Analysis
-
max time kernel
136s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
22-06-2023 05:40
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230621-en
General
-
Target
file.exe
-
Size
448KB
-
MD5
f5a4e48c469d899bf882475b36dff8d9
-
SHA1
b1845ec95f2837038461a04dc266bcb48a052fcb
-
SHA256
d850df618ed03fd518cb4c52bb09657a2eda865702a0498b965b0279ea73b362
-
SHA512
8be14d34d360537a82532b8172d5ad4c257ac703f0ecbc021871d521723ff942101ba84c53ccbd3148808f2f7a3748bd478e7e1e89cb53e1d95a32907b81b003
-
SSDEEP
6144:L/E8DIpjK28t4snQxlp3z/pSZ+pDKpf9EkQbKxVK+PXItNOapG8RuzRiRh3Zi:dEpj7snqv/cgu4VGn6OaM+ucj
Malware Config
Signatures
-
Detect rhadamanthys stealer shellcode 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2004-55-0x0000000001D40000-0x0000000002140000-memory.dmp family_rhadamanthys behavioral1/memory/2004-56-0x0000000001D40000-0x0000000002140000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
Processes:
file.exeyI9VA7c46.exe(b_y84O.exeupdater.exedescription pid Process procid_target PID 2004 created 1200 2004 file.exe 20 PID 1636 created 1200 1636 yI9VA7c46.exe 20 PID 1556 created 1200 1556 (b_y84O.exe 20 PID 1636 created 1200 1636 yI9VA7c46.exe 20 PID 1556 created 1200 1556 (b_y84O.exe 20 PID 1636 created 1200 1636 yI9VA7c46.exe 20 PID 1636 created 1200 1636 yI9VA7c46.exe 20 PID 1556 created 1200 1556 (b_y84O.exe 20 PID 1556 created 1200 1556 (b_y84O.exe 20 PID 1556 created 1200 1556 (b_y84O.exe 20 PID 1636 created 1200 1636 yI9VA7c46.exe 20 PID 1592 created 1200 1592 updater.exe 20 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
BrowserUpdate.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BrowserUpdate.exe -
Drops file in Drivers directory 2 IoCs
Processes:
yI9VA7c46.exe(b_y84O.exedescription ioc Process File created C:\Windows\System32\drivers\etc\hosts yI9VA7c46.exe File created C:\Windows\System32\drivers\etc\hosts (b_y84O.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
BrowserUpdate.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BrowserUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BrowserUpdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BrowserUpdate.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Control Panel\International\Geo\Nation BrowserUpdate.exe -
Deletes itself 1 IoCs
Processes:
certreq.exepid Process 332 certreq.exe -
Executes dropped EXE 5 IoCs
Processes:
4vXB.exeBrowserUpdate.exeyI9VA7c46.exe(b_y84O.exeupdater.exepid Process 1268 4vXB.exe 592 BrowserUpdate.exe 1636 yI9VA7c46.exe 1556 (b_y84O.exe 1592 updater.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
BrowserUpdate.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Wine BrowserUpdate.exe -
Loads dropped DLL 4 IoCs
Processes:
4vXB.exetaskeng.exepid Process 1268 4vXB.exe 1052 1052 1048 taskeng.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
certreq.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4vXB.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 4vXB.exe Set value (str) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google LLC = "C:\\Program Files\\Google\\Chrome\\Application\\BrowserUpdate.exe -l [email protected]" 4vXB.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
