Resubmissions
22-01-2025 15:50
250122-s99tasvlcp 1022-01-2025 15:46
250122-s7peksvkbr 1022-01-2025 15:45
250122-s7aanatkgx 1022-01-2025 14:49
250122-r7c6wa1ncx 10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-01-2025 14:49
Static task
static1
Behavioral task
behavioral1
Sample
TDMenu_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
TDMenu_x64.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
TDMenu_x64.exe
Resource
win11-20241007-en
General
-
Target
TDMenu_x64.exe
-
Size
6.4MB
-
MD5
3f9d8993daa6e07221f9a12eaa011ca6
-
SHA1
a33290d94fb3bba06337b7b847d971b1a8fd6110
-
SHA256
109bf7761442498abd03f972c2b315b6ea8727a79ed35e7e75a90e6d1e4b7f79
-
SHA512
ffb917e3a01e72b5cec0c8ff41328bac3840c6be0dcb05a58513a3f77a32c2280fc6881109725ba931b31809fbb0abb83bdacd9ec8022ea8a49d6476ca2177c0
-
SSDEEP
98304:S/STPMYacPcyyc7Ht40MV+9eN+jCxf8/kbqEVgUmSr7CqnfMwd+mJbKc1rm7cNAH:S9xcPj9Hy0MWGxk/kWEu72t+mKlPDT
Malware Config
Extracted
xworm
23.27.201.57:7000
-
Install_directory
%ProgramData%
-
install_file
DirectX End-User Runtime.exe
Extracted
redline
godseye3-01-25
23.27.201.57:62529
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral3/files/0x001a00000002abc3-13.dat family_xworm behavioral3/memory/3200-21-0x0000000000E70000-0x0000000000E8A000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral3/memory/3200-145-0x000000001CD30000-0x000000001CD4E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral3/memory/3200-145-0x000000001CD30000-0x000000001CD4E000-memory.dmp family_sectoprat -
Sectoprat family
-
Xmrig family
-
Xworm family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral3/memory/1660-93-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/1660-94-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/1660-100-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/1660-99-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/1660-98-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/1660-96-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/1660-97-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/1660-148-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral3/memory/1660-149-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1592 powershell.exe 4692 powershell.exe 1996 powershell.exe 5300 powershell.exe 2416 powershell.exe 2572 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts GameBar-Update-Service.exe File created C:\Windows\system32\drivers\etc\hosts GameBarUpdateService.exe -
Stops running service(s) 4 TTPs
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe -
Executes dropped EXE 6 IoCs
pid Process 4840 TDMenu.exe 3200 DirectX End-User Runtime.exe 2640 GameBar-Update-Service.exe 4764 GameBarUpdateService.exe 5716 DirectX End-User Runtime.exe 5276 DirectX End-User Runtime.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\DirectX End-User Runtime = "C:\\ProgramData\\DirectX End-User Runtime.exe" DirectX End-User Runtime.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe GameBar-Update-Service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe GameBarUpdateService.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4764 set thread context of 576 4764 GameBarUpdateService.exe 103 PID 4764 set thread context of 1660 4764 GameBarUpdateService.exe 105 -
