Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/11/2024, 01:09
Behavioral task
behavioral1
Sample
WindowsDefender.exe
Resource
win11-20241007-en
Errors
General
-
Target
WindowsDefender.exe
-
Size
205KB
-
MD5
53cb889affead37778d2ef39092d91da
-
SHA1
91820167c3b4065d07916adb0b56a867da1a68e9
-
SHA256
946cc4d31bbc501fa25c2b22efc8e07cd0ea326b276333600f98c33689d407df
-
SHA512
4cc5cbedf7a36a271e405bed1fb4beedde2c9e12e79e3100acd61b0160a9ad5f57c363457601104956f79327d7562944db8c4ae17e416fd27b0b6a39dd77d5c6
-
SSDEEP
768:BLzayT8ljccym5fCja4sYxE7FWPA9pHOMhna4OE3QjFMtUiLi8PqXhP5++:BLzgAcJ5fzFJ9pHOM1ZOE3cMt/P85U+
Malware Config
Extracted
xworm
5.0
anything-talked.gl.at.ply.gg:7897
eSQIhPW4koQzrFdT
-
Install_directory
%AppData%
-
install_file
Regedit.exe
Extracted
quasar
1.4.1
Office04
almost-visitor.gl.at.ply.gg:7995
e8e985a7-62a2-410d-91ea-7249972738eb
-
encryption_key
578EFB451288E8CFFF8CB67C63A1530F061DDBCD
-
install_name
WindowsDefender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows.Defender.exe
-
subdirectory
SubDir
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2312-1-0x00000000006B0000-0x00000000006E8000-memory.dmp family_xworm -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\System32\\winnt32.exe" gocgpr.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x001a00000002aad4-14.dat family_quasar behavioral1/memory/2588-22-0x00000000009B0000-0x0000000000CFE000-memory.dmp family_quasar -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gocgpr.exe -
Xworm family
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2596 attrib.exe 2648 attrib.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Regedit.lnk WindowsDefender.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Regedit.lnk WindowsDefender.exe -
Executes dropped EXE 3 IoCs
pid Process 2588 fujtxz.exe 2020 WindowsDefender.exe 240 gocgpr.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1796 takeown.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command gocgpr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command\ = "C:\\Windows\\SysWow64\\winnt32.exe \"%1\" %*" gocgpr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command gocgpr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\winnt32.exe \"%1\" %*" gocgpr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Windows\CurrentVersion\Run\Regedit = "C:\\Users\\Admin\\AppData\\Roaming\\Regedit.exe" WindowsDefender.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gocgpr.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ gocgpr.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winnt32.exe gocgpr.exe File opened for modification C:\Windows\SysWOW64\winnt32.exe gocgpr.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Control Panel\Desktop\Wallpaper = "C:\\hello.png" gocgpr.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gocgpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Modifies Control Panel 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Control Panel\Desktop\AutoColorization = "1" gocgpr.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133771435004389249" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "55" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command gocgpr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command\ = "C:\\Windows\\SysWow64\\winnt32.exe \"%1\" %*" gocgpr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command gocgpr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\winnt32.exe \"%1\" %*" gocgpr.exe -
Runs .reg file with regedit 2 IoCs
