Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25/12/2024, 14:49
Behavioral task
behavioral1
Sample
JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
#/[New]3.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
#/[New]3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
#/[New]crypted.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
#/[New]crypted.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe
-
Size
680.4MB
-
MD5
b7b4e0558eb6188abc6e17d77abb4f73
-
SHA1
22851c79469486055efc62599a25eb4e1f8cc8b1
-
SHA256
998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5
-
SHA512
638827eb702d032bf9f045854c1a79cd3bb841c9147ddd66fce98d91072bcd67338ae7214a248f8b0c8e43a68c8af48d2991a5ecae9df4e35666cf0477529cc3
-
SSDEEP
196608:gomVwAoiSs79XEVmNmbGHDoKUrUNQ9SzsIW8YtuNfU/:goqwAoSREVmDjzfIuNfU/
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 10 IoCs
description pid Process procid_target PID 2784 created 1052 2784 [New]3.exe 18 PID 2784 created 1052 2784 [New]3.exe 18 PID 2784 created 1052 2784 [New]3.exe 18 PID 2784 created 1052 2784 [New]3.exe 18 PID 2784 created 1052 2784 [New]3.exe 18 PID 2948 created 1052 2948 uTorrent.exe 18 PID 2948 created 1052 2948 uTorrent.exe 18 PID 2948 created 1052 2948 uTorrent.exe 18 PID 2948 created 1052 2948 uTorrent.exe 18 PID 2948 created 1052 2948 uTorrent.exe 18 -
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ [New]3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uTorrent.exe -
XMRig Miner payload 11 IoCs
resource yara_rule behavioral1/memory/2948-177-0x000000013FFC0000-0x0000000140E99000-memory.dmp xmrig behavioral1/memory/1692-179-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1692-181-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1692-183-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1692-185-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1692-187-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1692-189-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1692-191-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1692-193-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1692-195-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1692-197-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1976 powershell.exe 2824 powershell.exe 1188 powershell.exe 2184 powershell.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uTorrent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion [New]3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion [New]3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uTorrent.exe -
Executes dropped EXE 3 IoCs
pid Process 2784 [New]3.exe 3024 [New]crypted.exe 2948 uTorrent.exe -
Loads dropped DLL 5 IoCs
pid Process 2908 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 2908 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 2772 AppLaunch.exe 2772 AppLaunch.exe 2032 taskeng.exe -
resource yara_rule behavioral1/memory/2784-7-0x000000013FC80000-0x0000000140B59000-memory.dmp themida behavioral1/memory/2784-8-0x000000013FC80000-0x0000000140B59000-memory.dmp themida behavioral1/memory/2784-10-0x000000013FC80000-0x0000000140B59000-memory.dmp themida behavioral1/memory/2784-9-0x000000013FC80000-0x0000000140B59000-memory.dmp themida behavioral1/memory/2784-11-0x000000013FC80000-0x0000000140B59000-memory.dmp themida behavioral1/memory/2784-30-0x000000013FC80000-0x0000000140B59000-memory.dmp themida behavioral1/memory/2784-153-0x000000013FC80000-0x0000000140B59000-memory.dmp themida behavioral1/memory/2784-156-0x000000013FC80000-0x0000000140B59000-memory.dmp themida behavioral1/memory/2948-161-0x000000013FFC0000-0x0000000140E99000-memory.dmp themida behavioral1/memory/2948-163-0x000000013FFC0000-0x0000000140E99000-memory.dmp themida behavioral1/memory/2948-164-0x000000013FFC0000-0x0000000140E99000-memory.dmp themida behavioral1/memory/2948-165-0x000000013FFC0000-0x0000000140E99000-memory.dmp themida behavioral1/memory/2948-166-0x000000013FFC0000-0x0000000140E99000-memory.dmp themida behavioral1/memory/2948-168-0x000000013FFC0000-0x0000000140E99000-memory.dmp themida behavioral1/memory/2948-177-0x000000013FFC0000-0x0000000140E99000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA [New]3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uTorrent.