Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
10/10/2023, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
latestX.exe
Resource
win7-20230831-en
General
-
Target
latestX.exe
-
Size
5.6MB
-
MD5
bae29e49e8190bfbbf0d77ffab8de59d
-
SHA1
4a6352bb47c7e1666a60c76f9b17ca4707872bd9
-
SHA256
f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
-
SHA512
9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
SSDEEP
49152:MMcDmMRlBdzs3EThgR0uEqBXLdcJAbtNmbOHaGhEospqOziZXAfrrARS7JL2ozPX:dcdrCET8XeospuZXAf0EJyocDKIVDT05
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 408 created 3280 408 latestX.exe 53 PID 408 created 3280 408 latestX.exe 53 PID 408 created 3280 408 latestX.exe 53 PID 408 created 3280 408 latestX.exe 53 PID 408 created 3280 408 latestX.exe 53 PID 2064 created 3280 2064 updater.exe 53 PID 2064 created 3280 2064 updater.exe 53 PID 2064 created 3280 2064 updater.exe 53 PID 2064 created 3280 2064 updater.exe 53 PID 2064 created 3280 2064 updater.exe 53 PID 2064 created 3280 2064 updater.exe 53 -
XMRig Miner payload 23 IoCs
resource yara_rule behavioral2/memory/2064-549-0x00007FF7A1460000-0x00007FF7A1A01000-memory.dmp xmrig behavioral2/memory/4024-555-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-557-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-560-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-563-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-565-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-567-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-569-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-571-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-573-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-575-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-577-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-579-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-581-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-583-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-585-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-587-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-589-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-591-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-593-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-595-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-597-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig behavioral2/memory/4024-599-0x00007FF6E95A0000-0x00007FF6E9D8F000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2064 updater.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2064 set thread context of 4368 2064 updater.exe 108 PID 2064 set thread context of 4024 2064 updater.exe 109 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe latestX.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1224 sc.exe 3868 sc.exe 3316 sc.exe 2988 sc.exe 4412 sc.exe 5040 sc.exe 4500 sc.exe 4504 sc.exe 4320 sc.exe 3860 sc.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 408 latestX.exe 408 latestX.exe 4060 powershell.exe 4060 powershell.exe 4060 powershell.exe 408 latestX.exe 408 latestX.exe 408 latestX.exe 408 latestX.exe 408 latestX.exe 408 latestX.exe 1716 powershell.exe 1716 powershell.exe 1716 powershell.exe 408 latestX.exe 408 latestX.exe 2064 updater.exe 2064 updater.exe 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe 2064 updater.exe 2064 updater.exe 2064 updater.exe 2064 updater.exe 2064 updater.exe 2064 updater.exe 4336 powershell.exe 4336 powershell.exe 4336 powershell.exe 2064 updater.exe 2064 updater.exe 2064 updater.exe 2064 updater.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe 4024 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 632 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4060 powershell.exe Token: SeIncreaseQuotaPrivilege 4060 powershell.exe Token: SeSecurityPrivilege 4060 powershell.exe Token: SeTakeOwnershipPrivilege 4060 powershell.exe Token: SeLoadDriverPrivilege 4060 powershell.exe Token: SeSystemProfilePrivilege 4060 powershell.exe Token: SeSystemtimePrivilege 4060 powershell.exe Token: SeProfSingleProcessPrivilege 4060 powershell.exe Token: SeIncBasePriorityPrivilege 4060 powershell.exe Token: SeCreatePagefilePrivilege 4060 powershell.exe Token: SeBackupPrivilege 4060 powershell.exe Token: SeRestorePrivilege 4060 powershell.exe Token: SeShutdownPrivilege 4060 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeSystemEnvironmentPrivilege 4060 powershell.exe Token: SeRemoteShutdownPrivilege 4060 powershell.exe Token: SeUndockPrivilege 4060 powershell.exe Token: SeManageVolumePrivilege 4060 powershell.exe Token: 33 4060 powershell.exe Token: 34 4060 powershell.exe Token: 35 4060 powershell.exe Token: 36 4060 powershell.exe Token: SeShutdownPrivilege 2720 powercfg.exe Token: SeCreatePagefilePrivilege 2720 powercfg.exe Token: SeShutdownPrivilege 3004 powercfg.exe Token: SeCreatePagefilePrivilege 3004 powercfg.exe Token: SeDebugPrivilege 1716 powershell.exe Token: SeShutdownPrivilege 2960 powercfg.exe Token: SeCreatePagefilePrivilege 2960 powercfg.exe Token: SeShutdownPrivilege 2448 powercfg.exe Token: SeCreatePagefilePrivilege 2448 powercfg.exe Token: SeIncreaseQuotaPrivilege 1716 powershell.exe Token: SeSecurityPrivilege 1716 powershell.exe Token: