Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/06/2023, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
a4aab901f5f4662d75a66bdb08971148.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a4aab901f5f4662d75a66bdb08971148.exe
Resource
win10v2004-20230220-en
General
-
Target
a4aab901f5f4662d75a66bdb08971148.exe
-
Size
1.7MB
-
MD5
a4aab901f5f4662d75a66bdb08971148
-
SHA1
9835bae8776e280b5a6bcf8e204d1bca5e05b0f6
-
SHA256
8eb56a2f631dd8b6e3cf827e2022dd3714b805eb377d4e186a41384ec624376c
-
SHA512
a4a86338d24118d20242714da4ac9df72a0954c7c7cfa4be80cb2495b2ced651e328b4fbf1e66ac844f76f838efd591baade7b2dca019917964ac0b7a73c479f
-
SSDEEP
24576:YwJAcH22+6MA333QaUozWal46B7Owg/63wXByw/OK:bJAcH22KA3339UPaewgrByq
Malware Config
Extracted
redline
090623_11_red
goodlogs.neverever.ug:11615
-
auth_value
ca62706abf6895102883ab0c8a86ddff
Extracted
laplas
http://45.159.189.105
-
api_key
f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
description pid Process procid_target PID 1504 created 1312 1504 mtaskhost.exe 15 PID 1504 created 1312 1504 mtaskhost.exe 15 PID 1504 created 1312 1504 mtaskhost.exe 15 PID 1504 created 1312 1504 mtaskhost.exe 15 PID 1504 created 1312 1504 mtaskhost.exe 15 PID 1968 created 1312 1968 updater.exe 15 PID 1968 created 1312 1968 updater.exe 15 PID 1968 created 1312 1968 updater.exe 15 PID 1968 created 1312 1968 updater.exe 15 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mtaskhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cltaskhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/1968-175-0x000000013F480000-0x000000014027B000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts mtaskhost.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mtaskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mtaskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cltaskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cltaskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe -
Executes dropped EXE 4 IoCs
pid Process 1504 mtaskhost.exe 540 cltaskhost.exe 1968 updater.exe 1104 ntlhost.exe -
Loads dropped DLL 4 IoCs
pid Process 1688 jsc.exe 1688 jsc.exe 1824 taskeng.exe 540 cltaskhost.exe -
resource yara_rule behavioral1/files/0x00090000000122e1-67.dat themida behavioral1/files/0x00090000000122e1-69.dat themida behavioral1/memory/1504-70-0x000000013FE10000-0x0000000140C0B000-memory.dmp themida behavioral1/memory/1504-71-0x000000013FE10000-0x0000000140C0B000-memory.dmp themida behavioral1/memory/1504-72-0x000000013FE10000-0x0000000140C0B000-memory.dmp themida behavioral1/memory/1504-73-0x000000013FE10000-0x0000000140C0B000-memory.dmp themida behavioral1/memory/1504-75-0x000000013FE10000-0x0000000140C0B000-memory.dmp themida behavioral1/memory/1504-76-0x000000013FE10000-0x0000000140C0B000-memory.dmp themida behavioral1/memory/1504-91-0x000000013FE10000-0x0000000140C0B000-memory.dmp themida behavioral1/memory/1504-114-0x000000013FE10000-0x0000000140C0B000-memory.dmp themida behavioral1/files/0x00090000000122e1-115.dat themida behavioral1/memory/1504-117-0x000000013FE10000-0x0000000140C0B000-memory.dmp themida behavioral1/files/0x00080000000122ea-118.dat themida behavioral1/files/0x00080000000122ea-122.dat themida behavioral1/files/0x00080000000122ea-123.dat themida