Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
s.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
s.exe
Resource
win10v2004-20240709-en
General
-
Target
s.exe
-
Size
18.9MB
-
MD5
0ffb0d17b199b2748b2f16e98e441f94
-
SHA1
b792e0a9bcb22981651be78d9820f77a7d579479
-
SHA256
7ad4e4c87ee10590f37f68da3480ed6727a13eb2c95ca3b0c14ab4250b06cadd
-
SHA512
f125846caace3d493334e33991907d64ba0622efbef9e12a5d0f5af832f57d238ac0ed009bbbd98a21145cd9248327ed556eaebb13dd2133089b60d47cc85232
-
SSDEEP
393216:ywIP6vlW6zvKl8O/GZ/VEyKBSZX+d+brPKLqT7GP8zHFpw:AP6Y6rG8O2IBSZZyW/GcFC
Malware Config
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
description pid Process procid_target PID 2640 created 1392 2640 setup.exe 20 PID 2640 created 1392 2640 setup.exe 20 PID 2640 created 1392 2640 setup.exe 20 PID 2640 created 1392 2640 setup.exe 20 PID 2640 created 1392 2640 setup.exe 20 PID 2640 created 1392 2640 setup.exe 20 PID 2420 created 1392 2420 updater.exe 20 PID 2420 created 1392 2420 updater.exe 20 PID 2420 created 1392 2420 updater.exe 20 PID 2420 created 1392 2420 updater.exe 20 PID 2420 created 1392 2420 updater.exe 20 PID 2420 created 1392 2420 updater.exe 20 -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2072 powershell.exe 1520 powershell.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinRing0_1_2_0\ImagePath = "\\??\\C:\\Windows\\TEMP\\gqxqtdeqxchk.sys" services.exe -
Executes dropped EXE 5 IoCs
pid Process 2852 main.exe 2736 svchost.exe 2640 setup.exe 2524 svchost.exe 1716 Update.exe -
Loads dropped DLL 18 IoCs
pid Process 1052 s.exe 1052 s.exe 1052 s.exe 1052 s.exe 1052 s.exe 1052 s.exe 2736 svchost.exe 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe 2524 svchost.exe 2852 main.exe 1716 Update.exe 468 services.exe 2420 updater.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 7 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\GoogleUpdateTaskMachineQC svchost.exe File created C:\Windows\system32\logfiles\scm\40227983-51aa-4689-9259-b248fdce40b6 services.exe File opened for modification C:\Windows\system32\logfiles\scm\40227983-51aa-4689-9259-b248fdce40b6 services.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Known Folders API Service.evtx svchost.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\System32\Tasks\GoogleUpdateTaskMachineQC svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2640 set thread context of 1680 2640 setup.exe 48 PID 2420 set thread context of 2792 2420 updater.exe 70 PID 2420 set thread context of 2816 2420 updater.exe 73 PID 2420 set thread context of 2588 2420 updater.exe 74 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe setup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2052 sc.exe 2724 sc.exe 1156 sc.exe 1552 sc.exe 668 sc.exe 2544 sc.exe 1912 sc.exe 2536 sc.exe 1908 sc.exe 1932 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0009000000018ed5-22.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2460 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2080 tasklist.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = a036a8d930dbda01 powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1136 reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe 2844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2852 main.exe 2640 setup.exe 2640 setup.exe 2072 powershell.exe 2640 setup.exe 2640 setup.exe 2640 setup.exe 2640 setup.exe 2640 setup.exe 2640 setup.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 2640 setup.exe 2640 setup.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 2640 setup.exe 2640 setup.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe 1680 dialer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 services.