SeTakeOwnershipPrivilege 1716 powershell.exe Token: SeLoadDriverPrivilege 1716 powershell.exe Token: SeSystemProfilePrivilege 1716 powershell.exe Token: SeSystemtimePrivilege 1716 powershell.exe Token: SeProfSingleProcessPrivilege 1716 powershell.exe Token: SeIncBasePriorityPrivilege 1716 powershell.exe Token: SeCreatePagefilePrivilege 1716 powershell.exe Token: SeBackupPrivilege 1716 powershell.exe Token: SeRestorePrivilege 1716 powershell.exe Token: SeShutdownPrivilege 1716 powershell.exe Token: SeDebugPrivilege 1716 powershell.exe Token: SeSystemEnvironmentPrivilege 1716 powershell.exe Token: SeRemoteShutdownPrivilege 1716 powershell.exe Token: SeUndockPrivilege 1716 powershell.exe Token: SeManageVolumePrivilege 1716 powershell.exe Token: 33 1716 powershell.exe Token: 34 1716 powershell.exe Token: 35 1716 powershell.exe Token: 36 1716 powershell.exe Token: SeIncreaseQuotaPrivilege 1716 powershell.exe Token: SeSecurityPrivilege 1716 powershell.exe Token: SeTakeOwnershipPrivilege 1716 powershell.exe Token: SeLoadDriverPrivilege 1716 powershell.exe Token: SeSystemProfilePrivilege 1716 powershell.exe Token: SeSystemtimePrivilege 1716 powershell.exe Token: SeProfSingleProcessPrivilege 1716 powershell.exe Token: SeIncBasePriorityPrivilege 1716 powershell.exe Token: SeCreatePagefilePrivilege 1716 powershell.exe Token: SeBackupPrivilege 1716 powershell.exe Token: SeRestorePrivilege 1716 powershell.exe Token: SeShutdownPrivilege 1716 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3944 wrote to memory of 1224 3944 cmd.exe 74 PID 3944 wrote to memory of 1224 3944 cmd.exe 74 PID 3944 wrote to memory of 4412 3944 cmd.exe 75 PID 3944 wrote to memory of 4412 3944 cmd.exe 75 PID 3944 wrote to memory of 5040 3944 cmd.exe 76 PID 3944 wrote to memory of 5040 3944 cmd.exe 76 PID 3944 wrote to memory of 4500 3944 cmd.exe 77 PID 3944 wrote to memory of 4500 3944 cmd.exe 77 PID 3944 wrote to memory of 4504 3944 cmd.exe 78 PID 3944 wrote to memory of 4504 3944 cmd.exe 78 PID 3556 wrote to memory of 2720 3556 cmd.exe 83 PID 3556 wrote to memory of 2720 3556 cmd.exe 83 PID 3556 wrote to memory of 3004 3556 cmd.exe 84 PID 3556 wrote to memory of 3004 3556 cmd.exe 84 PID 3556 wrote to memory of 2960 3556 cmd.exe 85 PID 3556 wrote to memory of 2960 3556 cmd.exe 85 PID 3556 wrote to memory of 2448 3556 cmd.exe 86 PID 3556 wrote to memory of 2448 3556 cmd.exe 86 PID 8 wrote to memory of 3868 8 cmd.exe 95 PID 8 wrote to memory of 3868 8 cmd.exe 95 PID 8 wrote to memory of 4320 8 cmd.exe 96 PID 8 wrote to memory of 4320 8 cmd.exe 96 PID 8 wrote to memory of 3316 8 cmd.exe 97 PID 8 wrote to memory of 3316 8 cmd.exe 97 PID 8 wrote to memory of 3860 8 cmd.exe 98 PID 8 wrote to memory of 3860 8 cmd.exe 98 PID 8 wrote to memory of 2988 8 cmd.exe 99 PID 8 wrote to memory of 2988 8 cmd.exe 99 PID 5032 wrote to memory of 2992 5032 cmd.exe 104 PID 5032 wrote to memory of 2992 5032 cmd.exe 104 PID 5032 wrote to memory of 4056 5032 cmd.exe 105 PID 5032 wrote to memory of 4056 5032 cmd.exe 105 PID 5032 wrote to memory of 404 5032 cmd.exe 106 PID 5032 wrote to memory of 404 5032 cmd.exe 106 PID 5032 wrote to memory of 4804 5032 cmd.exe 107 PID 5032 wrote to memory of 4804 5032 cmd.exe 107 PID 2064 wrote to memory of 4368 2064 updater.exe 108 PID 2064 wrote to memory of 4024 2064 updater.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1224
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4412
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5040
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4500
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4504
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:5068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3868
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4320
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3316
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3860
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2988
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2992
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4056
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:404
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:4804
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4368
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
1KB
MD58d90b0d9e153d0970856fb6cee3f5766
SHA1d31a83aa9c0a563be2fe641869f65e3c6813dbad
SHA256cc54aa1d8729111f25fb1466e1643b986444c67af610d6de90ae41b0455af364
SHA512a4356dd832b7c4d355fbb25caf206dee20dda91b131f06008e68829e2902be76370000cce1ee5374d5be3e906e1249ce3d3b02f826b21465eb4567784589eb83
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD5811d351aabd7b708fef7683cf5e29e15
SHA106fd89e5a575f45d411cf4b3a2d277e642e73dbb
SHA2560915139ab02088c3932bcc062ce22d4e9c81aa6df0eacd62900d73d7ad2d3b18
SHA512702d847c2aa3c9526ddf34249de06e58f5e3182d6ef66f77ddbdbbd2e9836026da6eacac2c892cf186d79bdc227a85c14f493b746c03233ef8820d981721c70a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5302a7c179ef577c237c5418fb770fd27
SHA1343ef00d1357a8d2ff6e1143541a8a29435ed30c
SHA2569e6b50764916c21c41d6e7c4999bdf27120c069ec7a9268100e1ce5df845149f
SHA512f2472371a322d0352772defb959ea0a9da0d5ca8f412f6abafac2e6547bcc8a53394a6fb81b488521fc256bfc9f3205d92c6b69d6d139bdb260fb46578946699