Resubmissions
22-01-2025 15:50
250122-s99tasvlcp 1022-01-2025 15:46
250122-s7peksvkbr 1022-01-2025 15:45
250122-s7aanatkgx 1022-01-2025 14:49
250122-r7c6wa1ncx 10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22-01-2025 14:49
Static task
static1
Behavioral task
behavioral1
Sample
TDMenu_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
TDMenu_x64.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
TDMenu_x64.exe
Resource
win11-20241007-en
General
-
Target
TDMenu_x64.exe
-
Size
6.4MB
-
MD5
3f9d8993daa6e07221f9a12eaa011ca6
-
SHA1
a33290d94fb3bba06337b7b847d971b1a8fd6110
-
SHA256
109bf7761442498abd03f972c2b315b6ea8727a79ed35e7e75a90e6d1e4b7f79
-
SHA512
ffb917e3a01e72b5cec0c8ff41328bac3840c6be0dcb05a58513a3f77a32c2280fc6881109725ba931b31809fbb0abb83bdacd9ec8022ea8a49d6476ca2177c0
-
SSDEEP
98304:S/STPMYacPcyyc7Ht40MV+9eN+jCxf8/kbqEVgUmSr7CqnfMwd+mJbKc1rm7cNAH:S9xcPj9Hy0MWGxk/kWEu72t+mKlPDT
Malware Config
Extracted
xworm
23.27.201.57:7000
-
Install_directory
%ProgramData%
-
install_file
DirectX End-User Runtime.exe
Extracted
redline
godseye3-01-25
23.27.201.57:62529
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x002800000004611e-16.dat family_xworm behavioral2/memory/1812-26-0x00000000005D0000-0x00000000005EA000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1812-155-0x000000001CB40000-0x000000001CB5E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/1812-155-0x000000001CB40000-0x000000001CB5E000-memory.dmp family_sectoprat -
Sectoprat family
-
Xmrig family
-
Xworm family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/1072-100-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1072-99-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1072-102-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1072-105-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1072-104-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1072-103-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1072-106-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1072-158-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1072-159-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 648 powershell.exe 1308 powershell.exe 3464 powershell.exe 456 powershell.exe 4896 powershell.exe 3848 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts GameBar-Update-Service.exe File created C:\Windows\system32\drivers\etc\hosts GameBarUpdateService.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000\Control Panel\International\Geo\Nation TDMenu_x64.exe Key value queried \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000\Control Panel\International\Geo\Nation DirectX End-User Runtime.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe -
Executes dropped EXE 4 IoCs
pid Process 2024 TDMenu.exe 1812 DirectX End-User Runtime.exe 3660 GameBar-Update-Service.exe 3472 GameBarUpdateService.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DirectX End-User Runtime = "C:\\ProgramData\\DirectX End-User Runtime.exe" DirectX End-User Runtime.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe GameBarUpdateService.exe File opened for modification C:\Windows\system32\MRT.exe GameBar-Update-Service.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3472 set thread context of 1856 3472 GameBarUpdateService.exe 114 PID 3472 set thread context of 1072 3472 GameBarUpdateService.exe 116 -
resource yara_rule behavioral2/memory/1072-94-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-96-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-95-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-97-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-100-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-98-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-99-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-102-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-105-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-104-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-103-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-106-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-158-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1072-159-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3372 sc.exe 3616 sc.exe 396 sc.exe 2040 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3660 GameBar-Update-Service.exe 456 powershell.exe 456 powershell.exe 3660 GameBar-Update-Service.exe 3660 GameBar-Update-Service.exe 3660 GameBar-Update-Service.exe 3660 GameBar-Update-Service.exe 3660 GameBar-Update-Service.exe 3660 GameBar-Update-Service.exe 3472 GameBarUpdateService.exe 4896 powershell.exe 4896 powershell.exe 3472 GameBarUpdateService.exe 3472 GameBarUpdateService.exe 3472 GameBarUpdateService.exe 1072 explorer.exe 1072 explorer.exe 3848 powershell.exe 3848 powershell.