Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
weave.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
weave.exe
Resource
win10v2004-20240802-en
General
-
Target
weave.exe
-
Size
15.8MB
-
MD5
ea7dba3908d558d661407fbb2c65855e
-
SHA1
94b803aac4ebe3ee2d941e1b877e56b1db5682d3
-
SHA256
fdf02306a9abf9914892e30ef92b08d07e54fb23be023f5f451125383eb69cfd
-
SHA512
edc69b8fe58618a7b524dee701eb67f9408ac63f795de131e147b717201552b2d8e7bf4c470a2f6bc048a4c96095fc285977d0281fcd6bbfdf9e32a86d0fb9aa
-
SSDEEP
393216:AOJnMZdZK972PN6s8jjcAvPbauAkbxsL4EcvLi9:xJnMZdMx2sDIt0Eai
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
description pid Process procid_target PID 2824 created 1164 2824 updater.exe 21 PID 2824 created 1164 2824 updater.exe 21 PID 2824 created 1164 2824 updater.exe 21 PID 2824 created 1164 2824 updater.exe 21 PID 2824 created 1164 2824 updater.exe 21 PID 2824 created 1164 2824 updater.exe 21 PID 2532 created 1164 2532 updater.exe 21 PID 2532 created 1164 2532 updater.exe 21 PID 2532 created 1164 2532 updater.exe 21 PID 2532 created 1164 2532 updater.exe 21 PID 2532 created 1164 2532 updater.exe 21 PID 2532 created 1164 2532 updater.exe 21 PID 2532 created 1164 2532 updater.exe 21 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cli_gui.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1044 powershell.exe 448 powershell.exe 3036 powershell.exe 2680 powershell.exe 1188 powershell.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cli_gui.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cli_gui.exe -
Executes dropped EXE 3 IoCs
pid Process 2676 cli_gui.exe 2824 updater.exe 2532 updater.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Known Folders API Service.evtx svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 2692 weave.exe 2692 weave.exe 2408 conhost.exe 1436 taskeng.exe -
resource yara_rule behavioral1/files/0x00070000000186fd-9.dat themida behavioral1/memory/2676-15-0x000000013F4C0000-0x000000013FD62000-memory.dmp themida behavioral1/memory/2676-26-0x000000013F4C0000-0x000000013FD62000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cli_gui.exe -
Power Settings 1 TTPs 10 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3016 powercfg.exe 1680 powercfg.exe 1612 powercfg.exe 2752 powercfg.exe 2660 powercfg.exe 1580 powercfg.exe 1244 powercfg.exe 1936 cmd.exe 1620 cmd.exe 1868 powercfg.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\system32\syscfg.cfg weave.exe File created C:\Windows\system32\updater.exe weave.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\System32\Tasks\MicrosoftEdge svchost.exe File opened for modification C:\Windows\System32\Tasks\MicrosoftEdge svchost.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2692 weave.exe 2692 weave.exe 2676 cli_gui.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2824 set thread context of 544 2824 updater.exe 47 PID 2532 set thread context of 2776 2532 updater.exe 70 PID 2532 set thread context of 1316 2532 updater.exe 77 PID 2532 set thread context of 1772 2532 updater.exe 79 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Microsoft\Edge\updater.exe updater.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2896 sc.exe 2892 sc.exe 2988 sc.exe 2880 sc.exe 2920 sc.exe 1780 sc.exe 3044 sc.exe 2520 sc.exe 1892 sc.exe 2976 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weave.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 20132bcb4900db01 powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2432 schtasks.exe 2252 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2692 weave.exe 2692 weave.exe 2692 weave.exe 2692 weave.exe 2692 weave.exe 2692 weave.exe 2692 weave.exe 3036 powershell.exe 2824 updater.exe 2824 updater.exe 1044 powershell.exe 2824 updater.exe 2824 updater.exe 2824 updater.exe 2824 updater.exe 2824 updater.exe 2824 updater.exe 2824 updater.exe 2824 updater.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 1188 powershell.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 2824 updater.exe 2824 updater.