powershell.exesc.exepowershell.execmd.exepowershell.exedescription ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk sc.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk cmd.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
BrowserUpdate.exepid Process 592 BrowserUpdate.exe -
Drops file in Program Files directory 3 IoCs
Processes:
4vXB.exe(b_y84O.exeyI9VA7c46.exedescription ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\BrowserUpdate.exe 4vXB.exe File created C:\Program Files\Google\Chrome\updater.exe (b_y84O.exe File created C:\Program Files\Google\Chrome\updater.exe yI9VA7c46.exe -
Launches sc.exe 15 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 432 sc.exe 644 sc.exe 1580 sc.exe 1632 sc.exe 1660 sc.exe 832 sc.exe 1256 sc.exe 1680 sc.exe 2008 sc.exe 2004 sc.exe 332 sc.exe 944 sc.exe 1596 sc.exe 1332 sc.exe 1532 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
certreq.exedescription ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 344 schtasks.exe 756 schtasks.exe 1096 schtasks.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
powershell.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 202cee4bcca4d901 powershell.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
file.execertreq.exeBrowserUpdate.exeyI9VA7c46.exepowershell.exe(b_y84O.exesc.exepowershell.execmd.exeupdater.exepowershell.exepid Process 2004 file.exe 2004 file.exe 2004 file.exe 2004 file.exe 332 certreq.exe 332 certreq.exe 332 certreq.exe 332 certreq.exe 592 BrowserUpdate.exe 1636 yI9VA7c46.exe 1636 yI9VA7c46.exe 1796 powershell.exe 1556 (b_y84O.exe 1556 (b_y84O.exe 1332 sc.exe 1636 yI9VA7c46.exe 1636 yI9VA7c46.exe 1556 (b_y84O.exe 1556 (b_y84O.exe 1636 yI9VA7c46.exe 1636 yI9VA7c46.exe 1636 yI9VA7c46.exe 1636 yI9VA7c46.exe 1308 powershell.exe 1556 (b_y84O.exe 1556 (b_y84O.exe 1556 (b_y84O.exe 1556 (b_y84O.exe 1276 cmd.exe 1556 (b_y84O.exe 1556 (b_y84O.exe 1636 yI9VA7c46.exe 1636 yI9VA7c46.exe 1592 updater.exe 1592 updater.exe 2032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
powershell.exesc.exepowershell.exeupdater.exepowercfg.exepowercfg.execmd.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowershell.exedescription pid Process Token: SeDebugPrivilege 1796 powershell.exe Token: SeDebugPrivilege 1332 sc.exe Token: SeDebugPrivilege 1308 powershell.exe Token: SeShutdownPrivilege 1592 updater.exe Token: SeShutdownPrivilege 1656 powercfg.exe Token: SeShutdownPrivilege 1336 powercfg.exe Token: SeDebugPrivilege 1276 cmd.exe Token: SeShutdownPrivilege 432 powercfg.exe Token: SeShutdownPrivilege 1448 powercfg.exe Token: SeShutdownPrivilege 1136 powercfg.exe Token: SeShutdownPrivilege 1632 powercfg.exe Token: SeShutdownPrivilege 1576 powercfg.exe Token: SeDebugPrivilege 2032 powershell.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