resource yara_rule behavioral3/memory/1660-90-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-93-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-92-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-89-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-91-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-88-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-94-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-100-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-99-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-98-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-96-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-97-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-148-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral3/memory/1660-149-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2204 sc.exe 5156 sc.exe 384 sc.exe 2004 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2640 GameBar-Update-Service.exe 1592 powershell.exe 1592 powershell.exe 2640 GameBar-Update-Service.exe 2640 GameBar-Update-Service.exe 2640 GameBar-Update-Service.exe 2640 GameBar-Update-Service.exe 2640 GameBar-Update-Service.exe 2640 GameBar-Update-Service.exe 4764 GameBarUpdateService.exe 4692 powershell.exe 4692 powershell.exe 4764 GameBarUpdateService.exe 4764 GameBarUpdateService.exe 4764 GameBarUpdateService.exe 1996 powershell.exe 1996 powershell.exe 5300 powershell.exe 5300 powershell.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 2416 powershell.exe 2416 powershell.exe 2572 powershell.exe 2572 powershell.exe 1660 explorer.exe 1660 explorer.exe 3200 DirectX End-User Runtime.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3200 DirectX End-User Runtime.exe Token: SeDebugPrivilege 1592 powershell.exe Token: SeDebugPrivilege 4692 powershell.exe Token: SeLockMemoryPrivilege 1660 explorer.exe Token: SeDebugPrivilege 1996 powershell.exe Token: SeDebugPrivilege 5300 powershell.exe Token: SeDebugPrivilege 2416 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 3200 DirectX End-User Runtime.exe Token: SeDebugPrivilege 5716 DirectX End-User Runtime.exe Token: SeDebugPrivilege 5276 DirectX End-User Runtime.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3200 DirectX End-User Runtime.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4840 4804 TDMenu_x64.exe 79 PID 4804 wrote to memory of 4840 4804 TDMenu_x64.exe 79 PID 4804 wrote to memory of 3200 4804 TDMenu_x64.exe 81 PID 4804 wrote to memory of 3200 4804 TDMenu_x64.exe 81 PID 4804 wrote to memory of 2640 4804 TDMenu_x64.exe 82 PID 4804 wrote to memory of 2640 4804 TDMenu_x64.exe 82 PID 3500 wrote to memory of 832 3500 cmd.exe 91 PID 3500 wrote to memory of 832 3500 cmd.exe 91 PID 1664 wrote to memory of 5728 1664 cmd.exe 98 PID 1664 wrote to memory of 5728 1664 cmd.exe 98 PID 4764 wrote to memory of 576 4764 GameBarUpdateService.exe 103 PID 4764 wrote to memory of 576 4764 GameBarUpdateService.exe 103 PID 4764 wrote to memory of 576 4764 GameBarUpdateService.exe 103 PID 4764 wrote to memory of 576 4764 GameBarUpdateService.exe 103 PID 4764 wrote to memory of 576 4764 GameBarUpdateService.exe 103 PID 4764 wrote to memory of 576 4764 GameBarUpdateService.exe 103 PID 4764 wrote to memory of 576 4764 GameBarUpdateService.exe 103 PID 4764 wrote to memory of 576 4764 GameBarUpdateService.exe 103 PID 4764 wrote to memory of 576 4764 GameBarUpdateService.exe 103 PID 4764 wrote to memory of 1660 4764 GameBarUpdateService.exe 105 PID 4764 wrote to memory of 1660 4764 GameBarUpdateService.exe 105 PID 4764 wrote to memory of 1660 4764 GameBarUpdateService.exe 105 PID 4764 wrote to memory of 1660 4764 GameBarUpdateService.exe 105 PID 4764 wrote to memory of 1660 4764 GameBarUpdateService.exe 105 PID 1764 wrote to memory of 4672 1764 cmd.exe 107 PID 1764 wrote to memory of 4672 1764 cmd.exe 107 PID 3200 wrote to memory of 1996 3200 DirectX End-User Runtime.exe 108 PID 3200 wrote to memory of 1996 3200 DirectX End-User Runtime.exe 108 PID 3200 wrote to memory of 5300 3200 DirectX End-User Runtime.exe 110 PID 3200 wrote to memory of 5300 3200 DirectX End-User Runtime.exe 110 PID 3200 wrote to memory of 2416 3200 DirectX End-User Runtime.exe 112 PID 3200 wrote to memory of 2416 3200 DirectX End-User Runtime.exe 112 PID 3200 wrote to memory of 2572 3200 DirectX End-User Runtime.exe 114 PID 3200 wrote to memory of 2572 3200 DirectX End-User Runtime.exe 114 PID 3200 wrote to memory of 1768 3200 DirectX End-User Runtime.exe 116 PID 3200 wrote to memory of 1768 3200 DirectX End-User Runtime.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\ProgramData\TDMenu.exe"C:\ProgramData\TDMenu.exe"2⤵