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe 544 dialer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3036 powershell.exe Token: SeDebugPrivilege 1044 powershell.exe Token: SeDebugPrivilege 544 dialer.exe Token: SeShutdownPrivilege 1612 powercfg.exe Token: SeAuditPrivilege 856 svchost.exe Token: SeDebugPrivilege 1188 powershell.exe Token: SeShutdownPrivilege 2752 powercfg.exe Token: SeShutdownPrivilege 2660 powercfg.exe Token: SeShutdownPrivilege 3016 powercfg.exe Token: SeAuditPrivilege 856 svchost.exe Token: SeAuditPrivilege 856 svchost.exe Token: SeDebugPrivilege 448 powershell.exe Token: SeAuditPrivilege 856 svchost.exe Token: SeDebugPrivilege 2776 dialer.exe Token: SeShutdownPrivilege 1680 powercfg.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeShutdownPrivilege 1868 powercfg.exe Token: SeShutdownPrivilege 1580 powercfg.exe Token: SeDebugPrivilege 2532 updater.exe Token: SeShutdownPrivilege 1244 powercfg.exe Token: SeLockMemoryPrivilege 1772 dialer.exe Token: SeAssignPrimaryTokenPrivilege 856 svchost.exe Token: SeIncreaseQuotaPrivilege 856 svchost.exe Token: SeSecurityPrivilege 856 svchost.exe Token: SeTakeOwnershipPrivilege 856 svchost.exe Token: SeLoadDriverPrivilege 856 svchost.exe Token: SeSystemtimePrivilege 856 svchost.exe Token: SeBackupPrivilege 856 svchost.exe Token: SeRestorePrivilege 856 svchost.exe Token: SeShutdownPrivilege 856 svchost.exe Token: SeSystemEnvironmentPrivilege 856 svchost.exe Token: SeUndockPrivilege 856 svchost.exe Token: SeManageVolumePrivilege 856 svchost.exe Token: SeAssignPrimaryTokenPrivilege 856 svchost.exe Token: SeIncreaseQuotaPrivilege 856 svchost.exe Token: SeSecurityPrivilege 856 svchost.exe Token: SeTakeOwnershipPrivilege 856 svchost.exe Token: SeLoadDriverPrivilege 856 svchost.exe Token: SeSystemtimePrivilege 856 svchost.exe Token: SeBackupPrivilege 856 svchost.exe Token: SeRestorePrivilege 856 svchost.exe Token: SeShutdownPrivilege 856 svchost.exe Token: SeSystemEnvironmentPrivilege 856 svchost.exe Token: SeUndockPrivilege 856 svchost.exe Token: SeManageVolumePrivilege 856 svchost.exe Token: SeAssignPrimaryTokenPrivilege 856 svchost.exe Token: SeIncreaseQuotaPrivilege 856 svchost.exe Token: SeSecurityPrivilege 856 svchost.exe Token: SeTakeOwnershipPrivilege 856 svchost.exe Token: SeLoadDriverPrivilege 856 svchost.exe Token: SeSystemtimePrivilege 856 svchost.exe Token: SeBackupPrivilege 856 svchost.exe Token: SeRestorePrivilege 856 svchost.exe Token: SeShutdownPrivilege 856 svchost.exe Token: SeSystemEnvironmentPrivilege 856 svchost.exe Token: SeUndockPrivilege 856 svchost.exe Token: SeManageVolumePrivilege 856 svchost.exe Token: SeAssignPrimaryTokenPrivilege 856 svchost.exe Token: SeIncreaseQuotaPrivilege 856 svchost.exe Token: SeSecurityPrivilege 856 svchost.exe Token: SeTakeOwnershipPrivilege 856 svchost.exe Token: SeLoadDriverPrivilege 856 svchost.exe Token: SeSystemtimePrivilege 856 svchost.exe Token: SeBackupPrivilege 856 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 weave.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2676 2692 weave.exe 30 PID 2692 wrote to memory of 2676 2692 weave.exe 30 PID 2692 wrote to memory of 2676 2692 weave.exe 30 PID 2692 wrote to memory of 2676 2692 weave.exe 30 PID 2692 wrote to memory of 2824 2692 weave.exe 32 PID 2692 wrote to memory of 2824 2692 weave.exe 32 PID 2692 wrote to memory of 2824 2692 weave.exe 32 PID 2692 wrote to memory of 2824 2692 weave.exe 32 PID 2676 wrote to memory of 2572 2676 cli_gui.exe 33 PID 2676 wrote to memory of 2572 2676 cli_gui.exe 33 PID 2676 wrote to memory of 2572 2676 cli_gui.exe 33 PID 2572 wrote to memory of 3036 2572 cmd.exe 34 PID 2572 wrote to memory of 3036 2572 cmd.exe 34 PID 2572 wrote to memory of 3036 2572 cmd.exe 34 PID 2676 wrote to memory of 2620 2676 cli_gui.exe 35 PID 2676 wrote to memory of 2620 2676 cli_gui.exe 35 PID 2676 wrote to memory of 2620 2676 cli_gui.exe 35 PID 2864 wrote to memory of 2880 2864 cmd.exe 40 PID 2864 wrote to memory of 2880 2864 cmd.exe 40 PID 2864 wrote to memory of 2880 2864 cmd.exe 40 PID 2864 wrote to memory of 2896 2864 cmd.exe 41 