BrowserUpdate.exepid Process 592 BrowserUpdate.exe 592 BrowserUpdate.exe 592 BrowserUpdate.exe 592 BrowserUpdate.exe 592 BrowserUpdate.exe 592 BrowserUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exe4vXB.execmd.execmd.execmd.execmd.execmd.exedescription pid Process procid_target PID 2004 wrote to memory of 332 2004 file.exe 29 PID 2004 wrote to memory of 332 2004 file.exe 29 PID 2004 wrote to memory of 332 2004 file.exe 29 PID 2004 wrote to memory of 332 2004 file.exe 29 PID 2004 wrote to memory of 332 2004 file.exe 29 PID 2004 wrote to memory of 332 2004 file.exe 29 PID 1268 wrote to memory of 592 1268 4vXB.exe 32 PID 1268 wrote to memory of 592 1268 4vXB.exe 32 PID 1268 wrote to memory of 592 1268 4vXB.exe 32 PID 1268 wrote to memory of 592 1268 4vXB.exe 32 PID 1268 wrote to memory of 592 1268 4vXB.exe 32 PID 1268 wrote to memory of 592 1268 4vXB.exe 32 PID 1268 wrote to memory of 592 1268 4vXB.exe 32 PID 1436 wrote to memory of 432 1436 cmd.exe 65 PID 1436 wrote to memory of 432 1436 cmd.exe 65 PID 1436 wrote to memory of 432 1436 cmd.exe 65 PID 1436 wrote to memory of 644 1436 cmd.exe 43 PID 1436 wrote to memory of 644 1436 cmd.exe 43 PID 1436 wrote to memory of 644 1436 cmd.exe 43 PID 1436 wrote to memory of 1580 1436 cmd.exe 44 PID 1436 wrote to memory of 1580 1436 cmd.exe 44 PID 1436 wrote to memory of 1580 1436 cmd.exe 44 PID 1128 wrote to memory of 1632 1128 cmd.exe 70 PID 1128 wrote to memory of 1632 1128 cmd.exe 70 PID 1128 wrote to memory of 1632 1128 cmd.exe 70 PID 1436 wrote to memory of 1256 1436 cmd.exe 47 PID 1436 wrote to memory of 1256 1436 cmd.exe 47 PID 1436 wrote to memory of 1256 1436 cmd.exe 47 PID 1128 wrote to memory of 944 1128 cmd.exe 49 PID 1128 wrote to memory of 944 1128 cmd.exe 49 PID 1128 wrote to memory of 944 1128 cmd.exe 49 PID 1128 wrote to memory of 2008 1128 cmd.exe 81 PID 1128 wrote to memory of 2008 1128 cmd.exe 81 PID 1128 wrote to memory of 2008 1128 cmd.exe 81 PID 1436 wrote to memory of 1680 1436 cmd.exe 89 PID 1436 wrote to memory of 1680 1436 cmd.exe 89 PID 1436 wrote to memory of 1680 1436 cmd.exe 89 PID 1128 wrote to memory of 2004 1128 cmd.exe 51 PID 1128 wrote to memory of 2004 1128 cmd.exe 51 PID 1128 wrote to memory of 2004 1128 cmd.exe 51 PID 1128 wrote to memory of 1596 1128 cmd.exe 53 PID 1128 wrote to memory of 1596 1128 cmd.exe 53 PID 1128 wrote to memory of 1596 1128 cmd.exe 53 PID 900 wrote to memory of 1592 900 cmd.exe 77 PID 900 wrote to memory of 1592 900 cmd.exe 77 PID 900 wrote to memory of 1592 900 cmd.exe 77 PID 1904 wrote to memory of 1656 1904 cmd.exe 61 PID 1904 wrote to memory of 1656 1904 cmd.exe 61 PID 1904 wrote to memory of 1656 1904 cmd.exe 61 PID 900 wrote to memory of 1336 900 cmd.exe 62 PID 900 wrote to memory of 1336 900 cmd.exe 62 PID 900 wrote to memory of 1336 900 cmd.exe 62 PID 1904 wrote to memory of 432 1904 cmd.exe 65 PID 1904 wrote to memory of 432 1904 cmd.exe 65 PID 1904 wrote to memory of 432 1904 cmd.exe 65 PID 1904 wrote to memory of 1136 1904 cmd.exe 67 PID 1904 wrote to memory of 1136 1904 cmd.exe 67 PID 1904 wrote to memory of 1136 1904 cmd.exe 67 PID 900 wrote to memory of 1448 900 cmd.exe 66 PID 900 wrote to memory of 1448 900 cmd.exe 66 PID 900 wrote to memory of 1448 900 cmd.exe 66 PID 1276 wrote to memory of 344 1276 cmd.exe 68 PID 1276 wrote to memory of 344 1276 cmd.exe 68 PID 1276 wrote to memory of 344 1276 cmd.exe 68 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
certreq.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
Processes:
certreq.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Deletes itself
