Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
weave.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
weave.exe
Resource
win10v2004-20240802-en
General
-
Target
weave.exe
-
Size
15.4MB
-
MD5
8232aa26c35a5c0e65e5de1c26dda123
-
SHA1
3d6b0e100f43dc1a4b8ce4c78cbb03169f5001b1
-
SHA256
5abfd9a755941262e7c68d0d64a15260810cd9ec73244287c957c316c587a3e1
-
SHA512
8d289e9c1dc1c184ba50a41363a4eba4f5ed89988cac80353af48325e6cfa465450f0f2c89cf7b2b7b864ff30f4770bae3ad85513479a6a3455038e8f8dc5b63
-
SSDEEP
393216:mqnsH7L9RseITuHE/8zeSL5rFpgRwK1RGWb1j6l:m10dTIZzeSL5x6SK1Rt
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
description pid Process procid_target PID 2748 created 1244 2748 updater.exe 21 PID 2748 created 1244 2748 updater.exe 21 PID 2748 created 1244 2748 updater.exe 21 PID 2748 created 1244 2748 updater.exe 21 PID 2748 created 1244 2748 updater.exe 21 PID 2748 created 1244 2748 updater.exe 21 PID 2808 created 1244 2808 updater.exe 21 PID 2808 created 1244 2808 updater.exe 21 PID 2808 created 1244 2808 updater.exe 21 PID 2808 created 1244 2808 updater.exe 21 PID 2808 created 1244 2808 updater.exe 21 PID 2808 created 1244 2808 updater.exe 21 PID 2808 created 1244 2808 updater.exe 21 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cli_gui.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3024 powershell.exe 840 powershell.exe 2896 powershell.exe 2412 powershell.exe 2068 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cli_gui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cli_gui.exe -
Executes dropped EXE 3 IoCs
pid Process 2760 cli_gui.exe 2748 updater.exe 2808 updater.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Known Folders API Service.evtx svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 2004 weave.exe 2000 conhost.exe 2004 weave.exe 568 taskeng.exe -
resource yara_rule behavioral1/files/0x0008000000016c49-5.dat themida behavioral1/memory/2760-11-0x000000013F6A0000-0x000000013FEDE000-memory.dmp themida behavioral1/memory/2760-25-0x000000013F6A0000-0x000000013FEDE000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cli_gui.exe -
Power Settings 1 TTPs 10 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 908 cmd.exe 2828 powercfg.exe 448 powercfg.exe 2556 powercfg.exe 2228 cmd.exe 1576 powercfg.exe 1604 powercfg.exe 2184 powercfg.exe 2920 powercfg.exe 2660 powercfg.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\MicrosoftEdge svchost.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\system32\syscfg.cfg weave.exe File created C:\Windows\system32\updater.exe weave.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\System32\Tasks\MicrosoftEdge svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2004 weave.exe 2760 cli_gui.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2748 set thread context of 1380 2748 updater.exe 48 PID 2808 set thread context of 1888 2808 updater.exe 71 PID 2808 set thread context of 2712 2808 updater.exe 79 PID 2808 set thread context of 2628 2808 updater.exe 80 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Microsoft\Edge\updater.exe updater.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2476 sc.exe 596 sc.exe 1652 sc.exe 2172 sc.exe 2340 sc.exe 1088 sc.exe 1800 sc.exe 2236 sc.exe 2168 sc.exe 3004 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weave.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 9068f582aaf3da01 powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2708 schtasks.exe 2648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 weave.exe 2004 weave.exe 2004 weave.exe 2004 weave.exe 2004 weave.exe 2896 powershell.exe 2748 updater.exe 2748 updater.exe 3024 powershell.exe 2748 updater.exe 2748 updater.exe 2748 updater.exe 2748 updater.exe 2748 updater.exe 2748 updater.exe 2748 updater.exe 2748 updater.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 2412 powershell.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 2748 updater.exe 2748 updater.