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2852 main.exe Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 2080 tasklist.exe Token: SeDebugPrivilege 1680 dialer.exe Token: SeDebugPrivilege 1716 Update.exe Token: SeAssignPrimaryTokenPrivilege 824 svchost.exe Token: SeIncreaseQuotaPrivilege 824 svchost.exe Token: SeSecurityPrivilege 824 svchost.exe Token: SeTakeOwnershipPrivilege 824 svchost.exe Token: SeLoadDriverPrivilege 824 svchost.exe Token: SeSystemtimePrivilege 824 svchost.exe Token: SeBackupPrivilege 824 svchost.exe Token: SeRestorePrivilege 824 svchost.exe Token: SeShutdownPrivilege 824 svchost.exe Token: SeSystemEnvironmentPrivilege 824 svchost.exe Token: SeUndockPrivilege 824 svchost.exe Token: SeManageVolumePrivilege 824 svchost.exe Token: SeAuditPrivilege 824 svchost.exe Token: SeAssignPrimaryTokenPrivilege 824 svchost.exe Token: SeIncreaseQuotaPrivilege 824 svchost.exe Token: SeSecurityPrivilege 824 svchost.exe Token: SeTakeOwnershipPrivilege 824 svchost.exe Token: SeLoadDriverPrivilege 824 svchost.exe Token: SeSystemtimePrivilege 824 svchost.exe Token: SeBackupPrivilege 824 svchost.exe Token: SeRestorePrivilege 824 svchost.exe Token: SeShutdownPrivilege 824 svchost.exe Token: SeSystemEnvironmentPrivilege 824 svchost.exe Token: SeUndockPrivilege 824 svchost.exe Token: SeManageVolumePrivilege 824 svchost.exe Token: SeAssignPrimaryTokenPrivilege 824 svchost.exe Token: SeIncreaseQuotaPrivilege 824 svchost.exe Token: SeSecurityPrivilege 824 svchost.exe Token: SeTakeOwnershipPrivilege 824 svchost.exe Token: SeLoadDriverPrivilege 824 svchost.exe Token: SeSystemtimePrivilege 824 svchost.exe Token: SeBackupPrivilege 824 svchost.exe Token: SeRestorePrivilege 824 svchost.exe Token: SeShutdownPrivilege 824 svchost.exe Token: SeSystemEnvironmentPrivilege 824 svchost.exe Token: SeUndockPrivilege 824 svchost.exe Token: SeManageVolumePrivilege 824 svchost.exe Token: SeAssignPrimaryTokenPrivilege 824 svchost.exe Token: SeIncreaseQuotaPrivilege 824 svchost.exe Token: SeSecurityPrivilege 824 svchost.exe Token: SeTakeOwnershipPrivilege 824 svchost.exe Token: SeLoadDriverPrivilege 824 svchost.exe Token: SeSystemtimePrivilege 824 svchost.exe Token: SeBackupPrivilege 824 svchost.exe Token: SeRestorePrivilege 824 svchost.exe Token: SeShutdownPrivilege 824 svchost.exe Token: SeSystemEnvironmentPrivilege 824 svchost.exe Token: SeUndockPrivilege 824 svchost.exe Token: SeManageVolumePrivilege 824 svchost.exe Token: SeDebugPrivilege 1072 wmiprvse.exe Token: SeAuditPrivilege 284 svchost.exe Token: SeAuditPrivilege 824 svchost.exe Token: SeAuditPrivilege 824 svchost.exe Token: SeAssignPrimaryTokenPrivilege 824 svchost.exe Token: SeIncreaseQuotaPrivilege 824 svchost.exe Token: SeSecurityPrivilege 824 svchost.exe Token: SeTakeOwnershipPrivilege 824 svchost.exe Token: SeLoadDriverPrivilege 824 svchost.exe Token: SeSystemtimePrivilege 824 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1716 Update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2852 1052 s.exe 29 PID 1052 wrote to memory of 2852 1052 s.exe 29 PID 1052 wrote to memory of 2852 1052 s.exe 29 PID 1052 wrote to memory of 2852 1052 s.exe 29 PID 1052 wrote to memory of 2736 1052 s.exe 30 PID 1052 wrote to memory of 2736 1052 s.exe 30 PID 1052 wrote to memory of 2736 1052 s.exe 30 PID 1052 wrote to memory of 2736 1052 s.exe 30 PID 1052 wrote to memory of 2640 1052 s.exe 31 PID 1052 wrote to memory of 2640 1052 s.exe 31 PID 1052 wrote to memory of 2640 1052 s.exe 31 PID 1052 wrote to memory of 2640 1052 s.exe 31 PID 2736 wrote to memory of 2524 2736 svchost.exe 32 PID 2736 wrote to memory of 2524 2736 svchost.exe 32 PID 2736 wrote to memory of 2524 2736 svchost.exe 32 PID 2852 wrote to memory of 2068 2852 main.exe 35 PID 2852 wrote to memory of 2068 2852 main.exe 35 PID 2852 wrote to memory of 2068 2852 main.exe 35 PID 2068 wrote to memory of 2080 2068 cmd.exe 38 PID 2068 wrote to memory of 2080 2068 cmd.exe 38 PID 2068 wrote to memory of 2080 2068 cmd.exe 38 PID 2068 wrote to memory of 2156 2068 cmd.exe 39 PID 2068 wrote to memory of 2156 2068 cmd.exe 39 PID 2068 wrote to memory of 2156 2068 cmd.exe 39 PID 2068 wrote to memory of 2460 2068 cmd.exe 40 PID 2068 wrote to memory of 2460 2068 cmd.exe 40 PID 2068 wrote to memory of 2460 2068 cmd.exe 40 PID 2024 wrote to memory of 1552 2024 cmd.exe 43 PID 2024 wrote to memory of 1552 2024 cmd.exe 43 PID 2024 wrote to memory of 1552 2024 cmd.exe 43 PID 2024 wrote to memory of 668 2024 cmd.exe 44 PID 2024 wrote to memory of 668 2024 cmd.exe 44 PID 2024 wrote to memory of 668 2024 cmd.exe 44 PID 2024 wrote to memory of 2536 2024 cmd.exe 45 PID 2024 wrote to memory of 2536 2024 cmd.exe 45 PID 2024 wrote to memory of 2536 2024 cmd.exe 45 PID 2024 wrote to memory of 2544 2024 cmd.exe 46 PID 2024 wrote to memory of 2544 2024 cmd.exe 46 PID 2024 wrote to memory of 2544 2024 cmd.exe 46 PID 2024 