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2784 [New]3.exe 2948 uTorrent.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3024 set thread context of 2772 3024 [New]crypted.exe 33 PID 2948 set thread context of 3000 2948 uTorrent.exe 67 PID 2948 set thread context of 1692 2948 uTorrent.exe 68 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Libs\WR64.sys uTorrent.exe File created C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe [New]3.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 656 sc.exe 608 sc.exe 696 sc.exe 1988 sc.exe 1656 sc.exe 2172 sc.exe 2212 sc.exe 1696 sc.exe 484 sc.exe 2344 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [New]crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = b0fe8489dc56db01 powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2348 schtasks.exe 3044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2772 AppLaunch.exe 2772 AppLaunch.exe 2772 AppLaunch.exe 2772 AppLaunch.exe 2772 AppLaunch.exe 2772 AppLaunch.exe 2784 [New]3.exe 2784 [New]3.exe 1976 powershell.exe 2784 [New]3.exe 2784 [New]3.exe 2784 [New]3.exe 2784 [New]3.exe 1188 powershell.exe 2784 [New]3.exe 2784 [New]3.exe 2784 [New]3.exe 2784 [New]3.exe 2948 uTorrent.exe 2948 uTorrent.exe 2824 powershell.exe 2948 uTorrent.exe 2948 uTorrent.exe 2948 uTorrent.exe 2948 uTorrent.exe 2184 powershell.exe 2948 uTorrent.exe 2948 uTorrent.exe 2948 uTorrent.exe 2948 uTorrent.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2772 AppLaunch.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 1188 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2184 powershell.exe Token: SeLockMemoryPrivilege 1692 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2784 2908 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 30 PID 2908 wrote to memory of 2784 2908 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 30 PID 2908 wrote to memory of 2784 2908 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 30 PID 2908 wrote to memory of 2784 2908 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 30 PID 2908 wrote to memory of 3024 2908 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 31 PID 2908 wrote to memory of 3024 2908 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 31 PID 2908 wrote to memory of 3024 2908 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 31 PID 2908 wrote to memory of 3024 2908 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 31 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 3024 wrote to memory of 2772 3024 [New]crypted.exe 33 PID 844 wrote to memory of 656 844 cmd.exe 40 PID 844 wrote to memory of 656 844 cmd.exe 40 PID 844 wrote to memory of 656 844 cmd.exe 40 PID 844 wrote to memory of 608 844 cmd.exe 41 PID 844 wrote to memory of 608 844 cmd.exe 41 PID 844 wrote to memory of 608 844 cmd.exe 41 PID 844 wrote to memory of 2212 844 cmd.exe 42 PID 844 wrote to memory of 2212 844 cmd.exe 42 PID 844 wrote to memory of 2212 844 cmd.exe 42 PID 844 wrote to memory of 696 844 cmd.exe 43 PID 844 wrote to memory of 696 844 cmd.exe 43 PID 844 wrote to memory of 696 844 cmd.exe 43 PID 844 wrote to memory of 1696 844 cmd.exe 44 PID 844 wrote to memory of 1696 844 cmd.exe 44 PID 844 wrote to memory of 1696 844 cmd.exe 44 PID 1188 wrote to memory of 2348 1188 powershell.exe 47 PID 1188 wrote to memory of 2348 1188 powershell.exe 47 PID 1188 wrote to memory of 2348 1188 powershell.exe 47 PID 888 wrote to memory of 2360 888 cmd.exe 52 PID 888 wrote to memory of 2360 888 cmd.exe 52 PID 888 wrote to memory of 2360 888 cmd.exe 52 PID 2032 wrote to memory of 2948 2032 taskeng.exe 54 PID 2032 wrote to memory of 2948 2032 taskeng.exe 54 PID 2032 wrote to memory of 2948 2032 taskeng.exe 54 PID 2732 