.exe 16 PID 1052 created 1204 1052 updater.exe 16 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mtaskhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cltaskhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
XMRig Miner payload 4 IoCs
resource yara_rule behavioral1/memory/1052-173-0x000000013FD40000-0x0000000140B3B000-memory.dmp xmrig behavioral1/memory/544-177-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/544-180-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/544-184-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts mtaskhost.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cltaskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cltaskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mtaskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mtaskhost.exe -
Executes dropped EXE 4 IoCs
pid Process 436 mtaskhost.exe 1644 cltaskhost.exe 1996 ntlhost.exe 1052 updater.exe -
Loads dropped DLL 4 IoCs
pid Process 1984 jsc.exe 1984 jsc.exe 1644 cltaskhost.exe 1532 taskeng.exe -
resource yara_rule behavioral1/files/0x00090000000122d7-67.dat themida behavioral1/files/0x00090000000122d7-69.dat themida behavioral1/memory/436-70-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/memory/436-72-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/memory/436-73-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/memory/436-75-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/memory/436-76-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/memory/436-81-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/memory/436-89-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/memory/436-116-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/memory/436-119-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/memory/436-122-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/files/0x00090000000122d7-135.dat themida behavioral1/memory/436-137-0x000000013FA70000-0x000000014086B000-memory.dmp themida behavioral1/files/0x00080000000122df-138.dat themida behavioral1/files/0x00080000000122df-140.dat themida behavioral1/files/0x00080000000122df-139.dat themida behavioral1/memory/1052-142-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/memory/1052-143-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/memory/1052-144-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/memory/1052-145-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/memory/1052-146-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/memory/1052-147-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/memory/1052-148-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/memory/1052-150-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/memory/1052-154-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/memory/1052-161-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/memory/1052-167-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida behavioral1/files/0x00080000000122df-171.dat themida behavioral1/memory/1052-173-0x000000013FD40000-0x0000000140B3B000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" cltaskhost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mtaskhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cltaskhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 436 mtaskhost.exe 1644 cltaskhost.exe 1996 ntlhost.exe 1052 updater.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1344 set thread context of 1984 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe 28 PID 1052 set thread context of 1524 1052 updater.exe 73 PID 1052 set thread context of 544 1052 updater.exe 74 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe mtaskhost.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1124 sc.exe 1628 sc.exe 1552 sc.exe 1384 sc.exe 792 sc.exe 1552 sc.exe 752 sc.exe 1944 sc.exe 980 sc.exe 852 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1364 schtasks.exe 1312 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 9 Go-http-client/1.1 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = f08fd10d579bd901 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 jsc.exe 1984 jsc.exe 436 mtaskhost.exe 436 mtaskhost.exe 1740 powershell.exe 436 mtaskhost.exe 436 mtaskhost.exe 436 mtaskhost.exe 436 mtaskhost.exe 436 mtaskhost.exe 436 mtaskhost.exe 1480 powershell.exe 436 mtaskhost.exe 436 mtaskhost.exe 1052 updater.exe 1052 updater.exe 292 powershell.exe 1052 updater.exe 1052 updater.exe 1052 updater.exe 1052 updater.exe 1052 updater.exe 1052 updater.exe 2024 powershell.exe 1052 updater.exe 1052 updater.exe 1052 updater.exe 1052 updater.