behavioral1/memory/1968-124-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-125-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-126-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-127-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-128-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-129-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-130-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-133-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-153-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-157-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-168-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-170-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/memory/1968-175-0x000000013F480000-0x000000014027B000-memory.dmp themida behavioral1/files/0x00080000000122ea-176.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" cltaskhost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mtaskhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cltaskhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1504 mtaskhost.exe 540 cltaskhost.exe 1968 updater.exe 1104 ntlhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1056 set thread context of 1688 1056 a4aab901f5f4662d75a66bdb08971148.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe mtaskhost.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1988 sc.exe 920 sc.exe 916 sc.exe 2040 sc.exe 1604 sc.exe 1636 sc.exe 1488 sc.exe 1976 sc.exe 864 sc.exe 896 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 684 schtasks.exe 556 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 9 Go-http-client/1.1 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 30978651f89bd901 powershell.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1688 jsc.exe 1688 jsc.exe 1504 mtaskhost.exe 1504 mtaskhost.exe 1160 powershell.exe 1504 mtaskhost.exe 1504 mtaskhost.exe 1504 mtaskhost.exe 1504 mtaskhost.exe 1504 mtaskhost.exe 1504 mtaskhost.exe 268 powershell.exe 1504 mtaskhost.exe 1504 mtaskhost.exe 1968 updater.exe 1968 updater.exe 1436 powershell.exe 1968 updater.exe 1968 updater.exe 1968 updater.exe 1968 updater.exe 1968 updater.exe 1968 updater.exe 824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1056 a4aab901f5f4662d75a66bdb08971148.exe Token: SeDebugPrivilege 1688 jsc.exe Token: SeDebugPrivilege 1160 powershell.exe Token: SeShutdownPrivilege 1636 powercfg.exe Token: SeShutdownPrivilege 2008 powercfg.exe Token: SeShutdownPrivilege 1564 powercfg.exe Token: SeDebugPrivilege 268 powershell.exe Token: SeShutdownPrivilege 608 powercfg.exe Token: SeDebugPrivilege 1436 powershell.exe Token: SeShutdownPrivilege 1800 powercfg.exe Token: SeDebugPrivilege 824 powershell.exe Token: SeShutdownPrivilege 268 powercfg.exe Token: SeShutdownPrivilege 1744 powercfg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1688 1056 a4aab901f5f4662d75a66bdb08971148.exe 28 PID 1056 wrote to memory of 1688 1056 a4aab901f5f4662d75a66bdb08971148.exe 28 PID 1056 wrote to memory of 1688 1056 a4aab901f5f4662d75a66bdb08971148.exe 28 PID 1056 wrote to memory of 1688 1056 a4aab901f5f4662d75a66bdb08971148.exe 28 PID 1056 wrote to memory of 1688 1056 a4aab901f5f4662d75a66bdb08971148.exe 28 PID 1056 wrote to memory of 1688 1056 a4aab901f5f4662d75a66bdb08971148.exe 28 PID 1056 wrote to memory of 1688 1056 a4aab901f5f4662d75a66bdb08971148.exe 28 PID 1056 wrote to memory of 1688 1056 a4aab901f5f4662d75a66bdb08971148.exe 28 PID 1056 wrote to memory of 1688 1056 a4aab901f5f4662d75a66bdb08971148.exe 28 PID 1688 wrote to memory of 1504 1688 jsc.exe 30 PID 1688 wrote to memory of 1504 1688 jsc.exe 30 PID 1688 wrote to memory of 1504 1688 jsc.exe 30 PID 1688 wrote to memory of 1504 1688 