Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 03:31
Static task
static1
General
-
Target
76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe
-
Size
5.2MB
-
MD5
9c855d5d046d35dfc97390d152d232df
-
SHA1
b49d95ca1a0effb8712b9da18fd2d1b899c4a8e1
-
SHA256
76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c
-
SHA512
37a3ed53216acb5db135ab58ff70bfe7b77250eb7b2d9600de85a41ffdb5a97739f2f0ea4beb48829969a46842846a1fa1afc8ff8f2aff5e10fdd98897f1a705
-
SSDEEP
98304:KzKfNdcaXAmMCF5Cj7BspbyTBZWI2Oe85ppe9lYIM//cmCGd:ik/lMCFa9spm2crpeQI/m
Malware Config
Extracted
amadey
3.83
5.42.65.80/8bmeVwqx/index.php
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral1/memory/3296-66-0x0000000003650000-0x0000000003781000-memory.dmp family_fabookie behavioral1/memory/3296-139-0x0000000003650000-0x0000000003781000-memory.dmp family_fabookie -
Glupteba payload 20 IoCs
resource yara_rule behavioral1/memory/4632-61-0x0000000004740000-0x000000000502B000-memory.dmp family_glupteba behavioral1/memory/4632-62-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4632-132-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4632-133-0x0000000004740000-0x000000000502B000-memory.dmp family_glupteba behavioral1/memory/4632-166-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/2920-169-0x0000000004770000-0x000000000505B000-memory.dmp family_glupteba behavioral1/memory/2920-170-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/2920-198-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/2920-269-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/2920-308-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4376-342-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4376-398-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4376-408-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4376-472-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4376-485-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4376-490-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4376-494-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4376-499-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4376-504-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba behavioral1/memory/4376-508-0x0000000000400000-0x00000000026D0000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 2504 created 3244 2504 latestX.exe 38 PID 2504 created 3244 2504 latestX.exe 38 PID 2504 created 3244 2504 latestX.exe 38 PID 2504 created 3244 2504 latestX.exe 38 PID 2504 created 3244 2504 latestX.exe 38 PID 2860 created 3244 2860 updater.exe 38 PID 2860 created 3244 2860 updater.exe 38 PID 2860 created 3244 2860 updater.exe 38 PID 2860 created 3244 2860 updater.exe 38 PID 2860 created 3244 2860 updater.exe 38 PID 2860 created 3244 2860 updater.exe 38 -
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2860-481-0x00007FF6678C0000-0x00007FF667E61000-memory.dmp xmrig behavioral1/memory/4032-487-0x00007FF760440000-0x00007FF760C2F000-memory.dmp xmrig behavioral1/memory/4032-492-0x00007FF760440000-0x00007FF760C2F000-memory.dmp xmrig behavioral1/memory/4032-496-0x00007FF760440000-0x00007FF760C2F000-memory.dmp xmrig behavioral1/memory/4032-501-0x00007FF760440000-0x00007FF760C2F000-memory.dmp xmrig behavioral1/memory/4032-506-0x00007FF760440000-0x00007FF760C2F000-memory.dmp xmrig behavioral1/memory/4032-510-0x00007FF760440000-0x00007FF760C2F000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts updater.exe File created C:\Windows\System32\drivers\etc\hosts latestX.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3936 netsh.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 13 IoCs