wrote to memory of 1908 2024 cmd.exe 47 PID 2024 wrote to memory of 1908 2024 cmd.exe 47 PID 2024 wrote to memory of 1908 2024 cmd.exe 47 PID 2640 wrote to memory of 1680 2640 setup.exe 48 PID 1680 wrote to memory of 420 1680 dialer.exe 5 PID 1680 wrote to memory of 468 1680 dialer.exe 6 PID 1680 wrote to memory of 476 1680 dialer.exe 7 PID 1680 wrote to memory of 484 1680 dialer.exe 8 PID 1680 wrote to memory of 580 1680 dialer.exe 9 PID 1680 wrote to memory of 656 1680 dialer.exe 10 PID 1680 wrote to memory of 744 1680 dialer.exe 11 PID 1680 wrote to memory of 788 1680 dialer.exe 12 PID 1680 wrote to memory of 824 1680 dialer.exe 13 PID 1680 wrote to memory of 976 1680 dialer.exe 14 PID 1680 wrote to memory of 284 1680 dialer.exe 15 PID 1680 wrote to memory of 1008 1680 dialer.exe 16 PID 1680 wrote to memory of 340 1680 dialer.exe 17 PID 1680 wrote to memory of 1232 1680 dialer.exe 18 PID 1680 wrote to memory of 1336 1680 dialer.exe 19 PID 1680 wrote to memory of 1392 1680 dialer.exe 20 PID 1680 wrote to memory of 1416 1680 dialer.exe 22 PID 1680 wrote to memory of 1592 1680 dialer.exe 23 PID 1680 wrote to memory of 932 1680 dialer.exe 24 PID 1680 wrote to memory of 1904 1680 dialer.exe 25 PID 1680 wrote to memory of 1888 1680 dialer.exe 26 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Sets service image path in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: LoadsDriver
PID:468 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:580
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1592
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:932
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:656
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
- Drops file in System32 directory
PID:744
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:788
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1336
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:976
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵
- Suspicious use of AdjustPrivilegeToken
PID:284
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1008
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:340
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1232
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:1416
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1904
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1888
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2420
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:484
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\s.exe"C:\Users\Admin\AppData\Local\Temp\s.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\ProgramData\main.exe"C:\ProgramData\main.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpD4AD.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpD4AD.tmp.bat4⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2852"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2156
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:2460
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f6⤵PID:2600
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f7⤵
- Adds Run key to start application
- Modifies registry key
PID:1136
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1716 -s 19406⤵PID:1980
-
-
-
-
-
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524
-
-
-
C:\ProgramData\setup.exe"C:\ProgramData\setup.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1552
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:668
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2536
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2544
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1908
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:2272
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\yntnomxcupkb.xml"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2672
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1520
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:1016
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2052
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2724
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1156
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1932
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1912
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:2792