pid Process 4816 regedit.exe 3496 regedit.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1364 schtasks.exe 732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2312 WindowsDefender.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2312 WindowsDefender.exe Token: SeDebugPrivilege 2312 WindowsDefender.exe Token: SeDebugPrivilege 2588 fujtxz.exe Token: SeDebugPrivilege 2020 WindowsDefender.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeIncreaseQuotaPrivilege 2704 WMIC.exe Token: SeSecurityPrivilege 2704 WMIC.exe Token: SeTakeOwnershipPrivilege 2704 WMIC.exe Token: SeLoadDriverPrivilege 2704 WMIC.exe Token: SeSystemProfilePrivilege 2704 WMIC.exe Token: SeSystemtimePrivilege 2704 WMIC.exe Token: SeProfSingleProcessPrivilege 2704 WMIC.exe Token: SeIncBasePriorityPrivilege 2704 WMIC.exe Token: SeCreatePagefilePrivilege 2704 WMIC.exe Token: SeBackupPrivilege 2704 WMIC.exe Token: SeRestorePrivilege 2704 WMIC.exe Token: SeShutdownPrivilege 2704 WMIC.exe Token: SeDebugPrivilege 2704 WMIC.exe Token: SeSystemEnvironmentPrivilege 2704 WMIC.exe Token: SeRemoteShutdownPrivilege 2704 WMIC.exe Token: SeUndockPrivilege 2704 WMIC.exe Token: SeManageVolumePrivilege 2704 WMIC.exe Token: 33 2704 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2020 WindowsDefender.exe 2020 WindowsDefender.exe 2020 WindowsDefender.exe 2020 WindowsDefender.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2020 WindowsDefender.exe 2020 WindowsDefender.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 2020 WindowsDefender.exe 2020 WindowsDefender.exe 2020 WindowsDefender.exe 2020 WindowsDefender.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2020 WindowsDefender.exe 2020 WindowsDefender.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2020 WindowsDefender.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2312 WindowsDefender.exe 2020 WindowsDefender.exe 3256 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2588 2312 WindowsDefender.exe 78 PID 2312 wrote to memory of 2588 2312 WindowsDefender.exe 78 PID 2588 wrote to memory of 732 2588 fujtxz.exe 79 PID 2588 wrote to memory of 732 2588 fujtxz.exe 79 PID 2588 wrote to memory of 2020 2588 fujtxz.exe 81 PID 2588 wrote to memory of 2020 2588 fujtxz.exe 81 PID 2020 wrote to memory of 1364 2020 WindowsDefender.exe 82 PID 2020 wrote to memory of 1364 2020 WindowsDefender.exe 82 PID 2208 wrote to memory of 2144 2208 chrome.exe 89 PID 2208 wrote to memory of 2144 2208 chrome.exe 89 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 4608 2208 chrome.exe 90 PID 2208 wrote to memory of 2120 2208 chrome.exe 91 PID 2208 wrote to memory of 2120 2208 chrome.exe 91 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 PID 2208 wrote to memory of 2412 2208 chrome.exe 92 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gocgpr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallPaper = "1" gocgpr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\UseDefaultTile = "1" gocgpr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2596 attrib.exe 2648 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"C:\Users\Admin\AppData\Local\Temp\WindowsDefender.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\fujtxz.exe"C:\Users\Admin\AppData\Local\Temp\fujtxz.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows.Defender.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsDefender.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:732
-
-
C:\Users\Admin\AppData\Roaming\SubDir\WindowsDefender.exe"C:\Users\Admin\AppData\Roaming\SubDir\WindowsDefender.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows.Defender.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsDefender.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\gocgpr.exe"C:\Users\Admin\AppData\Local\Temp\gocgpr.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Executes dropped EXE
- Modifies system executable filetype association
- Checks whether UAC is enabled
- Modifies WinLogon
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- System policy modification
PID:240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\hello.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\hello.png4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2596
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\hello.bat4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2648
-
-
C:\Windows\SysWOW64\net.exenet user Admin death4⤵
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Admin death5⤵
- System Location Discovery: System Language Discovery
PID:4928
-