jsc.exe 30 PID 1688 wrote to memory of 540 1688 jsc.exe 31 PID 1688 wrote to memory of 540 1688 jsc.exe 31 PID 1688 wrote to memory of 540 1688 jsc.exe 31 PID 1688 wrote to memory of 540 1688 jsc.exe 31 PID 1896 wrote to memory of 2040 1896 cmd.exe 36 PID 1896 wrote to memory of 2040 1896 cmd.exe 36 PID 1896 wrote to memory of 2040 1896 cmd.exe 36 PID 1896 wrote to memory of 1604 1896 cmd.exe 37 PID 1896 wrote to memory of 1604 1896 cmd.exe 37 PID 1896 wrote to memory of 1604 1896 cmd.exe 37 PID 1896 wrote to memory of 1988 1896 cmd.exe 38 PID 1896 wrote to memory of 1988 1896 cmd.exe 38 PID 1896 wrote to memory of 1988 1896 cmd.exe 38 PID 1896 wrote to memory of 920 1896 cmd.exe 39 PID 1896 wrote to memory of 920 1896 cmd.exe 39 PID 1896 wrote to memory of 920 1896 cmd.exe 39 PID 1896 wrote to memory of 916 1896 cmd.exe 40 PID 1896 wrote to memory of 916 1896 cmd.exe 40 PID 1896 wrote to memory of 916 1896 cmd.exe 40 PID 1992 wrote to memory of 1636 1992 cmd.exe 46 PID 1992 wrote to memory of 1636 1992 cmd.exe 46 PID 1992 wrote to memory of 1636 1992 cmd.exe 46 PID 1992 wrote to memory of 2008 1992 cmd.exe 45 PID 1992 wrote to memory of 2008 1992 cmd.exe 45 PID 1992 wrote to memory of 2008 1992 cmd.exe 45 PID 1992 wrote to memory of 1564 1992 cmd.exe 47 PID 1992 wrote to memory of 1564 1992 cmd.exe 47 PID 1992 wrote to memory of 1564 1992 cmd.exe 47 PID 1992 wrote to memory of 608 1992 cmd.exe 48 PID 1992 wrote to memory of 608 1992 cmd.exe 48 PID 1992 wrote to memory of 608 1992 cmd.exe 48 PID 268 wrote to memory of 684 268 powershell.exe 49 PID 268 wrote to memory of 684 268 powershell.exe 49 PID 268 wrote to memory of 684 268 powershell.exe 49 PID 1824 wrote to memory of 1968 1824 taskeng.exe 53 PID 1824 wrote to memory of 1968 1824 taskeng.exe 53 PID 1824 wrote to memory of 1968 1824 taskeng.exe 53 PID 540 wrote to memory of 1104 540 cltaskhost.exe 54 PID 540 wrote to memory of 1104 540 cltaskhost.exe 54 PID 540 wrote to memory of 1104 540 cltaskhost.exe 54 PID 932 wrote to memory of 1636 932 cmd.exe 59 PID 932 wrote to memory of 1636 932 cmd.exe 59 PID 932 wrote to memory of 1636 932 cmd.exe 59 PID 932 wrote to memory of 1488 932 cmd.exe 60 PID 932 wrote to memory of 1488 932 cmd.exe 60 PID 932 wrote to memory of 1488 932 cmd.exe 60 PID 932 wrote to memory of 1976 932 cmd.exe 61 PID 932 wrote to memory of 1976 932 cmd.exe 61 PID 932 wrote to memory of 1976 932 cmd.exe 61 PID 932 wrote to memory of 864 932 cmd.exe 62 PID 932 wrote to memory of 864 932 cmd.exe 62 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\a4aab901f5f4662d75a66bdb08971148.exe"C:\Users\Admin\AppData\Local\Temp\a4aab901f5f4662d75a66bdb08971148.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\mtaskhost.exe"C:\Users\Admin\AppData\Local\Temp\mtaskhost.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\cltaskhost.exe"C:\Users\Admin\AppData\Local\Temp\cltaskhost.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1104
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2040
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1604
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1988
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:920
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:916
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:684
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:608
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1636
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1488