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe Token: SeDebugPrivilege 1984 jsc.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeShutdownPrivilege 268 powercfg.exe Token: SeDebugPrivilege 1480 powershell.exe Token: SeShutdownPrivilege 1312 schtasks.exe Token: SeShutdownPrivilege 300 powercfg.exe Token: SeShutdownPrivilege 1984 powercfg.exe Token: SeDebugPrivilege 292 powershell.exe Token: SeShutdownPrivilege 996 powercfg.exe Token: SeShutdownPrivilege 588 powercfg.exe Token: SeShutdownPrivilege 1804 powercfg.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeShutdownPrivilege 1920 powercfg.exe Token: SeDebugPrivilege 1052 updater.exe Token: SeLockMemoryPrivilege 544 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1984 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe 28 PID 1344 wrote to memory of 1984 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe 28 PID 1344 wrote to memory of 1984 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe 28 PID 1344 wrote to memory of 1984 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe 28 PID 1344 wrote to memory of 1984 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe 28 PID 1344 wrote to memory of 1984 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe 28 PID 1344 wrote to memory of 1984 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe 28 PID 1344 wrote to memory of 1984 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe 28 PID 1344 wrote to memory of 1984 1344 8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe 28 PID 1984 wrote to memory of 436 1984 jsc.exe 30 PID 1984 wrote to memory of 436 1984 jsc.exe 30 PID 1984 wrote to memory of 436 1984 jsc.exe 30 PID 1984 wrote to memory of 436 1984 jsc.exe 30 PID 1984 wrote to memory of 1644 1984 jsc.exe 31 PID 1984 wrote to memory of 1644 1984 jsc.exe 31 PID 1984 wrote to memory of 1644 1984 jsc.exe 31 PID 1984 wrote to memory of 1644 1984 jsc.exe 31 PID 1644 wrote to memory of 1996 1644 cltaskhost.exe 32 PID 1644 wrote to memory of 1996 1644 cltaskhost.exe 32 PID 1644 wrote to memory of 1996 1644 cltaskhost.exe 32 PID 1488 wrote to memory of 1628 1488 cmd.exe 37 PID 1488 wrote to memory of 1628 1488 cmd.exe 37 PID 1488 wrote to memory of 1628 1488 cmd.exe 37 PID 1488 wrote to memory of 752 1488 cmd.exe 38 PID 1488 wrote to memory of 752 1488 cmd.exe 38 PID 1488 wrote to memory of 752 1488 cmd.exe 38 PID 1488 wrote to memory of 1552 1488 cmd.exe 39 PID 1488 wrote to memory of 1552 1488 cmd.exe 39 PID 1488 wrote to memory of 1552 1488 cmd.exe 39 PID 1488 wrote to memory of 1944 1488 cmd.exe 40 PID 1488 wrote to memory of 1944 1488 cmd.exe 40 PID 1488 wrote to memory of 1944 1488 cmd.exe 40 PID 1488 wrote to memory of 1384 1488 cmd.exe 41 PID 1488 wrote to memory of 1384 1488 cmd.exe 41 PID 1488 wrote to memory of 1384 1488 cmd.exe 41 PID 1408 wrote to memory of 268 1408 cmd.exe 46 PID 1408 wrote to memory of 268 1408 cmd.exe 46 PID 1408 wrote to memory of 268 1408 cmd.exe 46 PID 1408 wrote to memory of 1312 1408 cmd.exe 72 PID 1408 wrote to memory of 1312 1408 cmd.exe 72 PID 1408 wrote to memory of 1312 1408 cmd.exe 72 PID 1408 wrote to memory of 300 1408 cmd.exe 48 PID 1408 wrote to memory of 300 1408 cmd.exe 48 PID 1408 wrote to memory of 300 1408 cmd.exe 48 PID 1480 wrote to memory of 1364 1480 powershell.exe 50 PID 1480 wrote to memory of 1364 1480 powershell.exe 50 PID 1480 wrote to memory of 1364 1480 powershell.exe 50 PID 1408 wrote to memory of 1984 1408 cmd.exe 49 PID 1408 wrote to memory of 1984 1408 cmd.exe 49 PID 1408 wrote to memory of 1984 1408 cmd.exe 49 PID 1532 wrote to memory of 1052 1532 taskeng.exe 54 PID 1532 wrote to memory of 1052 1532 taskeng.exe 54 PID 1532 wrote to memory of 1052 1532 taskeng.exe 54 PID 1260 wrote to memory of 980 1260 cmd.exe 59 PID 1260 wrote to memory of 980 1260 cmd.exe 59 PID 1260 wrote to memory of 980 1260 cmd.exe 59 PID 1260 wrote to memory of 792 1260 cmd.exe 60 PID 1260 wrote to memory of 792 1260 cmd.exe 60 PID 1260 wrote to memory of 792 1260 cmd.exe 60 PID 1260 wrote to memory of 852 1260 cmd.exe 61 PID 1260 wrote to memory of 852 1260 cmd.exe 61 PID 1260 wrote to memory of 852 1260 cmd.exe 61 PID 1260 wrote to memory of 1124 1260 cmd.exe 62 PID 1260 wrote to memory of 1124 1260 cmd.exe 62 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe"C:\Users\Admin\AppData\Local\Temp\8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\mtaskhost.exe"C:\Users\Admin\AppData\Local\Temp\mtaskhost.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\cltaskhost.exe"C:\Users\Admin\AppData\Local\Temp\cltaskhost.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1996
