Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
GoogleUpdateTaskMachineQCW.exe
Resource
win7-20240508-en
General
-
Target
GoogleUpdateTaskMachineQCW.exe
-
Size
5.0MB
-
MD5
4e9292f02efc44abd5a2671439283405
-
SHA1
8fe8f59ad5cbb35115a3e997848b1f9c968dccfb
-
SHA256
53b0c0f60949cc15b4514b8fb1642bef07c5c65a48e4adc247da22a254b66437
-
SHA512
f0774ed0643c9c35de61c133e03640596b3dd64f8d26c4b9b959fe51678a4775be39fb2ddea8402342b3f341642a3e0a80f656dd567239535c270df5d25fbc43
-
SSDEEP
98304:sF322L5o+zIKbC+YO61IxwSXxfuGtaoZohphcnZCdHHugWdDfDHOaRighoYU:sF322lor4C/O6etbTZohXZdnupDfD1R0
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/2980-21-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2980-27-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2980-28-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2980-26-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2980-25-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2980-24-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2980-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2980-29-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
Processes:
GoogleUpdateTaskMachineQCW.exeupdater.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts GoogleUpdateTaskMachineQCW.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Executes dropped EXE 2 IoCs
Processes:
updater.exepid process 472 2680 updater.exe -
Loads dropped DLL 1 IoCs
Processes:
pid process 472 -
Processes:
resource yara_rule behavioral1/memory/2980-20-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-21-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-19-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-18-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-27-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-28-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-26-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-25-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-24-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2980-29-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
updater.exedescription pid process target process PID 2680 set thread context of 2828 2680 updater.exe conhost.exe PID 2680 set thread context of 2980 2680 updater.exe explorer.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2024 sc.exe 2712 sc.exe 2640 sc.exe 2612 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
GoogleUpdateTaskMachineQCW.exeupdater.exeexplorer.exepid process 3044 GoogleUpdateTaskMachineQCW.exe 3044 GoogleUpdateTaskMachineQCW.exe 3044 GoogleUpdateTaskMachineQCW.exe 3044 GoogleUpdateTaskMachineQCW.exe 3044 GoogleUpdateTaskMachineQCW.exe 3044 GoogleUpdateTaskMachineQCW.exe 3044 GoogleUpdateTaskMachineQCW.exe 3044 GoogleUpdateTaskMachineQCW.exe 2680 updater.exe 2680 updater.exe 2680 updater.exe 2680 updater.exe 2680 updater.exe 2680 updater.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe 2980 explorer.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exeexplorer.exedescription pid process Token: SeShutdownPrivilege 1720 powercfg.exe Token: SeShutdownPrivilege 1600 powercfg.exe Token: SeShutdownPrivilege 2260 powercfg.exe Token: SeShutdownPrivilege 1632 powercfg.exe Token: SeShutdownPrivilege 2696 powercfg.exe Token: SeShutdownPrivilege 2836 powercfg.exe Token: SeShutdownPrivilege 2520 powercfg.exe Token: SeShutdownPrivilege 2248 powercfg.exe Token: SeLockMemoryPrivilege 2980 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
updater.exedescription pid process target process PID 2680 wrote to memory of 2828 2680 updater.exe conhost.exe PID 2680 wrote to memory of 2828 2680 updater.exe conhost.exe PID 2680 wrote to memory of 2828 2680 updater.exe conhost.exe PID 2680 wrote to memory of 2828 2680 updater.exe conhost.exe PID 2680 wrote to memory of 2828 2680 updater.exe conhost.exe PID 2680 wrote to memory of 2828 2680 updater.exe conhost.exe PID 2680 wrote to memory of 2828 2680 updater.exe conhost.exe PID 2680 wrote to memory of 2828 2680 updater.exe conhost.exe PID 2680 wrote to memory of 2828 2680 updater.exe conhost.exe PID 2680 wrote to memory of 2980 2680 updater.exe explorer.exe PID 2680 wrote to memory of 2980 2680 updater.exe explorer.exe PID 2680 wrote to memory of 2980 2680 updater.exe explorer.exe PID 2680 wrote to memory of 2980 2680 updater.exe explorer.exe PID 2680 wrote to memory of 2980 2680 updater.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GoogleUpdateTaskMachineQCW.exe"C:\Users\Admin\AppData\Local\Temp\GoogleUpdateTaskMachineQCW.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1720 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2260 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQCW"2⤵
- Launches sc.exe
PID:2024 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQCW" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"2⤵
- Launches sc.exe
PID:2712 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2640 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQCW"2⤵
- Launches sc.exe
PID:2612
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2828
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
Filesize
5.0MB
MD54e9292f02efc44abd5a2671439283405
SHA18fe8f59ad5cbb35115a3e997848b1f9c968dccfb
SHA25653b0c0f60949cc15b4514b8fb1642bef07c5c65a48e4adc247da22a254b66437
SHA512f0774ed0643c9c35de61c133e03640596b3dd64f8d26c4b9b959fe51678a4775be39fb2ddea8402342b3f341642a3e0a80f656dd567239535c270df5d25fbc43