pid Process 3296 ss41.exe 4944 toolspub2.exe 4632 31839b57a4f11171d6abc8bbc4451ee4.exe 4244 oldplayer.exe 1184 toolspub2.exe 4720 oneetx.exe 2504 latestX.exe 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 2680 oneetx.exe 4376 csrss.exe 2860 updater.exe 2044 injector.exe 2968 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4944 set thread context of 1184 4944 toolspub2.exe 86 PID 2860 set thread context of 728 2860 updater.exe 173 PID 2860 set thread context of 4032 2860 updater.exe 174 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe latestX.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2280 sc.exe 228 sc.exe 3380 sc.exe 4592 sc.exe 4920 sc.exe 4956 sc.exe 3336 sc.exe 2868 sc.exe 3484 sc.exe 1860 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1088 schtasks.exe 4752 schtasks.exe 2524 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1184 toolspub2.exe 1184 toolspub2.exe 1656 powershell.exe 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 1656 powershell.exe 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE 3244 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3244 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1184 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1656 powershell.exe Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeDebugPrivilege 4632 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 4632 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 3432 powershell.exe Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeDebugPrivilege 4032 powershell.exe Token: SeDebugPrivilege 4976 powershell.exe Token: SeShutdownPrivilege 3244 Explorer.EXE Token: SeCreatePagefilePrivilege 3244 Explorer.EXE Token: SeDebugPrivilege 4256 powershell.exe Token: SeDebugPrivilege 1860 powershell.exe Token: SeShutdownPrivilege 2964 powercfg.exe Token: SeCreatePagefilePrivilege 2964 powercfg.exe Token: SeShutdownPrivilege 516 powercfg.exe Token: SeCreatePagefilePrivilege 516 powercfg.exe Token: SeShutdownPrivilege 1472 powercfg.exe Token: SeCreatePagefilePrivilege 1472 powercfg.exe Token: SeShutdownPrivilege 4756 powercfg.exe Token: SeCreatePagefilePrivilege 4756 powercfg.exe Token: SeIncreaseQuotaPrivilege 1860 powershell.exe Token: SeSecurityPrivilege 1860 powershell.exe Token: SeTakeOwnershipPrivilege 1860 powershell.exe Token: SeLoadDriverPrivilege 1860 powershell.exe Token: SeSystemProfilePrivilege 1860 powershell.exe Token: SeSystemtimePrivilege 1860 powershell.exe Token: SeProfSingleProcessPrivilege 1860 powershell.exe Token: SeIncBasePriorityPrivilege 1860 powershell.exe Token: SeCreatePagefilePrivilege 1860 powershell.exe Token: SeBackupPrivilege 1860 powershell.exe Token: SeRestorePrivilege 1860 powershell.exe Token: SeShutdownPrivilege 1860 powershell.exe Token: SeDebugPrivilege 1860 powershell.exe Token: SeSystemEnvironmentPrivilege 1860 powershell.exe Token: SeRemoteShutdownPrivilege 1860 powershell.exe Token: SeUndockPrivilege 1860 powershell.exe Token: SeManageVolumePrivilege 1860 powershell.exe Token: 33 1860 powershell.exe Token: 34 1860 powershell.exe Token: 35 1860 powershell.exe Token: 36 1860 powershell.exe Token: SeIncreaseQuotaPrivilege 1860 powershell.exe Token: SeSecurityPrivilege 1860 powershell.exe Token: SeTakeOwnershipPrivilege 1860 powershell.exe Token: SeLoadDriverPrivilege 1860 powershell.exe Token: SeSystemProfilePrivilege 1860 powershell.exe Token: SeSystemtimePrivilege 1860 powershell.exe Token: SeProfSingleProcessPrivilege 1860 powershell.exe Token: SeIncBasePriorityPrivilege 1860 powershell.exe Token: SeCreatePagefilePrivilege 1860 powershell.exe Token: SeBackupPrivilege 1860 powershell.exe Token: SeRestorePrivilege 1860 powershell.exe Token: SeShutdownPrivilege 1860 powershell.exe Token: SeDebugPrivilege 1860 powershell.exe Token: SeSystemEnvironmentPrivilege 1860 powershell.exe Token: SeRemoteShutdownPrivilege 1860 powershell.exe Token: SeUndockPrivilege 1860 powershell.exe Token: SeManageVolumePrivilege 1860 powershell.exe Token: 33 1860 powershell.exe Token: 34 1860 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4244 oldplayer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3740 wrote to memory of 3296 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 82 PID 3740 wrote to memory of 3296 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 82 PID 3740 wrote to memory of 4944 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 83 PID 3740 wrote to memory of 4944 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 83 PID 3740 wrote to memory of 4944 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 83 PID 3740 wrote to memory of 4632 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 84 PID 3740 wrote to memory of 4632 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 84 PID 3740 wrote to memory of 4632 