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe 1380 dialer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 3024 powershell.exe Token: SeDebugPrivilege 1380 dialer.exe Token: SeShutdownPrivilege 2184 powercfg.exe Token: SeAuditPrivilege 860 svchost.exe Token: SeShutdownPrivilege 2920 powercfg.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeShutdownPrivilege 2660 powercfg.exe Token: SeShutdownPrivilege 2556 powercfg.exe Token: SeAuditPrivilege 860 svchost.exe Token: SeAuditPrivilege 860 svchost.exe Token: SeDebugPrivilege 840 powershell.exe Token: SeShutdownPrivilege 1576 powercfg.exe Token: SeDebugPrivilege 1888 dialer.exe Token: SeAuditPrivilege 860 svchost.exe Token: SeDebugPrivilege 2068 powershell.exe Token: SeShutdownPrivilege 2828 powercfg.exe Token: SeShutdownPrivilege 448 powercfg.exe Token: SeShutdownPrivilege 1604 powercfg.exe Token: SeDebugPrivilege 2808 updater.exe Token: SeLockMemoryPrivilege 2628 dialer.exe Token: SeAssignPrimaryTokenPrivilege 860 svchost.exe Token: SeIncreaseQuotaPrivilege 860 svchost.exe Token: SeSecurityPrivilege 860 svchost.exe Token: SeTakeOwnershipPrivilege 860 svchost.exe Token: SeLoadDriverPrivilege 860 svchost.exe Token: SeSystemtimePrivilege 860 svchost.exe Token: SeBackupPrivilege 860 svchost.exe Token: SeRestorePrivilege 860 svchost.exe Token: SeShutdownPrivilege 860 svchost.exe Token: SeSystemEnvironmentPrivilege 860 svchost.exe Token: SeUndockPrivilege 860 svchost.exe Token: SeManageVolumePrivilege 860 svchost.exe Token: SeAssignPrimaryTokenPrivilege 860 svchost.exe Token: SeIncreaseQuotaPrivilege 860 svchost.exe Token: SeSecurityPrivilege 860 svchost.exe Token: SeTakeOwnershipPrivilege 860 svchost.exe Token: SeLoadDriverPrivilege 860 svchost.exe Token: SeSystemtimePrivilege 860 svchost.exe Token: SeBackupPrivilege 860 svchost.exe Token: SeRestorePrivilege 860 svchost.exe Token: SeShutdownPrivilege 860 svchost.exe Token: SeSystemEnvironmentPrivilege 860 svchost.exe Token: SeUndockPrivilege 860 svchost.exe Token: SeManageVolumePrivilege 860 svchost.exe Token: SeAssignPrimaryTokenPrivilege 860 svchost.exe Token: SeIncreaseQuotaPrivilege 860 svchost.exe Token: SeSecurityPrivilege 860 svchost.exe Token: SeTakeOwnershipPrivilege 860 svchost.exe Token: SeLoadDriverPrivilege 860 svchost.exe Token: SeSystemtimePrivilege 860 svchost.exe Token: SeBackupPrivilege 860 svchost.exe Token: SeRestorePrivilege 860 svchost.exe Token: SeShutdownPrivilege 860 svchost.exe Token: SeSystemEnvironmentPrivilege 860 svchost.exe Token: SeUndockPrivilege 860 svchost.exe Token: SeManageVolumePrivilege 860 svchost.exe Token: SeAssignPrimaryTokenPrivilege 860 svchost.exe Token: SeIncreaseQuotaPrivilege 860 svchost.exe Token: SeSecurityPrivilege 860 svchost.exe Token: SeTakeOwnershipPrivilege 860 svchost.exe Token: SeLoadDriverPrivilege 860 svchost.exe Token: SeSystemtimePrivilege 860 svchost.exe Token: SeBackupPrivilege 860 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2004 weave.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2760 2004 weave.exe 31 PID 2004 wrote to memory of 2760 2004 weave.exe 31 PID 2004 wrote to memory of 2760 2004 weave.exe 31 PID 2004 wrote to memory of 2760 2004 weave.exe 31 PID 2004 wrote to memory of 2748 2004 weave.exe 33 PID 2004 wrote to memory of 2748 2004 weave.exe 33 PID 2004 wrote to memory of 2748 2004 weave.exe 33 PID 2004 wrote to memory of 2748 2004 weave.exe 33 PID 2760 wrote to memory of 2052 2760 cli_gui.exe 34 PID 2760 wrote to memory of 2052 2760 cli_gui.exe 34 PID 2760 wrote to memory of 2052 2760 cli_gui.exe 34 PID 2052 wrote to memory of 2896 2052 cmd.exe 35 PID 2052 wrote to memory of 2896 2052 cmd.exe 35 PID 2052 wrote to memory of 2896 2052 cmd.exe 35 PID 2760 wrote to memory of 2536 2760 cli_gui.exe 36 PID 2760 wrote to memory of 2536 2760 cli_gui.exe 36 PID 2760 wrote to memory of 2536 2760 cli_gui.exe 36 PID 2264 wrote to memory of 2476 2264 cmd.exe 41 PID 2264 wrote to memory of 2476 2264 cmd.exe 41 PID 2264 wrote to memory of 2476 2264 cmd.exe 41 PID 2264 wrote to memory of 2236 2264 cmd.exe 42 PID 2264 wrote to memory of 2236 2264 cmd.exe 42 PID 2264 wrote to memory of 2236 2264 