Resubmissions
22-01-2025 15:50
250122-s99tasvlcp 1022-01-2025 15:46
250122-s7peksvkbr 1022-01-2025 15:45
250122-s7aanatkgx 1022-01-2025 14:49
250122-r7c6wa1ncx 10Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 14:49
Static task
static1
Behavioral task
behavioral1
Sample
TDMenu_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
TDMenu_x64.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
TDMenu_x64.exe
Resource
win11-20241007-en
General
-
Target
TDMenu_x64.exe
-
Size
6.4MB
-
MD5
3f9d8993daa6e07221f9a12eaa011ca6
-
SHA1
a33290d94fb3bba06337b7b847d971b1a8fd6110
-
SHA256
109bf7761442498abd03f972c2b315b6ea8727a79ed35e7e75a90e6d1e4b7f79
-
SHA512
ffb917e3a01e72b5cec0c8ff41328bac3840c6be0dcb05a58513a3f77a32c2280fc6881109725ba931b31809fbb0abb83bdacd9ec8022ea8a49d6476ca2177c0
-
SSDEEP
98304:S/STPMYacPcyyc7Ht40MV+9eN+jCxf8/kbqEVgUmSr7CqnfMwd+mJbKc1rm7cNAH:S9xcPj9Hy0MWGxk/kWEu72t+mKlPDT
Malware Config
Extracted
xworm
23.27.201.57:7000
-
Install_directory
%ProgramData%
-
install_file
DirectX End-User Runtime.exe
Extracted
redline
godseye3-01-25
23.27.201.57:62529
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cb3-13.dat family_xworm behavioral1/memory/2520-20-0x0000000000270000-0x000000000028A000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2520-152-0x000000001D8A0000-0x000000001D8BE000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/2520-152-0x000000001D8A0000-0x000000001D8BE000-memory.dmp family_sectoprat -
Sectoprat family
-
Xmrig family
-
Xworm family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/1216-97-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1216-96-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1216-99-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1216-100-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1216-102-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1216-103-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1216-101-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1216-155-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1216-156-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3244 powershell.exe 4940 powershell.exe 3280 powershell.exe 1656 powershell.exe 1140 powershell.exe 4636 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts GameBarUpdateService.exe File created C:\Windows\system32\drivers\etc\hosts GameBar-Update-Service.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation TDMenu_x64.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DirectX End-User Runtime.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe -
Executes dropped EXE 6 IoCs
pid Process 3232 TDMenu.exe 2520 DirectX End-User Runtime.exe 5060 GameBar-Update-Service.exe 3664 GameBarUpdateService.exe 3244 DirectX End-User Runtime.exe 440 DirectX End-User Runtime.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DirectX End-User Runtime = "C:\\ProgramData\\DirectX End-User Runtime.exe" DirectX End-User Runtime.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe GameBarUpdateService.exe File opened for modification C:\Windows\system32\MRT.exe GameBar-Update-Service.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3664 set thread context of 2196 3664 GameBarUpdateService.exe 114 PID 3664 set thread context of 1216 3664 GameBarUpdateService.exe 116 -