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 84 PID 3740 wrote to memory of 4244 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 85 PID 3740 wrote to memory of 4244 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 85 PID 3740 wrote to memory of 4244 3740 76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe 85 PID 4944 wrote to memory of 1184 4944 toolspub2.exe 86 PID 4944 wrote to memory of 1184 4944 toolspub2.exe 86 PID 4944 wrote to memory of 1184 4944 toolspub2.exe 86 PID 4944 wrote to memory of 1184 4944 toolspub2.exe 86 PID 4944 wrote to memory of 1184 4944 toolspub2.exe 86 PID 4944 wrote to memory of 1184 4944 toolspub2.exe 86 PID 4244 wrote to memory of 4720 4244 oldplayer.exe 87 PID 4244 wrote to memory of 4720 4244 oldplayer.exe 87 PID 4244 wrote to memory of 4720 4244 oldplayer.exe 87 PID 4720 wrote to memory of 1088 4720 oneetx.exe 88 PID 4720 wrote to memory of 1088 4720 oneetx.exe 88 PID 4720 wrote to memory of 1088 4720 oneetx.exe 88 PID 4720 wrote to memory of 1260 4720 oneetx.exe 90 PID 4720 wrote to memory of 1260 4720 oneetx.exe 90 PID 4720 wrote to memory of 1260 4720 oneetx.exe 90 PID 1260 wrote to memory of 3620 1260 cmd.exe 92 PID 1260 wrote to memory of 3620 1260 cmd.exe 92 PID 1260 wrote to memory of 3620 1260 cmd.exe 92 PID 1260 wrote to memory of 4100 1260 cmd.exe 93 PID 1260 wrote to memory of 4100 1260 cmd.exe 93 PID 1260 wrote to memory of 4100 1260 cmd.exe 93 PID 1260 wrote to memory of 4304 1260 cmd.exe 95 PID 1260 wrote to memory of 4304 1260 cmd.exe 95 PID 1260 wrote to memory of 4304 1260 cmd.exe 95 PID 1260 wrote to memory of 3652 1260 cmd.exe 96 PID 1260 wrote to memory of 3652 1260 cmd.exe 96 PID 1260 wrote to memory of 3652 1260 cmd.exe 96 PID 1260 wrote to memory of 3388 1260 cmd.exe 97 PID 1260 wrote to memory of 3388 1260 cmd.exe 97 PID 1260 wrote to memory of 3388 1260 cmd.exe 97 PID 1260 wrote to memory of 3716 1260 cmd.exe 98 PID 1260 wrote to memory of 3716 1260 cmd.exe 98 PID 1260 wrote to memory of 3716 1260 cmd.exe 98 PID 4632 wrote to memory of 1656 4632 31839b57a4f11171d6abc8bbc4451ee4.exe 102 PID 4632 wrote to memory of 1656 4632 31839b57a4f11171d6abc8bbc4451ee4.exe 102 PID 4632 wrote to memory of 1656 4632 31839b57a4f11171d6abc8bbc4451ee4.exe 102 PID 4720 wrote to memory of 2504 4720 oneetx.exe 104 PID 4720 wrote to memory of 2504 4720 oneetx.exe 104 PID 2920 wrote to memory of 3432 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 110 PID 2920 wrote to memory of 3432 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 110 PID 2920 wrote to memory of 3432 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 110 PID 2920 wrote to memory of 1964 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 113 PID 2920 wrote to memory of 1964 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 113 PID 1964 wrote to memory of 3936 1964 cmd.exe 115 PID 1964 wrote to memory of 3936 1964 cmd.exe 115 PID 2920 wrote to memory of 4032 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 116 PID 2920 wrote to memory of 4032 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 116 PID 2920 wrote to memory of 4032 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 116 PID 2920 wrote to memory of 4256 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 121 PID 2920 wrote to memory of 4256 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 121 PID 2920 wrote to memory of 4256 2920 31839b57a4f11171d6abc8bbc4451ee4.exe 121 PID 3484 wrote to memory of 4920 3484 cmd.exe 125 PID 3484 wrote to memory of 4920 3484 cmd.exe 125
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe"C:\Users\Admin\AppData\Local\Temp\76e0a05722db609c2d5fc63f43fd52e093404f10f14722aa7f44fb967d2f153c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\ss41.exe"C:\Users\Admin\AppData\Local\Temp\ss41.exe"3⤵
- Executes dropped EXE
PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1184
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:3936
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
PID:4376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4896
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4752
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:4648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:2044