cmd.exe 42 PID 2264 wrote to memory of 1800 2264 cmd.exe 43 PID 2264 wrote to memory of 1800 2264 cmd.exe 43 PID 2264 wrote to memory of 1800 2264 cmd.exe 43 PID 2264 wrote to memory of 1088 2264 cmd.exe 44 PID 2264 wrote to memory of 1088 2264 cmd.exe 44 PID 2264 wrote to memory of 1088 2264 cmd.exe 44 PID 2264 wrote to memory of 2168 2264 cmd.exe 45 PID 2264 wrote to memory of 2168 2264 cmd.exe 45 PID 2264 wrote to memory of 2168 2264 cmd.exe 45 PID 2748 wrote to memory of 1380 2748 updater.exe 48 PID 1380 wrote to memory of 432 1380 dialer.exe 5 PID 1380 wrote to memory of 476 1380 dialer.exe 6 PID 1380 wrote to memory of 492 1380 dialer.exe 7 PID 1380 wrote to memory of 500 1380 dialer.exe 8 PID 1380 wrote to memory of 604 1380 dialer.exe 9 PID 1380 wrote to memory of 680 1380 dialer.exe 10 PID 1380 wrote to memory of 740 1380 dialer.exe 11 PID 1380 wrote to memory of 816 1380 dialer.exe 12 PID 1380 wrote to memory of 860 1380 dialer.exe 13 PID 1380 wrote to memory of 976 1380 dialer.exe 15 PID 1380 wrote to memory of 280 1380 dialer.exe 16 PID 1380 wrote to memory of 236 1380 dialer.exe 17 PID 908 wrote to memory of 2184 908 cmd.exe 51 PID 908 wrote to memory of 2184 908 cmd.exe 51 PID 908 wrote to memory of 2184 908 cmd.exe 51 PID 1380 wrote to memory of 1032 1380 dialer.exe 18 PID 1380 wrote to memory of 1116 1380 dialer.exe 19 PID 1380 wrote to memory of 1172 1380 dialer.exe 20 PID 1380 wrote to memory of 1244 1380 dialer.exe 21 PID 1380 wrote to memory of 1528 1380 dialer.exe 23 PID 1380 wrote to memory of 372 1380 dialer.exe 24 PID 1380 wrote to memory of 1736 1380 dialer.exe 27 PID 1380 wrote to memory of 2504 1380 dialer.exe 28 PID 1380 wrote to memory of 2760 1380 dialer.exe 31 PID 1380 wrote to memory of 2000 1380 dialer.exe 32 PID 1380 wrote to memory of 2748 1380 dialer.exe 33 PID 1380 wrote to memory of 908 1380 dialer.exe 46 PID 1380 wrote to memory of 2856 1380 dialer.exe 47 PID 1380 wrote to memory of 2412 1380 dialer.exe 49 PID 1380 wrote to memory of 1664 1380 dialer.exe 50 PID 908 wrote to memory of 2920 908 cmd.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:604
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:1528
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding3⤵
- Checks processor information in registry
PID:2508
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:680
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
- Indicator Removal: Clear Windows Event Logs
PID:740
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1172
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:860 -
C:\Windows\system32\taskeng.exetaskeng.exe {474017B0-C969-4C52-81CF-C16DD570CD38} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Loads dropped DLL
PID:568 -
C:\Program Files\Microsoft\Edge\updater.exe"C:\Program Files\Microsoft\Edge\updater.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:976
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:280
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:236
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1032
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1116
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:372
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1736
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2504
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:500
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\weave.exe"C:\Users\Admin\AppData\Local\Temp\weave.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\cli_gui.exe"C:\Users\Admin\AppData\Local\Temp\cli_gui.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\windows\system32'" > NUL 2>&14⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\windows\system32'"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:2536
-
-
-
C:\Windows\system32\updater.exe"C:\Windows\system32\updater.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2476
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2236
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1800
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1088