resource yara_rule behavioral1/memory/1216-91-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-95-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-97-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-94-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-93-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-96-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-92-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-99-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-100-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-102-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-103-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-101-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-155-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1216-156-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1536 sc.exe 3172 sc.exe 820 sc.exe 4956 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5060 GameBar-Update-Service.exe 4636 powershell.exe 4636 powershell.exe 5060 GameBar-Update-Service.exe 5060 GameBar-Update-Service.exe 5060 GameBar-Update-Service.exe 5060 GameBar-Update-Service.exe 5060 GameBar-Update-Service.exe 5060 GameBar-Update-Service.exe 3664 GameBarUpdateService.exe 3244 powershell.exe 3244 powershell.exe 3664 GameBarUpdateService.exe 3664 GameBarUpdateService.exe 3664 GameBarUpdateService.exe 4940 powershell.exe 1216 explorer.exe 1216 explorer.exe 4940 powershell.exe 3280 powershell.exe 1216 explorer.exe 1216 explorer.exe 3280 powershell.exe 3280 powershell.exe 1656 powershell.exe 1656 powershell.exe 1216 explorer.exe 1216 explorer.exe 1140 powershell.exe 1140 powershell.exe 2520 DirectX End-User Runtime.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe 1216 explorer.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2520 DirectX End-User Runtime.exe Token: SeDebugPrivilege 4636 powershell.exe Token: SeDebugPrivilege 3244 powershell.exe Token: SeLockMemoryPrivilege 1216 explorer.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeDebugPrivilege 3280 powershell.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 1140 powershell.exe Token: SeDebugPrivilege 2520 DirectX End-User Runtime.exe Token: SeDebugPrivilege 3244 DirectX End-User Runtime.exe Token: SeDebugPrivilege 440 DirectX End-User Runtime.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2520 DirectX End-User Runtime.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1660 wrote to memory of 3232 1660 TDMenu_x64.exe 82 PID 1660 wrote to memory of 3232 1660 TDMenu_x64.exe 82 PID 1660 wrote to memory of 2520 1660 TDMenu_x64.exe 84 PID 1660 wrote to memory of 2520 1660 TDMenu_x64.exe 84 PID 1660 wrote to memory of 5060 1660 TDMenu_x64.exe 85 PID 1660 wrote to memory of 5060 1660 TDMenu_x64.exe 85 PID 976 wrote to memory of 1308 976 cmd.exe 100 PID 976 wrote to memory of 1308 976 cmd.exe 100 PID 2368 wrote to memory of 2844 2368 cmd.exe 107 PID 2368 wrote to memory of 2844 2368 cmd.exe 107 PID 3664 wrote to memory of 2196 3664 GameBarUpdateService.exe 114 PID 3664 wrote to memory of 2196 3664 GameBarUpdateService.exe 114 PID 3664 wrote to memory of 2196 3664 GameBarUpdateService.exe 114 PID 3664 wrote to memory of 2196 3664 GameBarUpdateService.exe 114 PID 3664 wrote to memory of 2196 3664 GameBarUpdateService.exe 114 PID 3664 wrote to memory of 2196 3664 GameBarUpdateService.exe 114 PID 3664 wrote to memory of 2196 3664 GameBarUpdateService.exe 114 PID 3664 wrote to memory of 2196 3664 GameBarUpdateService.exe 114 PID 3664 wrote to memory of 2196 3664 GameBarUpdateService.exe 114 PID 3664 wrote to memory of 1216 3664 GameBarUpdateService.exe 116 PID 3664 wrote to memory of 1216 3664 GameBarUpdateService.exe 116 PID 3664 wrote to memory of 1216 3664 GameBarUpdateService.exe 116 PID 3664 wrote to memory of 1216 3664 GameBarUpdateService.exe 116 PID 3664 wrote to memory of 1216 3664 GameBarUpdateService.exe 116 PID 2532 wrote to memory of 3704 2532 cmd.exe 117 PID 2532 wrote to memory of 3704 2532 cmd.exe 117 PID 2520 wrote to memory of 4940 2520 DirectX End-User Runtime.exe 118 PID 2520 wrote to memory of 4940 2520 DirectX End-User Runtime.exe 118 PID 2520 wrote to memory of 3280 2520 DirectX End-User Runtime.exe 120 PID 2520 wrote to memory of 3280 2520 DirectX End-User Runtime.exe 120 PID 2520 wrote to memory of 1656 2520 DirectX End-User Runtime.exe 122 PID 2520 wrote to memory of 1656 2520 DirectX End-User Runtime.exe 122 PID 2520 wrote to memory of 1140 2520 DirectX End-User Runtime.exe 124 PID 2520 wrote to memory of 1140 2520 DirectX End-User Runtime.exe 124 PID 2520 wrote to memory of 4692 2520 DirectX End-User Runtime.exe 126 PID 2520 wrote to memory of 4692 2520 DirectX End-User Runtime.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\ProgramData\TDMenu.exe"C:\ProgramData\TDMenu.exe"2⤵