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:1332
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:432
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:644
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1580
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1256
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1680
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:944
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2008
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2004
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1596
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zmjvgdgm#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:756
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:1592
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#vjciy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:1276
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:344
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1856
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:528
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1660
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:332
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Drops file in System32 directory
- Launches sc.exe
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1532
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:832
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:1980
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:896
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1604
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1696
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zmjvgdgm#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:1528
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:1096
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1788
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:992
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1256
-
-
C:\Users\Admin\AppData\Local\Microsoft\4vXB.exe"C:\Users\Admin\AppData\Local\Microsoft\4vXB.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files\Google\Chrome\Application\BrowserUpdate.exe"C:\Program Files\Google\Chrome\Application\BrowserUpdate.exe" -l [email protected]2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:592
-
-
C:\Users\Admin\AppData\Local\Microsoft\yI9VA7c46.exe"C:\Users\Admin\AppData\Local\Microsoft\yI9VA7c46.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
C:\Users\Admin\AppData\Local\Microsoft\(b_y84O.exe"C:\Users\Admin\AppData\Local\Microsoft\(b_y84O.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
C:\Windows\System32\sc.exesc stop UsoSvc1⤵
- Launches sc.exe
PID:1632
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
C:\Windows\system32\taskeng.exetaskeng.exe {2CBC4CFB-AE66-469E-AC85-F573DEDD9856} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
PID:1048 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2071785887-1226335026-934456637-1032687295934737698-2003114986377765491013590629"1⤵PID:2008
