Analysis
-
max time kernel
281s -
max time network
304s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-07-2023 03:32
Behavioral task
behavioral1
Sample
753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe
Resource
win10-20230703-en
General
-
Target
753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe
-
Size
2.3MB
-
MD5
9b06361b484531e8d71b64fbb32534d9
-
SHA1
6c47e8bfaf1b82c57c861312f1fe130cc5e21c96
-
SHA256
753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd
-
SHA512
dd9ab0d96801bdc8e541c60f0cb23f8c5089f8cefd4fa9041dae5d6d7e393f27ff25cc445117e3804f235fabce0fd2ae80d284463ef2278da5afb6a81f285bbb
-
SSDEEP
49152:SgUFBrKkyuD7ug6e1NsUfgvig28JUU1y4unHZ1IxLRoV:eJK1umgBUU+n28uUMxHXIh6
Malware Config
Extracted
redline
150723_rc_11
rcam15.tuktuk.ug:11290
-
auth_value
0b3645317afbcac212f68853bb45b46d
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 3004 created 1268 3004 TaskMnr.exe 6 PID 3004 created 1268 3004 TaskMnr.exe 6 PID 3004 created 1268 3004 TaskMnr.exe 6 PID 3004 created 1268 3004 TaskMnr.exe 6 PID 3004 created 1268 3004 TaskMnr.exe 6 PID 1028 created 1268 1028 updater.exe 6 PID 1028 created 1268 1028 updater.exe 6 PID 1028 created 1268 1028 updater.exe 6 PID 1028 created 1268 1028 updater.exe 6 PID 1028 created 1268 1028 updater.exe 6 PID 1028 created 1268 1028 updater.exe 6 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Octium.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TaskMnr.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts TaskMnr.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Octium.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Octium.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TaskMnr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TaskMnr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe -
Executes dropped EXE 4 IoCs
pid Process 1692 Octium.exe 3004 TaskMnr.exe 2196 ntlhost.exe 1028 updater.exe -
Loads dropped DLL 4 IoCs
pid Process 2976 AppLaunch.exe 2976 AppLaunch.exe 1692 Octium.exe 2220 taskeng.exe -
resource yara_rule behavioral1/memory/2560-67-0x0000000000A50000-0x000000000100A000-memory.dmp themida behavioral1/memory/2560-116-0x0000000000A50000-0x000000000100A000-memory.dmp themida behavioral1/files/0x0008000000015c52-141.dat themida behavioral1/files/0x0008000000015c52-138.dat themida behavioral1/memory/3004-144-0x000000013F750000-0x00000001406F0000-memory.dmp themida behavioral1/memory/3004-148-0x000000013F750000-0x00000001406F0000-memory.dmp themida behavioral1/memory/3004-147-0x000000013F750000-0x00000001406F0000-memory.dmp themida behavioral1/memory/3004-146-0x000000013F750000-0x00000001406F0000-memory.dmp themida behavioral1/memory/3004-145-0x000000013F750000-0x00000001406F0000-memory.dmp themida behavioral1/memory/3004-149-0x000000013F750000-0x00000001406F0000-memory.dmp themida behavioral1/memory/3004-152-0x000000013F750000-0x00000001406F0000-memory.dmp themida behavioral1/files/0x0008000000015c52-215.dat themida behavioral1/files/0x0009000000015c89-221.dat themida behavioral1/files/0x0009000000015c89-220.dat themida behavioral1/files/0x0009000000015c89-223.dat themida behavioral1/files/0x0009000000015c89-264.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" Octium.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Octium.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TaskMnr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 1692 Octium.exe 3004 TaskMnr.exe 2196 ntlhost.exe 1028 updater.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2560 set thread context of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 1028 set thread context of 2984 1028 updater.exe 75 PID 1028 set thread context of 2908 1028 updater.exe 76 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe TaskMnr.