- Executes dropped EXE
PID:3232
-
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DirectX End-User Runtime" /tr "C:\ProgramData\DirectX End-User Runtime.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4692
-
-
-
C:\ProgramData\GameBar-Update-Service.exe"C:\ProgramData\GameBar-Update-Service.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5060 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1308
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:820
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Xbox GameBar Update" binpath= "C:\ProgramData\XboxGame\GameBarUpdateService.exe" start= "auto"3⤵
- Launches sc.exe
PID:4956
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:1536
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:3172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\ProgramData\GameBar-Update-Service.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:2844
-
-
-
-
C:\ProgramData\XboxGame\GameBarUpdateService.exeC:\ProgramData\XboxGame\GameBarUpdateService.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:3704
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2196
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:440
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD518d86f6b69457eb245764f48643697df
SHA181da90762a99e970874a1c9a0ce60c267c02b18c
SHA25675a6a0ee2e9749380b9c26dedea02ce7cb7d7b140e45ed054868be6f80d56b33
SHA5129e1f2851e3c9e2a32f710521259fa637b20daad431573f941e89fb731143a83d147ff849ecc1c7e3c95a88d708f56aa4ace707ce52789ac40c1cd048ecd119c1
-
Filesize
5.1MB
MD502f3666b4f382f4b9c64ddda3183ab7e
SHA1ef7828f1040da2c09788d56a0205358fcc533065
SHA2562b2653d6ba0add65199560b9315aa06a157d80271b5bcd6a5c7caca7a5e27bb6
SHA5127b70ec1a76c296525310e4f1984b279639ed25e70114d7aa890e76a4c9a6eae14169195247f1613f1c83ace40f62ef29902c54676718a9299b38bd9d85638f75
-
Filesize
1.2MB
MD5443a251e35d62f4ca4aeb3b5350adea9
SHA1edd6c016656e1eb673066cb19f6d0187e4db046f
SHA2568f73d7c48e9bf46f6a31e0a76090ff6b61f5ccc208f9a0f523f7604fcbc7273e
SHA51291b04727b34f73432eac1dadd86d451d794cc72414ea0f864237a782959910a916a9162d9ac7b9bc5575e603480732bd8e7f59015d770a0ab8105476f030bd94
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5aeceee3981c528bdc5e1c635b65d223d
SHA1de9939ed37edca6772f5cdd29f6a973b36b7d31b
SHA256b99f3c778a047e0348c92c16e0419fa29418d10d0fec61ad8283e92a094a2b32
SHA512df48285f38e9284efdbd9f8d99e2e94a46fb5465953421ab88497b73ae06895b98ea5c98796560810a6f342c31a9112ea87e03cd3e267fd8518d7585f492a8fb
-
Filesize
944B
MD5a2c8179aaa149c0b9791b73ce44c04d1
SHA1703361b0d43ec7f669304e7c0ffbbfdeb1e484ff
SHA256c1d30342a40a2b6e7553da30ceb85754d33820f6fbb3bbbed1ceb30d6390de4a
SHA5122e201dd457d055baad86f68c15bcc7beb48d6dc2ffc10db7f304eb93f697e7b45991cbde857d25da2c9c60c23f3e13df8b5ed5809c1753737a23096e296cc9e3
-
Filesize
944B
MD5dbb22d95851b93abf2afe8fb96a8e544
SHA1920ec5fdb323537bcf78f7e29a4fc274e657f7a4
SHA256e1ee9af6b9e3bfd41b7d2c980580bb7427883f1169ed3df4be11293ce7895465
SHA51216031134458bf312509044a3028be46034c544163c4ca956aee74d2075fbeb5873754d2254dc1d0b573ce1a644336ac4c8bd7147aba100bfdac8c504900ef3fc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5e1bc11b4431e4d20a764ceae5159f3c4
SHA10c34c0f1b360caa3a9d5ca118a512523a5e82b3b
SHA256c7f0ecce330d3e41e4cdda8f6c20ff61004e343229f34f4db37ecf01e516c35c
SHA512dd7a7dfa8f115b4664f458d69229d6b4dfeb5252b4e20edf4aed717033fa7588d861abc116d648514bada34cb5f51c5c0a74bd0285e91e3e34e9d195dd216b18