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2524
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F5⤵
- Creates scheduled task(s)
PID:1088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3620
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵PID:4100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵PID:4304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:N"6⤵PID:3388
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\207aa4515d" /P "Admin:R" /E6⤵PID:3716
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000402001\latestX.exe"C:\Users\Admin\AppData\Local\Temp\1000402001\latestX.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:2504
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4920
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2280
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4956
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:228
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3336
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4252
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:3716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2400
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:2812
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2868
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3380
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4592
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3484
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1860
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:1204
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:3436
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4548
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:888
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5032
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4620
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:728
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:2680
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:2860
-
C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exeC:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe1⤵
- Executes dropped EXE
PID:2968
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
4.2MB
MD5772cc6d2ad8f559af26b4b6667189e80
SHA1d1fb188972406ede8e49b0f3f3d538489558574e
SHA25627ea24685a6d2531295871e4ddafb9c9a47873e0bc434d0fef0706d5487dc42c
SHA512e7a4fee0cd1bf9465639308c7f8a6d301d116ae0d13300e3366d4d2c302e058ee43adfafdf79327dadc6f923e02fa00e67d5456dd8c76a6a1ca2d362b0cab9a9
-
Filesize
4.2MB
MD5772cc6d2ad8f559af26b4b6667189e80
SHA1d1fb188972406ede8e49b0f3f3d538489558574e
SHA25627ea24685a6d2531295871e4ddafb9c9a47873e0bc434d0fef0706d5487dc42c
SHA512e7a4fee0cd1bf9465639308c7f8a6d301d116ae0d13300e3366d4d2c302e058ee43adfafdf79327dadc6f923e02fa00e67d5456dd8c76a6a1ca2d362b0cab9a9
-
Filesize
4.2MB
MD5772cc6d2ad8f559af26b4b6667189e80
SHA1d1fb188972406ede8e49b0f3f3d538489558574e
SHA25627ea24685a6d2531295871e4ddafb9c9a47873e0bc434d0fef0706d5487dc42c
SHA512e7a4fee0cd1bf9465639308c7f8a6d301d116ae0d13300e3366d4d2c302e058ee43adfafdf79327dadc6f923e02fa00e67d5456dd8c76a6a1ca2d362b0cab9a9
-
Filesize
4.2MB
MD5772cc6d2ad8f559af26b4b6667189e80
SHA1d1fb188972406ede8e49b0f3f3d538489558574e
SHA25627ea24685a6d2531295871e4ddafb9c9a47873e0bc434d0fef0706d5487dc42c
SHA512e7a4fee0cd1bf9465639308c7f8a6d301d116ae0d13300e3366d4d2c302e058ee43adfafdf79327dadc6f923e02fa00e67d5456dd8c76a6a1ca2d362b0cab9a9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
198KB
MD5a64a886a695ed5fb9273e73241fec2f7
SHA1363244ca05027c5beb938562df5b525a2428b405
SHA256563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144
SHA512122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474
-
Filesize
591KB
MD550c1927eb0d28be92096e579848470ac
SHA11abe8e665c939e64bf8eac09206f00da63a6cf05
SHA25627bbf0bc202f23cba567050f62c74f0e4391ab4e9ca659879ab7baca91d40af2
SHA512e7c96af85124b93456d3df9c9486d1ad3db45fc8c598ec0a4dac0b1aa1115902ca28ccb9a8fe69104dfb3e6c8c2e367ba4b287c757a3e19d5d551bb0b8e746a6
-
Filesize
591KB
MD550c1927eb0d28be92096e579848470ac
SHA11abe8e665c939e64bf8eac09206f00da63a6cf05
SHA25627bbf0bc202f23cba567050f62c74f0e4391ab4e9ca659879ab7baca91d40af2
