Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
GoogleUpdateTaskMachineQCW.exe
Resource
win7-20240508-en
General
-
Target
GoogleUpdateTaskMachineQCW.exe
-
Size
5.0MB
-
MD5
4e9292f02efc44abd5a2671439283405
-
SHA1
8fe8f59ad5cbb35115a3e997848b1f9c968dccfb
-
SHA256
53b0c0f60949cc15b4514b8fb1642bef07c5c65a48e4adc247da22a254b66437
-
SHA512
f0774ed0643c9c35de61c133e03640596b3dd64f8d26c4b9b959fe51678a4775be39fb2ddea8402342b3f341642a3e0a80f656dd567239535c270df5d25fbc43
-
SSDEEP
98304:sF322L5o+zIKbC+YO61IxwSXxfuGtaoZohphcnZCdHHugWdDfDHOaRighoYU:sF322lor4C/O6etbTZohXZdnupDfD1R0
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/456-20-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/456-23-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/456-26-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/456-25-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/456-24-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/456-22-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/456-19-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/456-27-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
Processes:
GoogleUpdateTaskMachineQCW.exeupdater.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts GoogleUpdateTaskMachineQCW.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Executes dropped EXE 1 IoCs
Processes:
updater.exepid process 640 updater.exe -
Processes:
resource yara_rule behavioral2/memory/456-14-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-18-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-20-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-23-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-26-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-25-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-24-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-22-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-19-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-17-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-15-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-16-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/456-27-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
updater.exedescription pid process target process PID 640 set thread context of 3956 640 updater.exe conhost.exe PID 640 set thread context of 456 640 updater.exe explorer.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 4772 sc.exe 3504 sc.exe 3288 sc.exe 4904 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
GoogleUpdateTaskMachineQCW.exeupdater.exeexplorer.exepid process 4488 GoogleUpdateTaskMachineQCW.exe 4488 GoogleUpdateTaskMachineQCW.exe 4488 GoogleUpdateTaskMachineQCW.exe 4488 GoogleUpdateTaskMachineQCW.exe 4488 GoogleUpdateTaskMachineQCW.exe 4488 GoogleUpdateTaskMachineQCW.exe 4488 GoogleUpdateTaskMachineQCW.exe 4488 GoogleUpdateTaskMachineQCW.exe 640 updater.exe 640 updater.exe 640 updater.exe 640 updater.exe 640 updater.exe 640 updater.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe 456 explorer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exeexplorer.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeShutdownPrivilege 5064 powercfg.exe Token: SeCreatePagefilePrivilege 5064 powercfg.exe Token: SeShutdownPrivilege 2028 powercfg.exe Token: SeCreatePagefilePrivilege 2028 powercfg.exe Token: SeShutdownPrivilege 4788 powercfg.exe Token: SeCreatePagefilePrivilege 4788 powercfg.exe Token: SeShutdownPrivilege 3460 powercfg.exe Token: SeCreatePagefilePrivilege 3460 powercfg.exe Token: SeLockMemoryPrivilege 456 explorer.exe Token: SeShutdownPrivilege 2012 powercfg.exe Token: SeCreatePagefilePrivilege 2012 powercfg.exe Token: SeShutdownPrivilege 1884 powercfg.exe Token: SeCreatePagefilePrivilege 1884 powercfg.exe Token: SeShutdownPrivilege 2512 powercfg.exe Token: SeCreatePagefilePrivilege 2512 powercfg.exe Token: SeShutdownPrivilege 1160 powercfg.exe Token: SeCreatePagefilePrivilege 1160 powercfg.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
updater.exedescription pid process target process PID 640 wrote to memory of 3956 640 updater.exe conhost.exe PID 640 wrote to memory of 3956 640 updater.exe conhost.exe PID 640 wrote to memory of 3956 640 updater.exe conhost.exe PID 640 wrote to memory of 3956 640 updater.exe conhost.exe PID 640 wrote to memory of 3956 640 updater.exe conhost.exe PID 640 wrote to memory of 3956 640 updater.exe conhost.exe PID 640 wrote to memory of 3956 640 updater.exe conhost.exe PID 640 wrote to memory of 3956 640 updater.exe conhost.exe PID 640 wrote to memory of 3956 640 updater.exe conhost.exe PID 640 wrote to memory of 456 640 updater.exe explorer.exe PID 640 wrote to memory of 456 640 updater.exe explorer.exe PID 640 wrote to memory of 456 640 updater.exe explorer.exe PID 640 wrote to memory of 456 640 updater.exe explorer.exe PID 640 wrote to memory of 456 640 updater.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GoogleUpdateTaskMachineQCW.exe"C:\Users\Admin\AppData\Local\Temp\GoogleUpdateTaskMachineQCW.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
PID:4488 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:5064 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3460 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4788 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQCW"2⤵
- Launches sc.exe
PID:3504 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQCW" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"2⤵
- Launches sc.exe
PID:3288 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:4904 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQCW"2⤵
- Launches sc.exe
PID:4772
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3956
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD54e9292f02efc44abd5a2671439283405
SHA18fe8f59ad5cbb35115a3e997848b1f9c968dccfb
SHA25653b0c0f60949cc15b4514b8fb1642bef07c5c65a48e4adc247da22a254b66437
SHA512f0774ed0643c9c35de61c133e03640596b3dd64f8d26c4b9b959fe51678a4775be39fb2ddea8402342b3f341642a3e0a80f656dd567239535c270df5d25fbc43
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62