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1108598211-160475057013085022451936920636-295928186-218446816949602026-551825290"1⤵PID:1680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5dad5670c447512438535a15ffec5034d
SHA1646c8877fadd7f011945ea2d2b221ea8fecaa857
SHA2569fd44fe6e6d0bfe25d995d2b6479104cdcf44f68a350fc7eb981c99b5312dcb5
SHA512b7d5da4b55a344581223f134034a25f7c02cd83348b6b95c3ea83b07b371d7a88f6f322529588301a9db823e93682c74f73dc3ce494847ad579bea08c557eb5c
-
Filesize
4.4MB
MD5dad5670c447512438535a15ffec5034d
SHA1646c8877fadd7f011945ea2d2b221ea8fecaa857
SHA2569fd44fe6e6d0bfe25d995d2b6479104cdcf44f68a350fc7eb981c99b5312dcb5
SHA512b7d5da4b55a344581223f134034a25f7c02cd83348b6b95c3ea83b07b371d7a88f6f322529588301a9db823e93682c74f73dc3ce494847ad579bea08c557eb5c
-
Filesize
4.4MB
MD5dad5670c447512438535a15ffec5034d
SHA1646c8877fadd7f011945ea2d2b221ea8fecaa857
SHA2569fd44fe6e6d0bfe25d995d2b6479104cdcf44f68a350fc7eb981c99b5312dcb5
SHA512b7d5da4b55a344581223f134034a25f7c02cd83348b6b95c3ea83b07b371d7a88f6f322529588301a9db823e93682c74f73dc3ce494847ad579bea08c557eb5c
-
Filesize
56.6MB
MD50b8ff333db2a5d1ed4a01965756fac3d
SHA115514ed3825c26eff55895ed150bcde3ecf87cd3
SHA25633ed05f44788e4e32ff2db82b2157a6021b64c6d5de1b957297263f7f1bf4225
SHA512d1e9822fc48ecd3b54aeafa5eb4bbc1ee756b0463c5c28421a15802056686206edeb6a0d1182d367e24d182ba4f5ddc52ea7d6fc53a00959658e8e8b8b18a871
-
Filesize
56.6MB
MD50b8ff333db2a5d1ed4a01965756fac3d
SHA115514ed3825c26eff55895ed150bcde3ecf87cd3
SHA25633ed05f44788e4e32ff2db82b2157a6021b64c6d5de1b957297263f7f1bf4225
SHA512d1e9822fc48ecd3b54aeafa5eb4bbc1ee756b0463c5c28421a15802056686206edeb6a0d1182d367e24d182ba4f5ddc52ea7d6fc53a00959658e8e8b8b18a871
-
Filesize
29.7MB
MD57bd61f7afd49614e3da25b1b6aeea242
SHA189930652b8eb65d192c3d9e3385632370c76436a
SHA256c718613caa383beb609abb2e1b59efa1006a3355095b80ae934df9907b126ec0
SHA512af1be11f25ff8eb4d802cdab30bbc593e44888fedeb3571285a42f884dd17d558f42ffe41558ca4b9cd06d6ed9ac32ebbac7699f78f74fe9d8efffd4daea1a96
-
Filesize
56.6MB
MD50719c8bebea815061780ada047c77d85
SHA1f38ec6878f127bb12e64393af78cb74f489dcca2
SHA256089ba4c853ff529ba69c1977173c4b642d0aa62a3cf6d48a2fbe3b88c2f982f0
SHA512c03661f55d6e263c94dcfe6463dd667e6d0a83c46136141a72b4d3a53d596c2ec4f45780f679f0a6df6509ba75e42fefaa571c305aed23736d4c64b680134564
-
Filesize
56.6MB
MD50719c8bebea815061780ada047c77d85
SHA1f38ec6878f127bb12e64393af78cb74f489dcca2
SHA256089ba4c853ff529ba69c1977173c4b642d0aa62a3cf6d48a2fbe3b88c2f982f0
SHA512c03661f55d6e263c94dcfe6463dd667e6d0a83c46136141a72b4d3a53d596c2ec4f45780f679f0a6df6509ba75e42fefaa571c305aed23736d4c64b680134564
-
Filesize
4.5MB
MD52b476e1317d92eb5d13dc01b254ef70a
SHA173b95b11dba56f414b06287908808879184306b5
SHA256bc840027c4d7840b3feed3ffb5992094b168fc3fe01cad7a289a946d0482c489
SHA51290083d915fd53f344ca94b521285dcf68ad7f7787948b5ad5218b8fea3210ce4e849f15f1f039233a8512aa1815ba6345f51e6a46f5ccea46bd60aecc12861a6
-
Filesize
4.5MB
MD52b476e1317d92eb5d13dc01b254ef70a
SHA173b95b11dba56f414b06287908808879184306b5
SHA256bc840027c4d7840b3feed3ffb5992094b168fc3fe01cad7a289a946d0482c489
SHA51290083d915fd53f344ca94b521285dcf68ad7f7787948b5ad5218b8fea3210ce4e849f15f1f039233a8512aa1815ba6345f51e6a46f5ccea46bd60aecc12861a6
-
Filesize
56.6MB
MD50b8ff333db2a5d1ed4a01965756fac3d