PID 2864 wrote to memory of 2896 2864 cmd.exe 41 PID 2864 wrote to memory of 2896 2864 cmd.exe 41 PID 2864 wrote to memory of 2892 2864 cmd.exe 42 PID 2864 wrote to memory of 2892 2864 cmd.exe 42 PID 2864 wrote to memory of 2892 2864 cmd.exe 42 PID 2864 wrote to memory of 2920 2864 cmd.exe 43 PID 2864 wrote to memory of 2920 2864 cmd.exe 43 PID 2864 wrote to memory of 2920 2864 cmd.exe 43 PID 2864 wrote to memory of 2988 2864 cmd.exe 44 PID 2864 wrote to memory of 2988 2864 cmd.exe 44 PID 2864 wrote to memory of 2988 2864 cmd.exe 44 PID 2824 wrote to memory of 544 2824 updater.exe 47 PID 1936 wrote to memory of 1612 1936 cmd.exe 50 PID 1936 wrote to memory of 1612 1936 cmd.exe 50 PID 1936 wrote to memory of 1612 1936 cmd.exe 50 PID 544 wrote to memory of 432 544 dialer.exe 5 PID 544 wrote to memory of 480 544 dialer.exe 6 PID 544 wrote to memory of 488 544 dialer.exe 7 PID 544 wrote to memory of 496 544 dialer.exe 8 PID 544 wrote to memory of 588 544 dialer.exe 9 PID 544 wrote to memory of 672 544 dialer.exe 10 PID 544 wrote to memory of 748 544 dialer.exe 11 PID 544 wrote to memory of 816 544 dialer.exe 12 PID 544 wrote to memory of 856 544 dialer.exe 13 PID 544 wrote to memory of 968 544 dialer.exe 15 PID 544 wrote to memory of 112 544 dialer.exe 16 PID 544 wrote to memory of 352 544 dialer.exe 17 PID 544 wrote to memory of 1052 544 dialer.exe 18 PID 544 wrote to memory of 1088 544 dialer.exe 19 PID 544 wrote to memory of 1140 544 dialer.exe 20 PID 544 wrote to memory of 1164 544 dialer.exe 21 PID 544 wrote to memory of 2004 544 dialer.exe 23 PID 544 wrote to memory of 864 544 dialer.exe 24 PID 544 wrote to memory of 1480 544 dialer.exe 26 PID 544 wrote to memory of 2160 544 dialer.exe 27 PID 544 wrote to memory of 2676 544 dialer.exe 30 PID 544 wrote to memory of 2408 544 dialer.exe 31 PID 544 wrote to memory of 2824 544 dialer.exe 32 PID 544 wrote to memory of 1936 544 dialer.exe 45 PID 544 wrote to memory of 1980 544 dialer.exe 46 PID 544 wrote to memory of 1188 544 dialer.exe 48 PID 544 wrote to memory of 2384 544 dialer.exe 49 PID 544 wrote to memory of 1612 544 dialer.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:588
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:2004
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding3⤵
- Checks processor information in registry
PID:1652
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding3⤵PID:2724
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
- Indicator Removal: Clear Windows Event Logs
PID:748
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1140
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\system32\taskeng.exetaskeng.exe {BDED5446-CB5E-4AB5-9B4D-9DA6CCF93A78} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Loads dropped DLL
PID:1436 -
C:\Program Files\Microsoft\Edge\updater.exe"C:\Program Files\Microsoft\Edge\updater.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:112
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:352
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1052
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1088
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:864
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1480
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2160
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:488
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:496
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\weave.exe"C:\Users\Admin\AppData\Local\Temp\weave.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\cli_gui.exe"C:\Users\Admin\AppData\Local\Temp\cli_gui.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\windows\system32'" > NUL 2>&14⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\windows\system32'"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:2620
-
-
-
C:\Windows\system32\updater.exe"C:\Windows\system32\updater.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2880
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2896
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2892
