Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-12-2024 13:59
Static task
static1
Behavioral task
behavioral1
Sample
19-12-2024_UqVE2XPvW38Pgkj.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
19-12-2024_UqVE2XPvW38Pgkj.zip
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
19-12-2024_UqVE2XPvW38Pgkj.zip
Resource
win11-20241007-en
General
-
Target
19-12-2024_UqVE2XPvW38Pgkj.zip
-
Size
4.3MB
-
MD5
cf356b163f946dc2f16d95febf45a583
-
SHA1
e7c8e964c23f86765d729b82d3140604bb00cb7c
-
SHA256
50d3bf20e1534889385de4b8d780a750c9d37a75c941ffae6dd961caef2eb325
-
SHA512
baa6367011ebda751fe7ef40a49f99e96c5daf19e068b02b2cdf564477f17a792a9dc0887b9723208d0c49d55a7e1c501723643d12fee8c8dcd0d1406e65be2d
-
SSDEEP
98304:YIv1mD5TqdFfK4iBOqWh3tWyfzbgwgGP7OZlGWwCR6t+uWiPBt1KP:YIdmFkF7iMtWKzkwgh1wc6t+cBS
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral3/memory/4444-120-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/4444-125-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/4444-126-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/4444-127-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/4444-124-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/4444-123-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/4444-121-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/4444-131-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/4444-132-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1160 powershell.exe 4832 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts Bootstrapper.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Executes dropped EXE 3 IoCs
pid Process 4492 Bootstrapper.exe 1840 Bootstrapper.exe 480 updater.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1572 powercfg.exe 2936 powercfg.exe 1416 powercfg.exe 4940 powercfg.exe 3388 powercfg.exe 3212 powercfg.exe 1988 powercfg.exe 2604 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe Bootstrapper.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 480 set thread context of 2316 480 updater.exe 137 PID 480 set thread context of 4444 480 updater.exe 142 -
resource yara_rule behavioral3/memory/4444-116-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-120-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-125-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-126-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-127-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-124-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-123-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-121-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-119-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-117-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-115-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-118-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-131-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/4444-132-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1764 sc.exe 4404 sc.exe 1044 sc.exe 2292 sc.exe 1512 sc.exe 2140 sc.exe 2032 sc.exe 4368 sc.exe 4716 sc.exe 4124 sc.exe 4516 sc.exe 5072 sc.exe 4664 sc.exe 1388 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies data under HKEY_USERS 50 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3244 powershell.exe 856 powershell.exe 856 powershell.exe 3244 powershell.exe 1840 Bootstrapper.exe 1160 powershell.exe 1160 powershell.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 1840 Bootstrapper.exe 480 updater.exe 4832 powershell.exe 4832 powershell.exe 480 updater.exe 480 updater.exe 480 updater.exe 480 updater.exe 480 updater.exe 480 updater.exe 480 updater.exe 480 updater.exe 480 updater.exe 480 updater.exe 480 updater.exe 480 updater.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe 4444 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4256 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeRestorePrivilege 4256 7zFM.exe Token: 35 4256 7zFM.exe Token: SeSecurityPrivilege 4256 7zFM.exe Token: SeDebugPrivilege 856 powershell.exe Token: SeDebugPrivilege 3244 powershell.exe Token: SeDebugPrivilege 1160 powershell.exe Token: SeShutdownPrivilege 1416 powercfg.exe Token: SeCreatePagefilePrivilege 1416 powercfg.exe Token: SeShutdownPrivilege 3388 powercfg.exe Token: SeCreatePagefilePrivilege 3388 powercfg.exe Token: SeShutdownPrivilege 4940 powercfg.exe Token: SeCreatePagefilePrivilege 4940 powercfg.exe Token: SeShutdownPrivilege 3212 powercfg.exe Token: SeCreatePagefilePrivilege 3212 powercfg.exe Token: SeDebugPrivilege 4832 powershell.exe Token: SeShutdownPrivilege 1988 powercfg.exe Token: SeCreatePagefilePrivilege 1988 powercfg.exe Token: SeShutdownPrivilege 2936 powercfg.exe Token: SeCreatePagefilePrivilege 2936 powercfg.exe Token: SeShutdownPrivilege 1572 powercfg.exe Token: SeCreatePagefilePrivilege 1572 powercfg.exe Token: SeLockMemoryPrivilege 4444 explorer.exe Token: SeShutdownPrivilege 2604 powercfg.exe Token: SeCreatePagefilePrivilege 2604 powercfg.