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1976
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:864
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:896
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:384
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1272
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:556
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1880
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1936
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {575CDEFB-62B9-4982-97B8-6EC25873AF54} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
3.4MB
MD550859caa45e9d02823ae55b69fd7b645
SHA1aec25ed88cd00fd12a18ca2714d68e33c7fd57c3
SHA2568dbebde20f5c4a1c0d29c9faf1c670423f99306042d428c35d6bdd552d3fb554
SHA51278df0c4c350b92743f4739855a8f605cf245463dde934edb2b8a26a5d6025231c17b8f0bbe2b9bffa4938343bf84ab88f5539282b6f9fbb78ec836d5a735d767
-
Filesize
3.4MB
MD550859caa45e9d02823ae55b69fd7b645
SHA1aec25ed88cd00fd12a18ca2714d68e33c7fd57c3
SHA2568dbebde20f5c4a1c0d29c9faf1c670423f99306042d428c35d6bdd552d3fb554
SHA51278df0c4c350b92743f4739855a8f605cf245463dde934edb2b8a26a5d6025231c17b8f0bbe2b9bffa4938343bf84ab88f5539282b6f9fbb78ec836d5a735d767
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53691e3c32f79fcd86f5a4ba522a95bc3
SHA165ffc13e469720bcc6005e1724fdaedb9dfab54d
SHA256dd1744a0f7273acba4e5ed1d85c5af76a1b0e780a6aa20ab9fb9286319304445
SHA51291eff6e86cce83fa45d9314fe6a2cfb7ad831be8589438f69e9264c21bdbb54e6453a48730d101e59f1ea866898aee033609a69eaa19964c77051205b1b71805
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\I15V56858SPFAZX7BWYQ.temp
Filesize7KB
MD53691e3c32f79fcd86f5a4ba522a95bc3
SHA165ffc13e469720bcc6005e1724fdaedb9dfab54d
SHA256dd1744a0f7273acba4e5ed1d85c5af76a1b0e780a6aa20ab9fb9286319304445
SHA51291eff6e86cce83fa45d9314fe6a2cfb7ad831be8589438f69e9264c21bdbb54e6453a48730d101e59f1ea866898aee033609a69eaa19964c77051205b1b71805
-
Filesize
251.2MB
MD56d7e4391f08a09b24ca260468cbbb31b
SHA1c9418ca74b7d7e65458815dde60e11610d0ad861
SHA256022325e1cb18e9f02e02e350be928f48230bd70045f9ece0a4b91db1cec6695b
SHA5120e378e25cae417faa9fd169ec3dc916868315b1c2611a0bd6064f0c94da74e9868eb70ec8be52f91e0c4f5c65efedfdadd202f5dce52c8b775a347b9b63ccd7a
-
Filesize
203.7MB
MD5f4ac6805323919c35ae80e9f0374edba
SHA1c0bd108eb6f230e04c8c15286041add487af5963
SHA256053708b1b2307940ac113f142358b6ed6bf3a059b0afd683e15dc284a013f1ab
SHA5126570f5249bb2e77ad602511b5b94b432c0a57c452e3d271053c3453ca7e962da04217358fffbbbb81220bac1e052af3786bc2b6eaec36556d3d13f98621f84f5
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
3.4MB
MD550859caa45e9d02823ae55b69fd7b645
SHA1aec25ed88cd00fd12a18ca2714d68e33c7fd57c3
SHA2568dbebde20f5c4a1c0d29c9faf1c670423f99306042d428c35d6bdd552d3fb554
SHA51278df0c4c350b92743f4739855a8f605cf245463dde934edb2b8a26a5d6025231c17b8f0bbe2b9bffa4938343bf84ab88f5539282b6f9fbb78ec836d5a735d767
-
Filesize
10.8MB
MD56e39a59c8f6c3f52f122f80fb0933c9f
SHA1cb1e56e022de8660579a5812b97303529bdca5d5
SHA25617f1d39417de8a58e1c64a84aa10499cc0462748a47d3e82f358f97ef536a671
SHA512219edd14a795a375220370858f4bfefa2e83fe0a57d90a56097486883b925383567c6c3159c8c312305ae06641d632c8cbef7e823d228efdf3abb912bbdd21cf
-
Filesize
260.1MB
MD5766f65597aa4554e7c66874585cebc05
SHA18b810ffa3c5b68005626fd19fa9dd269e3751722
SHA256d83431ec3a99221ec6ef526cee40156e00bfa40c86b2679cb7edef5b50e975b3
SHA512f113d270ffaf2ab2d7ec28e06aa6f41cbc05d16fbd87d2afa66d5a7fbf72882d8d8cf60424bb4d4f0bd14ffb6fd10c49860365068c2f00f0a00548dcee1ec1ca