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2920
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2988
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lfvbfbo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'MicrosoftEdge' /tr '''C:\Program Files\Microsoft\Edge\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Microsoft\Edge\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'MicrosoftEdge' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn MicrosoftEdge /tr "'C:\Program Files\Microsoft\Edge\updater.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2432
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "MicrosoftEdge"2⤵PID:264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:980
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1780
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3044
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2520
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1892
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2976
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
PID:1620 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lfvbfbo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'MicrosoftEdge' /tr '''C:\Program Files\Microsoft\Edge\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Microsoft\Edge\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'MicrosoftEdge' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn MicrosoftEdge /tr "'C:\Program Files\Microsoft\Edge\updater.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2252
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:1316
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "961594437-613884605-166633498917033333291108930349462073106558817752113504042"1⤵
- Loads dropped DLL
PID:2408
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-919603522-101330215-377633173334443709-131829107-2007654081-1656222640-10852396"1⤵PID:1980
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-499235143-17446417961387007416242327353289346227-2534166303557450631980014389"1⤵PID:2384
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "2097868737-1151772619-1722936738658990339-9208918012129343807-86187945231985917"1⤵PID:2420
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1866611900-1934324373-1910471296-502425995342306852-1146352687909183117-66600735"1⤵PID:1624
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-9200344851113385966-639039973-7885940931785339866-1077509981-10233729501734073752"1⤵PID:1576
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1597540331-866308286-1135928739-1004265539617598180672422462-269386733-1379328040"1⤵PID:2936
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "239216863-28922434-2601847952046556608-10415735822077985478644670959-2112705190"1⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5a1b6a96519aaa206ac30aad7088e3242
SHA104bf79e8c40f4cda2a4b345ef1467e159bdb0fae
SHA2567dd55d5932f394089ef875e89fb0c92edfa507ce096715e4928e08a0001079cd
SHA512430fa2394e0a338f0fdb9efd6ce14ccab6ed4d0367e2ac58becef37a0f78b9d0675a33f6e7234fe76df29b39e7a16cfc097c89b3c78d5224ae669d928b11e086
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5de517865c68d4e806b1f524dd50262d7
SHA1b06c67ae80c3e4603c1501c354bc59a1f3665f4b
SHA2561b47dc6b60cc3e51c75b0abe152bdb9e7a1335952f079ac714074247eae886ff
SHA512e3c4f65fb37a92b9877d89621e7a58843570f1adcbc7e41dcd165a7b7ab31b4bc0e7562f4278d6ccee01527f3a11db20bcb713a40aa6b73310cafbfb5adc4f2c
-
Filesize
3KB
MD5959326da0a22ba3490d1050e978c2513
SHA172abc93a4147e8d3d9d33d8fa7521a2943bf812d
SHA2562c0fe21b7f88ba240d5df8a6787bbbe38cd8b4888461f85938483e5ffec4cc62
SHA512b852f5536226be46c5bc4e98f3f200d9f07743a4b25a875a834c3d42000fc53b858d2ee96dd1ff1a353166dc795badcc9e7777f98c17c51c64c3421b3c4e0053
-
Filesize
5.7MB
MD58cd62e3ece85c4c3e9f6f7c816256adf
SHA19712769be3f755c5ecbe68d38800a3a8ecdaf324
SHA25639ebcdbb6993787be2ed9d2b6668b9ee2707ca483a66b51d1302bfc610ba021b
SHA512a0aa9f0e6542c526fc18d48ab945d8be3245900381c9640f6e122a633a15dd9a9364bacd830fbc588a926ebef8240300c1fbf4211eae600cff8b7e2c63613501