SHA512e7c96af85124b93456d3df9c9486d1ad3db45fc8c598ec0a4dac0b1aa1115902ca28ccb9a8fe69104dfb3e6c8c2e367ba4b287c757a3e19d5d551bb0b8e746a6
-
Filesize
591KB
MD550c1927eb0d28be92096e579848470ac
SHA11abe8e665c939e64bf8eac09206f00da63a6cf05
SHA25627bbf0bc202f23cba567050f62c74f0e4391ab4e9ca659879ab7baca91d40af2
SHA512e7c96af85124b93456d3df9c9486d1ad3db45fc8c598ec0a4dac0b1aa1115902ca28ccb9a8fe69104dfb3e6c8c2e367ba4b287c757a3e19d5d551bb0b8e746a6
-
Filesize
269KB
MD56a1f3c92dd6011d36b4387e8928db8ed
SHA1be6ff4483546379bacf88ffe8ca336d39c659527
SHA25653db21b2aff17083eeaf5d5988127944ffe4508ddd160cf50ab3d9d942d81160
SHA51277c7fe1b871f8340aabb41b3dd2e964f60da78b5db576dae03c6d0b08bb6f029d2493a8f7daf79a63590273e13f6d5158f8a587d683d04c8201723c10518cd38
-
Filesize
269KB
MD56a1f3c92dd6011d36b4387e8928db8ed
SHA1be6ff4483546379bacf88ffe8ca336d39c659527
SHA25653db21b2aff17083eeaf5d5988127944ffe4508ddd160cf50ab3d9d942d81160
SHA51277c7fe1b871f8340aabb41b3dd2e964f60da78b5db576dae03c6d0b08bb6f029d2493a8f7daf79a63590273e13f6d5158f8a587d683d04c8201723c10518cd38
-
Filesize
269KB
MD56a1f3c92dd6011d36b4387e8928db8ed
SHA1be6ff4483546379bacf88ffe8ca336d39c659527
SHA25653db21b2aff17083eeaf5d5988127944ffe4508ddd160cf50ab3d9d942d81160
SHA51277c7fe1b871f8340aabb41b3dd2e964f60da78b5db576dae03c6d0b08bb6f029d2493a8f7daf79a63590273e13f6d5158f8a587d683d04c8201723c10518cd38
-
Filesize
269KB
MD56a1f3c92dd6011d36b4387e8928db8ed
SHA1be6ff4483546379bacf88ffe8ca336d39c659527
SHA25653db21b2aff17083eeaf5d5988127944ffe4508ddd160cf50ab3d9d942d81160
SHA51277c7fe1b871f8340aabb41b3dd2e964f60da78b5db576dae03c6d0b08bb6f029d2493a8f7daf79a63590273e13f6d5158f8a587d683d04c8201723c10518cd38
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD543940e99133e2290be57d36845a8cc81
SHA14562e5d268ffa5e8179901d79a85ace420317fbc
SHA25665bd13bc1d24e08dc5c81912bd3791e9863de03c295f2016d8f00bdd21e0b4d5
SHA51294e42e91deeffb0e9a908d7d7c67fb1366bfbf51936ccf895d0087aefa56a97b1a363bad88566156bd1cd32ff494ae581f82c6bc9f687d5361f9a9e6bafd7a00
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58b2725c6483c300793e1a2821762c5d5
SHA1664c413001bfa3c8bd700feef9e836f7b9f5b62d
SHA256e439e15f3061e4c0e64e04d351ee3ab367740d447fe03d325fb1ad865a72db48
SHA512afbcb4744c7e0bb623854a1c3d419d9a8b1338f7ed4f5c0dfab0695fc301cb98d4219397728581b35639433a86af5590428d4d30abf218613fccd80482ebaf48
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5309c40d9ce290b7b160e3e313c4d1c34
SHA180b8822d75bea062f3a59e08f92e0de97d2f0cc6
SHA25679fc8a0a6349902dd15ec5bea630ab26c37fbdc88dc9b5513417fbafc2a1141d
SHA512364bac5c4d0bed4cc119b0a486e3630419b94252694837029e20d1e8792f30df92f33af6b5031224d8ebbbb4de975b316ffe49c852b5f3201e9d7a86094d6713
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD500ac708c22afebd55f6c8e8943af3d30
SHA16b3e9f2c212c82a6743a36b73683f2e7a38f5a49
SHA256436ab33c6afc5dac8f58bdd1ad9af257ebe09b8f97636bfdace18683aaab3575
SHA51221351fa2567218903a97f5771039bd2de712f2c9b7586619e3c71cb1755ade92d12ee0e355eefde88bc56c832bd8d7b0145fd83a23a71313012a6fd59b27460b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a2e78c1a4c59ca3385b74ed56c7cecc2
SHA15d8067f2ecfce993ba3f5b7fe532bee1ddab36e2
SHA2561aff3c4a8d1dc34c5593d044b730cb6d81a51528ea12659dc40e80ec912687fc
SHA512e87e331b3900f7de51581ff2ad4bc0a5989a4a9001568772e3ce90b008fd9e2af4ae5672ea49f3446b9e7fddf2f56c81d6dac09fbdb5952211c7801a25391c0a
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
4.2MB
MD5772cc6d2ad8f559af26b4b6667189e80
SHA1d1fb188972406ede8e49b0f3f3d538489558574e
SHA25627ea24685a6d2531295871e4ddafb9c9a47873e0bc434d0fef0706d5487dc42c
SHA512e7a4fee0cd1bf9465639308c7f8a6d301d116ae0d13300e3366d4d2c302e058ee43adfafdf79327dadc6f923e02fa00e67d5456dd8c76a6a1ca2d362b0cab9a9
-
Filesize
4.2MB
MD5772cc6d2ad8f559af26b4b6667189e80
SHA1d1fb188972406ede8e49b0f3f3d538489558574e
SHA25627ea24685a6d2531295871e4ddafb9c9a47873e0bc434d0fef0706d5487dc42c
SHA512e7a4fee0cd1bf9465639308c7f8a6d301d116ae0d13300e3366d4d2c302e058ee43adfafdf79327dadc6f923e02fa00e67d5456dd8c76a6a1ca2d362b0cab9a9
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5b42c70c1dbf0d1d477ec86902db9e986
SHA11d1c0a670748b3d10bee8272e5d67a4fabefd31f
SHA2568ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a
SHA51257fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5