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2168
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lfvbfbo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'MicrosoftEdge' /tr '''C:\Program Files\Microsoft\Edge\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Microsoft\Edge\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'MicrosoftEdge' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn MicrosoftEdge /tr "'C:\Program Files\Microsoft\Edge\updater.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2648
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "MicrosoftEdge"2⤵PID:1088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:872
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3004
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2172
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:596
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2340
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1652
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
PID:2228 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lfvbfbo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'MicrosoftEdge' /tr '''C:\Program Files\Microsoft\Edge\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Microsoft\Edge\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'MicrosoftEdge' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2068 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn MicrosoftEdge /tr "'C:\Program Files\Microsoft\Edge\updater.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2708
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:2712
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "256531863-1673963652-18017745571630891284-187834172-12194216033939224-1630978395"1⤵
- Loads dropped DLL
PID:2000
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1979750982916363687-18428747831015800281356654884-1398927397-586381675516650180"1⤵PID:2856
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-386073150-328015804-1170124881454529095442657093759225258859366343-467122516"1⤵PID:1664
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-109539938277734319974617199-1560126414-17420531109221793411149173209-1502617217"1⤵PID:2168
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-976939831-149127351016809566793468127591024068653110659266109222746605945145"1⤵PID:2116
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1334727067584712891888032380389270799325285979-4128321451593680490-1534129883"1⤵PID:1064
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1121482654750575657-246607512-20090608411153687055105643140-911245231866650686"1⤵PID:1872
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1027385200113426842-449611820-17483803761249044441579855998536704194329110428"1⤵PID:2420
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56264189c915e0702de6022a910c26b8f
SHA186487c4e144689e5e6ef987ade9bfae9d456c59f
SHA2562431b239150b4c80169f250324573a9f84c9ab2325313f922189fcdf6aa747fd
SHA51237e8daa496f33bdf3bb337f6f42cf9359a2621a09ec45931ad7c8d07d9e257edfc3cf8a2d8ada9316d79f514b7d319dd8cef4df9e127fef988fb61494d2bb50f
-
Filesize
3KB
MD5046d0b3f49698c8d2c4629aec443ccbf
SHA1f89c01ce2e7ccfe60f13d2999bf5eb2194c04970
SHA2566491778df98010850ef16f1643457e2e7b10ec3ccfde8b0822553eec72cdf8e8
SHA5127f38f153e921bde2927b113c8852a9e3474ad22d2579266c6f7320f8207cead64094f85255b38ab4c4e6de5c42c1714f5e5084cc8d9e4dc72b97b104a2eaf778
-
Filesize
2.9MB
MD5a11c89310149164b7cc9782fb631459b
SHA1bc6500c18cb1e810016046baaf627328dcce1916
SHA256014d7046f92d512642247df3d442144716451f2e638b60c4685aba9e0552e154
SHA512bd41a12a388a08bf9e3fdf1718730f9822433cfb694bd192f6209cc0e9e84784c6598fd7bf5412b1ca873e08b1e62048cf472c9145a602b80ecb50b915e29497
-
Filesize
5.7MB
MD58cd62e3ece85c4c3e9f6f7c816256adf
SHA19712769be3f755c5ecbe68d38800a3a8ecdaf324
SHA25639ebcdbb6993787be2ed9d2b6668b9ee2707ca483a66b51d1302bfc610ba021b
SHA512a0aa9f0e6542c526fc18d48ab945d8be3245900381c9640f6e122a633a15dd9a9364bacd830fbc588a926ebef8240300c1fbf4211eae600cff8b7e2c63613501