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 648 powershell.exe 648 powershell.exe 1072 explorer.exe 1072 explorer.exe 1308 powershell.exe 1308 powershell.exe 1072 explorer.exe 1072 explorer.exe 3464 powershell.exe 3464 powershell.exe 1072 explorer.exe 1072 explorer.exe 1812 DirectX End-User Runtime.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe 1072 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1812 DirectX End-User Runtime.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: 36 456 powershell.exe Token: SeDebugPrivilege 4896 powershell.exe Token: SeAssignPrimaryTokenPrivilege 4896 powershell.exe Token: SeIncreaseQuotaPrivilege 4896 powershell.exe Token: SeSecurityPrivilege 4896 powershell.exe Token: SeTakeOwnershipPrivilege 4896 powershell.exe Token: SeLoadDriverPrivilege 4896 powershell.exe Token: SeSystemtimePrivilege 4896 powershell.exe Token: SeBackupPrivilege 4896 powershell.exe Token: SeRestorePrivilege 4896 powershell.exe Token: SeShutdownPrivilege 4896 powershell.exe Token: SeSystemEnvironmentPrivilege 4896 powershell.exe Token: SeUndockPrivilege 4896 powershell.exe Token: SeManageVolumePrivilege 4896 powershell.exe Token: SeLockMemoryPrivilege 1072 explorer.exe Token: SeDebugPrivilege 3848 powershell.exe Token: SeIncreaseQuotaPrivilege 3848 powershell.exe Token: SeSecurityPrivilege 3848 powershell.exe Token: SeTakeOwnershipPrivilege 3848 powershell.exe Token: SeLoadDriverPrivilege 3848 powershell.exe Token: SeSystemProfilePrivilege 3848 powershell.exe Token: SeSystemtimePrivilege 3848 powershell.exe Token: SeProfSingleProcessPrivilege 3848 powershell.exe Token: SeIncBasePriorityPrivilege 3848 powershell.exe Token: SeCreatePagefilePrivilege 3848 powershell.exe Token: SeBackupPrivilege 3848 powershell.exe Token: SeRestorePrivilege 3848 powershell.exe Token: SeShutdownPrivilege 3848 powershell.exe Token: SeDebugPrivilege 3848 powershell.exe Token: SeSystemEnvironmentPrivilege 3848 powershell.exe Token: SeRemoteShutdownPrivilege 3848 powershell.exe Token: SeUndockPrivilege 3848 powershell.exe Token: SeManageVolumePrivilege 3848 powershell.exe Token: 33 3848 powershell.exe Token: 34 3848 powershell.exe Token: 35 3848 powershell.exe Token: 36 3848 powershell.exe Token: SeDebugPrivilege 648 powershell.exe Token: SeIncreaseQuotaPrivilege 648 powershell.exe Token: SeSecurityPrivilege 648 powershell.exe Token: SeTakeOwnershipPrivilege 648 powershell.exe Token: SeLoadDriverPrivilege 648 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1812 DirectX End-User Runtime.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 60 wrote to memory of 2024 60 TDMenu_x64.exe 81 PID 60 wrote to memory of 2024 60 TDMenu_x64.exe 81 PID 60 wrote to memory of 1812 60 TDMenu_x64.exe 83 PID 60 wrote to memory of 1812 60 TDMenu_x64.exe 83 PID 60 wrote to memory of 3660 60 TDMenu_x64.exe 84 PID 60 wrote to memory of 3660 60 TDMenu_x64.exe 84 PID 3584 wrote to memory of 2164 3584 cmd.exe 100 PID 3584 wrote to memory of 2164 3584 cmd.exe 100 PID 1500 wrote to memory of 860 1500 cmd.exe 109 PID 1500 wrote to memory of 860 1500 cmd.exe 109 PID 3472 wrote to memory of 1856 3472 GameBarUpdateService.exe 114 PID 3472 wrote to memory of 1856 3472 GameBarUpdateService.exe 114 PID 3472 wrote to memory of 1856 3472 GameBarUpdateService.exe 114 PID 3472 wrote to memory of 1856 3472 GameBarUpdateService.exe 114 PID 3472 wrote to memory of 1856 3472 GameBarUpdateService.exe 114 PID 3472 wrote to memory of 1856 3472 GameBarUpdateService.exe 114 PID 3472 wrote to memory of 1856 3472 GameBarUpdateService.exe 114 PID 3472 wrote to memory of 1856 3472 GameBarUpdateService.exe 114 PID 3472 wrote to memory of 1856 3472 GameBarUpdateService.exe 114 PID 3472 wrote to memory of 1072 3472 GameBarUpdateService.exe 116 PID 3472 wrote to memory of 1072 3472 GameBarUpdateService.exe 116 PID 3472 wrote to memory of 1072 3472 GameBarUpdateService.exe 116 PID 3472 wrote to memory of 1072 3472 