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic useraccount where name='Admin' rename 'NO ESCAPE'4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\ProgramData\Microsoft\User Account Pictures" /r /d y4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\xcopy.exexcopy *.png "C:\ProgramData\Microsoft\User Account Pictures\"4⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:4588
-
-
C:\Windows\SysWOW64\xcopy.exexcopy *.bmp "C:\ProgramData\Microsoft\User Account Pictures\"4⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:992
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Windows\System32\hello.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4816
-
-
C:\Windows\SysWOW64\regedit.exeregedit -s C:\Windows\System32\hello.reg4⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3496
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /t 0 /r4⤵
- System Location Discovery: System Language Discovery
PID:4536
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8e46cc40,0x7fff8e46cc4c,0x7fff8e46cc582⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1840,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1832 /prefetch:22⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2124,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2136 /prefetch:32⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2208 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3168,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3784,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4744,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,8256103353869385864,8911761098794450832,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4752 /prefetch:82⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Windows directory
PID:3408 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff6ab344698,0x7ff6ab3446a4,0x7ff6ab3446b03⤵
- Drops file in Windows directory
PID:2136
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Windows directory
PID:3372 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff6ab344698,0x7ff6ab3446a4,0x7ff6ab3446b03⤵
- Drops file in Windows directory
PID:1980
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1144
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a13055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3256
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5367eedf178d600d9c648d347ed2ffc39
SHA1cd34da174885d61f6aeeb3f692a331daf4987b9b
SHA256b2623696c098367454a36183e5f9db768bfa99f552af76c0d516653c1d6b28ef
SHA512affd39e2d88c080bbb1454f4da98b6ec260bd2976d939f20a6e63ce2f51d0be357c43e24b761c8986953879ad18418a93b41e8307a0e0dfa9ee5e81399babe3c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5a126eb8f326a86cfeb8d06565620beae
SHA16b6338740e65af31bada082e57951fe8198451b7
SHA256d387eea04005863bafb508522f2f4e35f9fd822c1a3ac4aaa590ecb2ae811e4b
SHA5122abf421376d6eb34a1b518a1bb87d9b5783fe6b42e16d66d895934ed416e90db5f20136b065f462b515374ce4d4d9ac176d19a28921f58361944a0c826cc9a1a
-
Filesize
9KB
MD518aec9301fc367c9ef27ca83987f4bd8
SHA1ebaa0c1d9a6ac89f94b489aede0aa4071773b2e9
SHA2562fe425e455c1b08fd470f948b796cb226516e28299e5259ccbb66dc957d6674c
SHA5125760e1b57c8cb2e1cbac95e6417471ed07ea1f97e54ce58c9d4373b97c52deceb69bd5a21e3a8b507eb00d6d432928dd2f4ac8d48bcdd8cc5ac65282c9cdb4e8
-
Filesize
9KB
MD549d766f5d8c9f992b44de46b054e55b4
SHA17aee5ed302554aa1c4e1a194c2f99680ad7a2e6b
SHA256072c544eece4b4503bae17ca760e83b4e20e59029ea91ae56470ffa278015c82
SHA5128217ca2cb263e7c4c642bca0162df57aa72ef050c2b143395a20e3115d3904bab5f79723598ac9bd05ab386acf42817a0cd257c9c6a3a524b8492d7d78e4128d
-
Filesize
15KB
MD5c9420ebe8890134ba0fd079140386e2d
SHA1375caea9b4f9ff7b92d3b1d7d9c6345ab1b7db2e
SHA256f0e1c63a7f1b390c1566a8d1af0dab78940dd398c17e58b43fab2ef7b9558337
SHA512e294d614dbb1cd36cb11f260b09a6ec602508a77da2cf3ca8d92b1c0d74da9a71dcbd526db84db5bde311de8aed34ff7cec63daa18f33fd07dc81c07db36d184
-
Filesize
234KB
MD5747b9e9a08690fdd7eebc688f36d38bc
SHA189b341d15a05d45b27a5447699df0764c5a6f5fb
SHA25613e631af6975ca49a360769a817aaeecd6a77151dfbba6fc32ea5df1907fc3d4