SHA115514ed3825c26eff55895ed150bcde3ecf87cd3
SHA25633ed05f44788e4e32ff2db82b2157a6021b64c6d5de1b957297263f7f1bf4225
SHA512d1e9822fc48ecd3b54aeafa5eb4bbc1ee756b0463c5c28421a15802056686206edeb6a0d1182d367e24d182ba4f5ddc52ea7d6fc53a00959658e8e8b8b18a871
-
Filesize
56.6MB
MD50b8ff333db2a5d1ed4a01965756fac3d
SHA115514ed3825c26eff55895ed150bcde3ecf87cd3
SHA25633ed05f44788e4e32ff2db82b2157a6021b64c6d5de1b957297263f7f1bf4225
SHA512d1e9822fc48ecd3b54aeafa5eb4bbc1ee756b0463c5c28421a15802056686206edeb6a0d1182d367e24d182ba4f5ddc52ea7d6fc53a00959658e8e8b8b18a871
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59addf38a20100e5f8a7b727d42d870e0
SHA1e79c34a77550eb8df78ca4f159b1bd9c1db4e059
SHA256230f9317f548aad73eaf60e6188809157286ce6e5d4f759a5036ef333623f4b1
SHA5123749862df6de42478c1fba083af9316306692f81ddac67da24a85be84b0041dd352c58d1b51e195ec2ad37146e63a8f8f29e086ff5e5f73e3b01620f390d69d6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59addf38a20100e5f8a7b727d42d870e0
SHA1e79c34a77550eb8df78ca4f159b1bd9c1db4e059
SHA256230f9317f548aad73eaf60e6188809157286ce6e5d4f759a5036ef333623f4b1
SHA5123749862df6de42478c1fba083af9316306692f81ddac67da24a85be84b0041dd352c58d1b51e195ec2ad37146e63a8f8f29e086ff5e5f73e3b01620f390d69d6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59addf38a20100e5f8a7b727d42d870e0
SHA1e79c34a77550eb8df78ca4f159b1bd9c1db4e059
SHA256230f9317f548aad73eaf60e6188809157286ce6e5d4f759a5036ef333623f4b1
SHA5123749862df6de42478c1fba083af9316306692f81ddac67da24a85be84b0041dd352c58d1b51e195ec2ad37146e63a8f8f29e086ff5e5f73e3b01620f390d69d6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\T4L0R7Z6PT5KLEP8WTKI.temp
Filesize7KB
MD59addf38a20100e5f8a7b727d42d870e0
SHA1e79c34a77550eb8df78ca4f159b1bd9c1db4e059
SHA256230f9317f548aad73eaf60e6188809157286ce6e5d4f759a5036ef333623f4b1
SHA5123749862df6de42478c1fba083af9316306692f81ddac67da24a85be84b0041dd352c58d1b51e195ec2ad37146e63a8f8f29e086ff5e5f73e3b01620f390d69d6
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
4.4MB
MD5dad5670c447512438535a15ffec5034d
SHA1646c8877fadd7f011945ea2d2b221ea8fecaa857
SHA2569fd44fe6e6d0bfe25d995d2b6479104cdcf44f68a350fc7eb981c99b5312dcb5
SHA512b7d5da4b55a344581223f134034a25f7c02cd83348b6b95c3ea83b07b371d7a88f6f322529588301a9db823e93682c74f73dc3ce494847ad579bea08c557eb5c
-
Filesize
56.6MB
MD50b8ff333db2a5d1ed4a01965756fac3d
SHA115514ed3825c26eff55895ed150bcde3ecf87cd3
SHA25633ed05f44788e4e32ff2db82b2157a6021b64c6d5de1b957297263f7f1bf4225
SHA512d1e9822fc48ecd3b54aeafa5eb4bbc1ee756b0463c5c28421a15802056686206edeb6a0d1182d367e24d182ba4f5ddc52ea7d6fc53a00959658e8e8b8b18a871
-
Filesize
56.6MB
MD50719c8bebea815061780ada047c77d85
SHA1f38ec6878f127bb12e64393af78cb74f489dcca2
SHA256089ba4c853ff529ba69c1977173c4b642d0aa62a3cf6d48a2fbe3b88c2f982f0
SHA512c03661f55d6e263c94dcfe6463dd667e6d0a83c46136141a72b4d3a53d596c2ec4f45780f679f0a6df6509ba75e42fefaa571c305aed23736d4c64b680134564
-
Filesize
56.6MB
MD50b8ff333db2a5d1ed4a01965756fac3d
SHA115514ed3825c26eff55895ed150bcde3ecf87cd3
SHA25633ed05f44788e4e32ff2db82b2157a6021b64c6d5de1b957297263f7f1bf4225
SHA512d1e9822fc48ecd3b54aeafa5eb4bbc1ee756b0463c5c28421a15802056686206edeb6a0d1182d367e24d182ba4f5ddc52ea7d6fc53a00959658e8e8b8b18a871