GameBarUpdateService.exe 116 PID 3472 wrote to memory of 1072 3472 GameBarUpdateService.exe 116 PID 1524 wrote to memory of 4756 1524 cmd.exe 117 PID 1524 wrote to memory of 4756 1524 cmd.exe 117 PID 1812 wrote to memory of 3848 1812 DirectX End-User Runtime.exe 118 PID 1812 wrote to memory of 3848 1812 DirectX End-User Runtime.exe 118 PID 1812 wrote to memory of 648 1812 DirectX End-User Runtime.exe 120 PID 1812 wrote to memory of 648 1812 DirectX End-User Runtime.exe 120 PID 1812 wrote to memory of 1308 1812 DirectX End-User Runtime.exe 122 PID 1812 wrote to memory of 1308 1812 DirectX End-User Runtime.exe 122 PID 1812 wrote to memory of 3464 1812 DirectX End-User Runtime.exe 124 PID 1812 wrote to memory of 3464 1812 DirectX End-User Runtime.exe 124 PID 1812 wrote to memory of 4804 1812 DirectX End-User Runtime.exe 126 PID 1812 wrote to memory of 4804 1812 DirectX End-User Runtime.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:60 -
C:\ProgramData\TDMenu.exe"C:\ProgramData\TDMenu.exe"2⤵
- Executes dropped EXE
PID:2024
-
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DirectX End-User Runtime" /tr "C:\ProgramData\DirectX End-User Runtime.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4804
-
-
-
C:\ProgramData\GameBar-Update-Service.exe"C:\ProgramData\GameBar-Update-Service.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3660 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:2164
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:3616
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Xbox GameBar Update" binpath= "C:\ProgramData\XboxGame\GameBarUpdateService.exe" start= "auto"3⤵
- Launches sc.exe
PID:396
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:3372
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:2040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\ProgramData\GameBar-Update-Service.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:860
-
-
-
-
C:\ProgramData\XboxGame\GameBarUpdateService.exeC:\ProgramData\XboxGame\GameBarUpdateService.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4756
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1856
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD518d86f6b69457eb245764f48643697df
SHA181da90762a99e970874a1c9a0ce60c267c02b18c
SHA25675a6a0ee2e9749380b9c26dedea02ce7cb7d7b140e45ed054868be6f80d56b33
SHA5129e1f2851e3c9e2a32f710521259fa637b20daad431573f941e89fb731143a83d147ff849ecc1c7e3c95a88d708f56aa4ace707ce52789ac40c1cd048ecd119c1
-
Filesize
5.1MB
MD502f3666b4f382f4b9c64ddda3183ab7e
SHA1ef7828f1040da2c09788d56a0205358fcc533065
SHA2562b2653d6ba0add65199560b9315aa06a157d80271b5bcd6a5c7caca7a5e27bb6
SHA5127b70ec1a76c296525310e4f1984b279639ed25e70114d7aa890e76a4c9a6eae14169195247f1613f1c83ace40f62ef29902c54676718a9299b38bd9d85638f75
-
Filesize
1.2MB
MD5443a251e35d62f4ca4aeb3b5350adea9
SHA1edd6c016656e1eb673066cb19f6d0187e4db046f
SHA2568f73d7c48e9bf46f6a31e0a76090ff6b61f5ccc208f9a0f523f7604fcbc7273e
SHA51291b04727b34f73432eac1dadd86d451d794cc72414ea0f864237a782959910a916a9162d9ac7b9bc5575e603480732bd8e7f59015d770a0ab8105476f030bd94
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
1KB
MD5d3035747da7250a47c963263936a3649
SHA1092155e82771e73a455479e9fb3cddf8e44e19e3
SHA256ed51d3d4f896523f2836353d0094419cf8a98f31ad3fca33775a257c7487ffbe
SHA512e12fe95600616d2552db4b37426d855971382b09f9dc997bf5c4fb39d398131cfa90ec9e05ee46c5479e73d15d947efa106f02eacd38da2eae3bff74f2984b2f
-
Filesize
1KB
MD5d12bf0977e627c7b7f0a3b7592d68397
SHA1b6bb910a4a2c554d9df0de4d691ec4e5e54c36bb
SHA2568256f2f7bfc45a2c3829e2d80e064f23953dcca670fe5a86ec09c822c895dabe
SHA51201367196d606710f73ea36216d57262b4efa612fde0c55e280607076e762f85963f3584b241bc4e67cba7fd53f6a59571378ebd116e5f1a8c824082976c86c7b
-
Filesize
1KB
MD5ea34ad7eed5b1929e855cca352cb03f6
SHA1262ea6c52cbecbbf080cbc9a78448612d9bd611f
SHA2565e0af2262aa34c52f3dc86ce794501d8ba5d4664278f3b3b237480d24aab4958
SHA512bcba0de65ac47a2bb717e0932a3b46993ccb6966b41cf212e8e2b9160075247c951468b1eaf997f2f029c4fcceeb38d028db5b863f957c089910349a18a4caca
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5e1bc11b4431e4d20a764ceae5159f3c4
SHA10c34c0f1b360caa3a9d5ca118a512523a5e82b3b
SHA256c7f0ecce330d3e41e4cdda8f6c20ff61004e343229f34f4db37ecf01e516c35c
SHA512dd7a7dfa8f115b4664f458d69229d6b4dfeb5252b4e20edf4aed717033fa7588d861abc116d648514bada34cb5f51c5c0a74bd0285e91e3e34e9d195dd216b18