SHA5127420877beea2eec2237b785a8843b77ecd03fb02ef6ced7f911cee1cfd963d34d545eedca72effbc437b86e4f15f25b703b489964e1cbad6c113f06ad44f82dd
-
Filesize
234KB
MD5e0d94f288c2c79b1ffccd5ac0c84c51e
SHA1c883fe36d489767c434585a6659dd757e2c216d3
SHA2568cdc21e2b6dc532e45a02e087c62abe0599f71035e30209eb9e7c0e5d29ae97b
SHA5127f8047a43b0fb1c2cb7630d5c402a330bd990e466eddf9f42257d0f977f02ecaff4d7c129612a56b102f986d83d06b8e1f64e9503e3ecf807eabc2e21505586e
-
Filesize
3.3MB
MD5294933bde06bb391ab58b1348963a1ce
SHA19cd13906dfe58080bdb81fca7807a8319c25d297
SHA256cd93b524f9463609246992479e72e71cf0ca803330b9f4d3dfabcf57b9c2c604
SHA5122256285a6da8549cc728908f1a7722b98554a5878a553153e7944ce945855481711eec182524d0bf36ed15ebbfd7c5764c82dbfe865c637f36d9c2a71dead2ae
-
Filesize
1.0MB
MD5cdbb54a3ec888c3eac84deaa408f7b8a
SHA14478842748db03e2e3879ac6a3854a82e30c845d
SHA256cccc326adf56026fa3e5efba505a6f51c091d7362b8cd68b322d301300aa6615
SHA5122abc533172ae2024fcde9fa8b407256e5341593c70912e42020ea7fe2b1d195b586039703c0b7e24964061bfbfb3a352fa8e7e158a53e50fa142397a594739d4
-
Filesize
67B
MD5c0d310f6a15d755a8fb4f3f4f6183d58
SHA1758926be23dc768f494f7dd229b9d9f152926f9e
SHA256b0e0514242246a453eae64811bdb6dd50c69e056d0e9c1b9c674168befc51048
SHA51285bca4d2c02985efc8530a446baff8f9a5dcf15352c87a5ce71f91de7877fb54f1a1e079b70928e718a77f3f3457057d46c8d03cc4316ae774f07d2a00d29d6d
-
Filesize
40B
MD55ac7c6582d5ebcb1c1941d252d1952cd
SHA15ffa9403bbff25965421cdca1c3f6ccb7cf7f7ca
SHA2566d7e3ddf29ae13df46e4f982683e2a6780cf84495571e748cb3e38fd8a8bc3bf
SHA512dbe1bf21c2a26aef78935a6b8a81a345925717f8ebc77c0f7c3d587099e8fa430cb8374f6583caba567854e39fb9ad6c40499b3b498cba5d8a8bd3ab6116a662
-
Filesize
640B
MD53cc5890bb9c873dce0cfc8c30ec44a06
SHA1a0417aaa590fb8efd984056a585e09b1e397c1eb
SHA25649d4a3a85f7eac86d5388ef0fd858875c8ad4f24a8e649e0bfc802f06584d5b6
SHA51207c0467d70dabe3d287a34c381e8a12e59ad905c995ccede55ca0da57fcda77bc37892996d2fd948e1b695529ba39fec84c807fa5b2482ea880bd2c182b2dbe4
-
Filesize
391KB
MD59e655cfd3d501f1ed01d6a2e0db0e744
SHA1481cda76b89cb4785672f598d7b59c994f7d143b
SHA256cf7b5334e06a13501821834cd1aedb7c3306a543f7d8ec03d1f20bfaf9bed613
SHA5125c55676d0b76429ca6408cd197a7dcad895753f3e68a73b75f141c4f193f0526476937704a32e7e051119a9cc14ce8b48baae5a8e10d3eb5e9250186cc9c5e32
-
Filesize
1KB
MD56bf949c62c5e9d07593ba5b604e36773
SHA11eabcd6bfd16216c7b4c0d557f072ae2f88987ca
SHA256e54ea8405024f1fa72e470417059bdd186b0a3836f7d5e1c2c95c6003383912f
SHA51229a53f39949994b462eb0ce68d382abcb72284573d75475ef38ad8d442d389442e60dd99e705be29ac61ffbdc3969e692482953da992bd65948b0995cb57bb07
-
Filesize
237B
MD55d572d54e293acd90d5b8ad6036333da
SHA1cefa5e89c74f8efc602002b4f6030d8a79ca6deb
SHA2564810dc6c101937dde12d4581de81e608ea144761d1307779dc6a256872330ede
SHA5129ff8a451447b69e1b7596b1fd64e15fdd3e74c4a69ae7ab81eed4e21ed758f210ec18d36f87919b6c8c5e42ea291d083073a9fbfbe24fc4dfb9269803d4bb04a
-
Filesize
307B
MD5d8e22ef10bd7ab65f56220d2845d6a94
SHA175a58eab37c76efc8d10ad77e9da17046da4707a
SHA256b115a4548ad8e9c7cadb707a0ff79fcd55d9d900eefa7a922ca50c85c4d3ca1d
SHA5121e72cf4e17b720e919e91af5b3ec9ea28fe693a1e1966ce4bfccf4883c3ae5228d6140010b58a684cef19fa99c9a936f9ab24be200faba48f42089d748a22378
-
Filesize
353B
MD5c7572c5706ca8d652d6b87787ae7f5b2
SHA1cda3a3b9117e6be6cb8e41a48aed58124eabfdd5
SHA25637c63ee5d26fb77f8e697faec3891673e40c449bf8411cff806d852ae7506ada
SHA5128cb13c1296a914a525fae134c31f75d5469af1250160b73b9f6e1fda4d16652efbc68c1a55b116f1aa877ca198155609530fa4e2683990aa57d391d125544808
-
Filesize
588KB
MD52ab3698b005b421349512142ed6b965e
SHA1b07684e4ad4145c9be7e070a4b2826bcaf165400
SHA256150e95da6c1e09511241130da0e376878f5e24e21c2a9dfe7fbcc1022660e29f
SHA51240086959198afe931d8309a2526c6e4de1872ac7d55b68179450c950da67d01c0f57a8a07b782316e888165c1694f558699bbcbc5457743f2c1d3bcc3a3beece
-
Filesize
1KB
MD596f17c361a25164e71716d5bb56cb3d8
SHA10e0792716a58e38f87de25929122339c6ce9f1f8
SHA2561025314ef977b5d07041b8b73e4adbea779e5e06096c3c66bd1f06fbbba7fd1c
SHA51295691ffbb5ee0b2e86489aa4abd58059fc4c46bd267995ef2df1611e7ac256ab2ccc67bbd2255359bf6ec9c0d7af7177ec39f36fc9478901d68947028af5b66a