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2240 sc.exe 1004 sc.exe 2800 sc.exe 2124 sc.exe 1644 sc.exe 2576 sc.exe 2672 sc.exe 668 sc.exe 2012 sc.exe 2136 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1672 schtasks.exe 336 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 6 Go-http-client/1.1 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 8015d46296b7d901 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 2976 AppLaunch.exe 2976 AppLaunch.exe 3004 TaskMnr.exe 3004 TaskMnr.exe 2492 powershell.exe 3004 TaskMnr.exe 3004 TaskMnr.exe 3004 TaskMnr.exe 3004 TaskMnr.exe 3004 TaskMnr.exe 3004 TaskMnr.exe 1280 powershell.exe 3004 TaskMnr.exe 3004 TaskMnr.exe 1028 updater.exe 1028 updater.exe 2532 powershell.exe 1028 updater.exe 1028 updater.exe 1028 updater.exe 1028 updater.exe 1028 updater.exe 1028 updater.exe 1828 powershell.exe 1028 updater.exe 1028 updater.exe 1028 updater.exe 1028 updater.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe 2908 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe Token: SeDebugPrivilege 2976 AppLaunch.exe Token: SeDebugPrivilege 2492 powershell.exe Token: SeShutdownPrivilege 2140 powercfg.exe Token: SeDebugPrivilege 1280 powershell.exe Token: SeShutdownPrivilege 764 powercfg.exe Token: SeShutdownPrivilege 940 powercfg.exe Token: SeShutdownPrivilege 1792 powercfg.exe Token: SeDebugPrivilege 2532 powershell.exe Token: SeShutdownPrivilege 2200 powercfg.exe Token: SeDebugPrivilege 1828 powershell.exe Token: SeShutdownPrivilege 528 powercfg.exe Token: SeShutdownPrivilege 2812 powercfg.exe Token: SeShutdownPrivilege 592 powercfg.exe Token: SeDebugPrivilege 1028 updater.exe Token: SeLockMemoryPrivilege 2908 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2560 wrote to memory of 2976 2560 753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe 28 PID 2976 wrote to memory of 1692 2976 AppLaunch.exe 32 PID 2976 wrote to memory of 1692 2976 AppLaunch.exe 32 PID 2976 wrote to memory of 1692 2976 AppLaunch.exe 32 PID 2976 wrote to memory of 1692 2976 AppLaunch.exe 32 PID 2976 wrote to memory of 3004 2976 AppLaunch.exe 33 PID 2976 wrote to memory of 3004 2976 AppLaunch.exe 33 PID 2976 wrote to memory of 3004 2976 AppLaunch.exe 33 PID 2976 wrote to memory of 3004 2976 AppLaunch.exe 33 PID 1692 wrote to memory of 2196 1692 Octium.exe 34 PID 1692 wrote to memory of 2196 1692 Octium.exe 34 PID 1692 wrote to memory of 2196 1692 Octium.exe 34 PID 2328 wrote to memory of 2124 2328 cmd.exe 52 PID 2328 wrote to memory of 2124 2328 cmd.exe 52 PID 2328 wrote to memory of 2124 2328 cmd.exe 52 PID 2328 wrote to memory of 2240 2328 cmd.exe 39 PID 2328 wrote to memory of 2240 2328 cmd.exe 39 PID 2328 wrote to memory of 2240 2328 cmd.exe 39 PID 2328 wrote to memory of 668 2328 cmd.exe 40 PID 2328 wrote to memory of 668 2328 cmd.exe 40 PID 2328 wrote to memory of 668 2328 cmd.exe 40 PID 2328 wrote to memory of 2800 2328 cmd.exe 50 PID 2328 wrote to memory of 2800 2328 cmd.exe 50 PID 2328 wrote to memory of 2800 2328 cmd.exe 50 PID 2328 wrote to memory of 1004 2328 cmd.exe 49 PID 2328 wrote to memory of 1004 2328 cmd.exe 49 PID 2328 wrote to memory of 1004 2328 cmd.exe 49 PID 1432 wrote to memory of 2140 1432 cmd.exe 43 PID 1432 wrote to memory of 2140 1432 cmd.exe 43 PID 1432 wrote to memory of 2140 1432 cmd.exe 43 PID 1432 wrote to memory of 764 1432 cmd.exe 48 PID 1432 wrote to memory of 764 1432 cmd.exe 48 PID 1432 wrote to memory of 764 1432 cmd.exe 48 PID 1432 wrote to memory of 940 1432 cmd.exe 46 PID 1432 wrote to memory of 940 1432 cmd.exe 46 PID 1432 wrote to memory of 940 1432 cmd.exe 46 PID 1432 wrote to memory of 1792 1432 cmd.exe 47 PID 1432 wrote to memory of 1792 1432 cmd.exe 47 PID 1432 wrote to memory of 1792 1432 cmd.exe 47 PID 1280 wrote to memory of 1672 1280 powershell.exe 51 PID 1280 wrote to memory of 1672 1280 powershell.exe 51 PID 1280 wrote to memory of 1672 1280 powershell.exe 51 PID 2220 wrote to memory of 1028 2220 taskeng.exe 56 PID 2220 wrote to memory of 1028 2220 taskeng.exe 56 PID 2220 wrote to memory of 1028 2220 taskeng.exe 56 PID 1688 wrote to memory of 2012 1688 cmd.exe 61 PID 1688 wrote to memory of 2012 1688 cmd.exe 61 PID 1688 wrote to memory of 2012 1688 cmd.exe 61 PID 1688 wrote to memory of 1644 1688 cmd.exe 62 PID 1688 wrote to memory of 1644 1688 cmd.exe 62 PID 1688 wrote to memory of 1644 1688 cmd.exe 62 PID 1688 wrote to memory of 2576 1688 cmd.exe 63 PID 1688 wrote to memory of 2576 1688 cmd.exe 63 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe"C:\Users\Admin\AppData\Local\Temp\753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Octium.exe"C:\Users\Admin\AppData\Local\Temp\Octium.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2196