wrote to memory of 484 2732 cmd.exe 59 PID 2732 wrote to memory of 484 2732 cmd.exe 59 PID 2732 wrote to memory of 484 2732 cmd.exe 59 PID 2732 wrote to memory of 2344 2732 cmd.exe 60 PID 2732 wrote to memory of 2344 2732 cmd.exe 60 PID 2732 wrote to memory of 2344 2732 cmd.exe 60 PID 2732 wrote to memory of 1988 2732 cmd.exe 61 PID 2732 wrote to memory of 1988 2732 cmd.exe 61 PID 2732 wrote to memory of 1988 2732 cmd.exe 61 PID 2732 wrote to memory of 1656 2732 cmd.exe 62 PID 2732 wrote to memory of 1656 2732 cmd.exe 62 PID 2732 wrote to memory of 1656 2732 cmd.exe 62 PID 2732 wrote to memory of 2172 2732 cmd.exe 63 PID 2732 wrote to memory of 2172 2732 cmd.exe 63 PID 2732 wrote to memory of 2172 2732 cmd.exe 63 PID 2184 wrote to memory of 3044 2184 powershell.exe 66 PID 2184 wrote to memory of 3044 2184 powershell.exe 66 PID 2184 wrote to memory of 3044 2184 powershell.exe 66 PID 2948 wrote to memory of 3000 2948 uTorrent.exe 67 PID 2948 wrote to memory of 1692 2948 uTorrent.exe 68 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Roaming\[New]3.exeC:\Users\Admin\AppData\Roaming\[New]3.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Users\Admin\AppData\Roaming\[New]crypted.exeC:\Users\Admin\AppData\Roaming\[New]crypted.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:656
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:608
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2212
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:696
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1696
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#kssonkvq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'AppData' /tr '''C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'AppData' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn AppData /tr "'C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2348
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "AppData"2⤵PID:1920
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Roaming\[New]3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\System32\choice.exechoice /C Y /N /D Y /T 33⤵PID:2360
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:484
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2344
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1988
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1656
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2172
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#kssonkvq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'AppData' /tr '''C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'AppData' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn AppData /tr "'C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3044
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:3000
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3A645074-646E-457C-BA71-54CF3BF4C3FE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe"C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\fb294cd6523f3f9156a3a7bc28e2811a\Admin@[email protected]\Software.txt
Filesize4KB
MD50deddb3cd02f97a1b29228e249b3b365
SHA1fecda2c925798a04ad17871124a441dd96ae1730
SHA256f347f9e4d3dd0ce266a5d225c0471e33386c659c6c2425a1b2e625864e538b9b
SHA51223d186926572a79bd7cec17ddfc8dc49e97097636cf34cdbc4a8b3d6b590362635cb41200da96385cbc9da4d255cef65bf5bf2cd964c37c331ef9d1dec50eeb0
-
Filesize
13B
MD564a1339085eda776b01251c5994ea18e
SHA1db191a5da47c8a6f5d90c82ec3ab7cd9b110d5a2
SHA25698931cd12d774f86fac2b7d1281c3f95f955d1f708aabaae324baed325f3530e
SHA5124bb1c794ced2056b4b54198c565534395ff5fadc3e4b8c68d47af78ab568c0bb926e35becd31f5c439d8cdb688130d8660dd05cbc38a54aa6cae388c5b8fd38c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5dac32a572bbb15c14622175c9d1dd28e
SHA1d349cf80f34c7f264b949ecec6a03f68aacee5f7
SHA256218511b1120bcb20d21dfb6fb3fcc39a419d2c84628911ad8345041e041679b9
SHA512f3ab4f80102b5a1e5c1e1cf1194b66c4801fc48e4d8a9cf2e4aec39326b719a7684026944ebfea5aa832833e7541a1d16ec5c9102002a884554a03e736ba8810