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4256 7zFM.exe 4256 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4492 Bootstrapper.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4492 wrote to memory of 856 4492 Bootstrapper.exe 81 PID 4492 wrote to memory of 856 4492 Bootstrapper.exe 81 PID 4492 wrote to memory of 856 4492 Bootstrapper.exe 81 PID 4492 wrote to memory of 3244 4492 Bootstrapper.exe 82 PID 4492 wrote to memory of 3244 4492 Bootstrapper.exe 82 PID 4492 wrote to memory of 3244 4492 Bootstrapper.exe 82 PID 4492 wrote to memory of 1840 4492 Bootstrapper.exe 85 PID 4492 wrote to memory of 1840 4492 Bootstrapper.exe 85 PID 4668 wrote to memory of 4080 4668 cmd.exe 94 PID 4668 wrote to memory of 4080 4668 cmd.exe 94 PID 4700 wrote to memory of 764 4700 cmd.exe 124 PID 4700 wrote to memory of 764 4700 cmd.exe 124 PID 480 wrote to memory of 2316 480 updater.exe 137 PID 480 wrote to memory of 2316 480 updater.exe 137 PID 480 wrote to memory of 2316 480 updater.exe 137 PID 480 wrote to memory of 2316 480 updater.exe 137 PID 480 wrote to memory of 2316 480 updater.exe 137 PID 480 wrote to memory of 2316 480 updater.exe 137 PID 480 wrote to memory of 2316 480 updater.exe 137 PID 480 wrote to memory of 2316 480 updater.exe 137 PID 480 wrote to memory of 2316 480 updater.exe 137 PID 480 wrote to memory of 4444 480 updater.exe 142 PID 480 wrote to memory of 4444 480 updater.exe 142 PID 480 wrote to memory of 4444 480 updater.exe 142 PID 480 wrote to memory of 4444 480 updater.exe 142 PID 480 wrote to memory of 4444 480 updater.exe 142
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\19-12-2024_UqVE2XPvW38Pgkj.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4256
-
C:\Users\Admin\Desktop\Bootstrapper.exe"C:\Users\Admin\Desktop\Bootstrapper.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAagBtACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAHgAdABmACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcARQByAG8AcgA6ACAAQwBvAHUAbABkACAAbgBvAHQAIABzAHQAYQByAHQAOgAgAC4ATgBFAFQAIABGAHIAYQBtAGUAdwBvAHIAawAgADQALgA4AC4AMQAgAG4AbwB0ACAAaQBuAHMAdABhAGwAbABlAGQALgAnACwAJwAnACwAJwBPAEsAJwAsACcARQByAHIAbwByACcAKQA8ACMAbQBxAGcAIwA+AA=="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAYgBlACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHMAcgB3ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAawBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGYAbQBpACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1840 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:4080
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:1764
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1044
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:2292
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:4516
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:5072
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3212
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"3⤵
- Launches sc.exe
PID:4664
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"3⤵
- Launches sc.exe
PID:1388
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:1512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"3⤵
- Launches sc.exe
PID:4368
-
-
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:764
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2140
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:4404
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:2032
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:4124
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2316
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Defense Evasion
Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
17KB
MD5e909aedee6bd11de78cc1924c9fcbf71
SHA1fa4e15ef565b3df384fedf0254cfcc77864baecf
SHA256890a31e08e9b43ae89370731a70929b1c6ab0b9d5de61b890b9cb1c5846e1543
SHA5124d1480160d0689b2fb9f3aeb614246f118dc815c14e5e648d940ef3ad5eaaa281c82ed3f076b0dcec420f642bab225180600e47fd1d7d2000669a260e94a3e15
-
Filesize
18KB
MD53f2c9fe09984b9f28107ef194367bda0
SHA1b842d08ba21b4a7eee90672523397440c4e3c37d
SHA2563614d5a083107096f48282fdda735cdc88ea363b2ae45ae88b43ec7b9fee87b0
SHA512babb99c5e28e1b46e3abac2e16a2de1e9ba9e1a1836fecbf407b9140f01c942c6491d4f2b20ce533e36b41a1bb6140445c3b7999742e9e1691e610d68e5edbd5
-
Filesize
5.1MB
MD533a6872a056879c6a977599778a1fb0f
SHA1109285b385ce0c21ee8b9624b63104d27a51115e
SHA25679e48350a0712336332571a280272957ffc446c520e70a6e8827169fc84933d4
SHA5127052a4d7e047768d0eb91b316c191aba2eb6247a66c0f39f2fd7e062bbdd31c402734c80b81dc2b144c199ecde2efc25a5afdfce476923a026bf927dff0c0973
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.1MB
MD5d15c24a478c313ede9d4ad03a4164f8a
SHA1aceaa3800a3c042243e39b1235b7c1eef338e90f
SHA25687e35093021944aa354666c0f7b594f4414e2c29a2da69f62a427ed56f91d2b1
SHA5122b373ab102ba01bbb119f2e08daac38cb3f90939be0474c6086eb2d6e64eead65b41b8a818f464248b67973539b5de879844fe4175268ae8db808230480fea40
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62