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1628
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:752
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1552
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1944
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1384
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:1364
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:1312
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:292
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:980
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:792
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:852
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1124
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1552
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1368
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1524
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D5B2E0EA-07A8-42F0-9255-8439E5509F5E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:996
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:588
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
3.4MB
MD550859caa45e9d02823ae55b69fd7b645
SHA1aec25ed88cd00fd12a18ca2714d68e33c7fd57c3
SHA2568dbebde20f5c4a1c0d29c9faf1c670423f99306042d428c35d6bdd552d3fb554
SHA51278df0c4c350b92743f4739855a8f605cf245463dde934edb2b8a26a5d6025231c17b8f0bbe2b9bffa4938343bf84ab88f5539282b6f9fbb78ec836d5a735d767
-
Filesize
3.4MB
MD550859caa45e9d02823ae55b69fd7b645
SHA1aec25ed88cd00fd12a18ca2714d68e33c7fd57c3
SHA2568dbebde20f5c4a1c0d29c9faf1c670423f99306042d428c35d6bdd552d3fb554
SHA51278df0c4c350b92743f4739855a8f605cf245463dde934edb2b8a26a5d6025231c17b8f0bbe2b9bffa4938343bf84ab88f5539282b6f9fbb78ec836d5a735d767
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57ef0872f576a92407619106bb1764edd
SHA1356e04d7732776a0fd1115aafa2ccd06c98b1df4
SHA256753d10d802eb76960d282555d2cfed612306467a06bb95ff35f0108e425c5c02
SHA5123803c8e88177d5a86f2cf574bf50cac809420c7e4f49f1b62d2e243bf112b9b6846c61ebfc9a310dcf2c4a2ea8042e7dbc95f19dbc98a13bb39c7e8adcc4df73
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6IFXHJOWP7FUAMXR89CY.temp
Filesize7KB
MD57ef0872f576a92407619106bb1764edd
SHA1356e04d7732776a0fd1115aafa2ccd06c98b1df4
SHA256753d10d802eb76960d282555d2cfed612306467a06bb95ff35f0108e425c5c02
SHA5123803c8e88177d5a86f2cf574bf50cac809420c7e4f49f1b62d2e243bf112b9b6846c61ebfc9a310dcf2c4a2ea8042e7dbc95f19dbc98a13bb39c7e8adcc4df73
-
Filesize
743.4MB
MD50b9127413603d541b9864c9627da41a7
SHA16c28f726335975a5fe7da6fba59986aa7f640db4
SHA256a0b31dadc116be18e9a624ab1a9e986594b018f1d0b31050ceb9c3ec1d28c426
SHA5124eb8cf8a9bc7bd7a40576002b025ee4c14458cd679cc2d06a117972e72c046910936b640449b800e3cb7b1a5840838b3a32364c12105ce637fce7f06008cefe6
-
Filesize
743.4MB
MD50b9127413603d541b9864c9627da41a7
SHA16c28f726335975a5fe7da6fba59986aa7f640db4
SHA256a0b31dadc116be18e9a624ab1a9e986594b018f1d0b31050ceb9c3ec1d28c426
SHA5124eb8cf8a9bc7bd7a40576002b025ee4c14458cd679cc2d06a117972e72c046910936b640449b800e3cb7b1a5840838b3a32364c12105ce637fce7f06008cefe6
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
3.4MB
MD550859caa45e9d02823ae55b69fd7b645
SHA1aec25ed88cd00fd12a18ca2714d68e33c7fd57c3
SHA2568dbebde20f5c4a1c0d29c9faf1c670423f99306042d428c35d6bdd552d3fb554
SHA51278df0c4c350b92743f4739855a8f605cf245463dde934edb2b8a26a5d6025231c17b8f0bbe2b9bffa4938343bf84ab88f5539282b6f9fbb78ec836d5a735d767
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
743.4MB
MD50b9127413603d541b9864c9627da41a7
SHA16c28f726335975a5fe7da6fba59986aa7f640db4
SHA256a0b31dadc116be18e9a624ab1a9e986594b018f1d0b31050ceb9c3ec1d28c426
SHA5124eb8cf8a9bc7bd7a40576002b025ee4c14458cd679cc2d06a117972e72c046910936b640449b800e3cb7b1a5840838b3a32364c12105ce637fce7f06008cefe6