-
-
-
C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2240
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:668
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1004
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2800
-
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2124
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:1672
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2012
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1644
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2576
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2672
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2136
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#qbjrr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:336
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1648
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:2984
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
C:\Windows\system32\taskeng.exetaskeng.exe {48A4FF63-AD6C-4F72-9E2B-30AC45EFF66E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
5.1MB
MD52f5fffc7e0e41a5c84b551ce5a423389
SHA1c95e5360ce09ac18d25e89e66c4f51db9cdec43b
SHA256807f54c88592025c02077930259ed3a4c6a3e216a8d53350bbebcb5c597bab2d
SHA5127dba8647e20f929d6debd98f2c6254e5cc54ea3249263df4743d9d6048a5061b9632ca595507e00e7230dd297736b9d5dd2fdfcc4451906793b29edc00f3234a
-
Filesize
5.1MB
MD52f5fffc7e0e41a5c84b551ce5a423389
SHA1c95e5360ce09ac18d25e89e66c4f51db9cdec43b
SHA256807f54c88592025c02077930259ed3a4c6a3e216a8d53350bbebcb5c597bab2d
SHA5127dba8647e20f929d6debd98f2c6254e5cc54ea3249263df4743d9d6048a5061b9632ca595507e00e7230dd297736b9d5dd2fdfcc4451906793b29edc00f3234a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5292d382e5e357cfc08817b5cf8c776fd
SHA153eeff89ed9b34c7f858e430dea454b9d6f22f86
SHA256f9d03c39263637f3e45b61df343e5bcf667102e6e7ba5641c6b00d4ae89af342
SHA512e84dd6ab733990109210d0052009c1cfc984e8a7830f545bf19dac2b03dde708c4297caf6b1e23d1c74beee68b8a6c7ddf39c04145c70344384f9e77c0a0203f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RZ23SAD94BAZFE72GNT8.temp
Filesize7KB
MD5292d382e5e357cfc08817b5cf8c776fd
SHA153eeff89ed9b34c7f858e430dea454b9d6f22f86
SHA256f9d03c39263637f3e45b61df343e5bcf667102e6e7ba5641c6b00d4ae89af342
SHA512e84dd6ab733990109210d0052009c1cfc984e8a7830f545bf19dac2b03dde708c4297caf6b1e23d1c74beee68b8a6c7ddf39c04145c70344384f9e77c0a0203f
-
Filesize
822.1MB
MD55605a45cfa40172ba2fd8400ad84fa62
SHA14d084db6ab9aa221209f87ee7c5845655c933074
SHA2560f1a8f3a689e2967f8dc102136b52b3dcf4e152a34c3c54cd6fa4e8af78e9ac0
SHA5129cf55f6200dba0f5605c4e43ce909576822cf21d50815eb1e0b596bfe4de54bb89d5a51d6317a1d5d04726075948f4aeec0968cefd06fc3fdf3e2b3446c1db57
-
Filesize
822.1MB
MD55605a45cfa40172ba2fd8400ad84fa62
SHA14d084db6ab9aa221209f87ee7c5845655c933074
SHA2560f1a8f3a689e2967f8dc102136b52b3dcf4e152a34c3c54cd6fa4e8af78e9ac0
SHA5129cf55f6200dba0f5605c4e43ce909576822cf21d50815eb1e0b596bfe4de54bb89d5a51d6317a1d5d04726075948f4aeec0968cefd06fc3fdf3e2b3446c1db57
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
5.1MB
MD52f5fffc7e0e41a5c84b551ce5a423389
SHA1c95e5360ce09ac18d25e89e66c4f51db9cdec43b
SHA256807f54c88592025c02077930259ed3a4c6a3e216a8d53350bbebcb5c597bab2d
SHA5127dba8647e20f929d6debd98f2c6254e5cc54ea3249263df4743d9d6048a5061b9632ca595507e00e7230dd297736b9d5dd2fdfcc4451906793b29edc00f3234a
-
Filesize
12.5MB
MD58dbc96129e97e6f44fe615670544f915
SHA18b93742b542ea62e08ff1e78e9f5cf8d53d4a57a
SHA2560cd34919fdb6f1b491d68f0702444567f77bb2afeb13a6d834cab12ea8b5c683
SHA51263363bb30aa06ce40b7c0d72991ded014823b9f427e8439e6d20064aa533659eb0d31de955ee3d511de7e3c2c7d67269f7072b1f6a2f0aa19c5fa2a64180ef7a
-
Filesize
822.1MB
MD55605a45cfa40172ba2fd8400ad84fa62
SHA14d084db6ab9aa221209f87ee7c5845655c933074
SHA2560f1a8f3a689e2967f8dc102136b52b3dcf4e152a34c3c54cd6fa4e8af78e9ac0
SHA5129cf55f6200dba0f5605c4e43ce909576822cf21d50815eb1e0b596bfe4de54bb89d5a51d6317a1d5d04726075948f4aeec0968cefd06fc3fdf3e2b3446c1db57