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\yntnomxcupkb.xml"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:2816
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:2588
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1912763799-1392597287-535685659198871586111052890211347846407-9244911581557291031"1⤵PID:2308
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1578394027-350865214-86165577710902076148417992121100599507186117917443374203"1⤵PID:2408
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1028852957-8637278972110331375-1176294708-882686150-16268070261225471801-1512828448"1⤵PID:2852
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-19000894054032225981169355631539303203-230988394-157212682017261791412102726404"1⤵PID:2560
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-20282812991384439123-17796532631361737471885371778-1653836375-934247882-1877615417"1⤵PID:1528
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2002975863-623548417-901756795-346917497-135518787212306226052356852651296251786"1⤵PID:1216
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1883550703-18490746561842469222-4581797988945991602068703160-2116832306814471364"1⤵PID:2184
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-900143519-1035884945182185138-17263137251824709642438997413-360490197-95833511"1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.0MB
MD548b277a9ac4e729f9262dd9f7055c422
SHA1d7e8a3fa664e863243c967520897e692e67c5725
SHA2565c832eda59809a4f51dc779bb00bd964aad42f2597a1c9f935cfb37f0888ef17
SHA51266dd4d1a82103cd90c113df21eb693a2bffde2cde41f9f40b5b85368d5a920b66c3bc5cadaf9f9d74dfd0f499086bedd477f593184a7f755b7b210ef5e428941
-
Filesize
21KB
MD5bcb8b9f6606d4094270b6d9b2ed92139
SHA1bd55e985db649eadcb444857beed397362a2ba7b
SHA256fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118
SHA512869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9
-
Filesize
4.3MB
MD563a1fa9259a35eaeac04174cecb90048
SHA10dc0c91bcd6f69b80dcdd7e4020365dd7853885a
SHA25614b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed
SHA512896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd
-
Filesize
256B
MD58e9171e62951ddfc3c4e6fb9a56d065a
SHA1482b3b2dcc3775389c7075814a60a82f5cba97d4
SHA256c65539638291b77da77a21d36c45dd9d5dd773f2dd1c589154d48d7ed80421ca
SHA512a06ee21760634859afb9dc07613f434d1fb985fba746b71fd85384a076e3cdb33bbe93885eca31b3cbce5334f24bb25353aecdc18831fb3f95d9c65810656067
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
2KB
MD5358e489c69a8521a66a403c7ad542b9c
SHA11377e6114996ec394de1045e6807f297e0879358
SHA256a15b2504490e51391c99243904d37c299cb5aeab207b41c5463195ad4321dc75
SHA512ac86aea08341604c8d9b9f0361b41dcae8c24aaef512b48e0ec9834a7c18ca8a21a885040c5ff397c015c8b74948fdc6771c10c807238a4947bdddae8daaa5bc
-
Filesize
5.6MB
MD53d3c49dd5d13a242b436e0a065cd6837
SHA1e38a773ffa08452c449ca5a880d89cfad24b6f1b
SHA256e0338c845a876d585eceb084311e84f3becd6fa6f0851567ba2c5f00eeaf4ecf
SHA512dd0e590310392b0543d47a2d24d55f6f091ba59acc0d7ea533039ffb48f1b8938587889bcfa19b0538a62ba26fcde2172253860ceab34af40fd7bf65b6587b00
-
Filesize
5.4MB
MD51274cbcd6329098f79a3be6d76ab8b97
SHA153c870d62dcd6154052445dc03888cdc6cffd370
SHA256bbe5544c408a6eb95dd9980c61a63c4ebc8ccbeecade4de4fae8332361e27278
SHA512a0febbd4915791d3c32531fb3cf177ee288dd80ce1c8a1e71fa9ad59a4ebddeef69b6be7f3d19e687b96dc59c8a8fa80afff8378a71431c3133f361b28e0d967
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
18KB
MD5bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
Filesize
21KB
MD520ddf543a1abe7aee845de1ec1d3aa8e
SHA10eaf5de57369e1db7f275a2fffd2d2c9e5af65bf
SHA256d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8
SHA51296dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd
-
Filesize
21KB
MD54380d56a3b83ca19ea269747c9b8302b
SHA10c4427f6f0f367d180d37fc10ecbe6534ef6469c
SHA256a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a
SHA5121c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4
-
Filesize
21KB
MD52554060f26e548a089cab427990aacdf
SHA18cc7a44a16d6b0a6b7ed444e68990ff296d712fe
SHA2565ab003e899270b04abc7f67be953eaccf980d5bbe80904c47f9aaf5d401bb044
SHA512fd4d5a7fe4da77b0222b040dc38e53f48f7a3379f69e2199639b9f330b2e55939d89ce8361d2135182b607ad75e58ee8e34b90225143927b15dcc116b994c506