- Executes dropped EXE
PID:4840
-
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DirectX End-User Runtime" /tr "C:\ProgramData\DirectX End-User Runtime.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1768
-
-
-
C:\ProgramData\GameBar-Update-Service.exe"C:\ProgramData\GameBar-Update-Service.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:832
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:5156
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Xbox GameBar Update" binpath= "C:\ProgramData\XboxGame\GameBarUpdateService.exe" start= "auto"3⤵
- Launches sc.exe
PID:384
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:2204
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:2004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\ProgramData\GameBar-Update-Service.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:5728
-
-
-
-
C:\ProgramData\XboxGame\GameBarUpdateService.exeC:\ProgramData\XboxGame\GameBarUpdateService.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4672
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:576
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5716
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5276
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD518d86f6b69457eb245764f48643697df
SHA181da90762a99e970874a1c9a0ce60c267c02b18c
SHA25675a6a0ee2e9749380b9c26dedea02ce7cb7d7b140e45ed054868be6f80d56b33
SHA5129e1f2851e3c9e2a32f710521259fa637b20daad431573f941e89fb731143a83d147ff849ecc1c7e3c95a88d708f56aa4ace707ce52789ac40c1cd048ecd119c1
-
Filesize
5.1MB
MD502f3666b4f382f4b9c64ddda3183ab7e
SHA1ef7828f1040da2c09788d56a0205358fcc533065
SHA2562b2653d6ba0add65199560b9315aa06a157d80271b5bcd6a5c7caca7a5e27bb6
SHA5127b70ec1a76c296525310e4f1984b279639ed25e70114d7aa890e76a4c9a6eae14169195247f1613f1c83ace40f62ef29902c54676718a9299b38bd9d85638f75
-
Filesize
1.2MB
MD5443a251e35d62f4ca4aeb3b5350adea9
SHA1edd6c016656e1eb673066cb19f6d0187e4db046f
SHA2568f73d7c48e9bf46f6a31e0a76090ff6b61f5ccc208f9a0f523f7604fcbc7273e
SHA51291b04727b34f73432eac1dadd86d451d794cc72414ea0f864237a782959910a916a9162d9ac7b9bc5575e603480732bd8e7f59015d770a0ab8105476f030bd94
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD5d0a4a3b9a52b8fe3b019f6cd0ef3dad6
SHA1fed70ce7834c3b97edbd078eccda1e5effa527cd
SHA25621942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31
SHA5121a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b
-
Filesize
944B
MD5cef328ddb1ee8916e7a658919323edd8
SHA1a676234d426917535e174f85eabe4ef8b88256a5
SHA256a1b5b7ada8ebc910f20f91ada3991d3321104e9da598c958b1edac9f9aca0e90
SHA512747400c20ca5b5fd1b54bc24e75e6a78f15af61df263be932d2ee7b2f34731c2de8ce03b2706954fb098c1ac36f0b761cf37e418738fa91f2a8ea78572f545cb
-
Filesize
944B
MD5781da0576417bf414dc558e5a315e2be
SHA1215451c1e370be595f1c389f587efeaa93108b4c
SHA25641a5aef8b0bbeea2766f40a7bba2c78322379f167c610f7055ccb69e7db030fe
SHA51224e283aa30a2903ebe154dad49b26067a45e46fec57549ad080d3b9ec3f272044efaaed3822d067837f5521262192f466c47195ffe7f75f8c7c5dcf3159ea737
-
Filesize
944B
MD569416944dac24129d0969e2ac46f0533
SHA1d71969659956b32411e0606a9bee640a0b108ef4
SHA256dffc7e01106427982d7cafd3d7e3be37e16b098fbb0958410ea8d7c68bfb97ca
SHA512aabb330053579af0d9de2661bd70eaadfd2e2e617759bc9c380db1c64731c6711304e49882138e9d337815377ee012a7458f91f692cb31538d73624385867f4c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5e1bc11b4431e4d20a764ceae5159f3c4
SHA10c34c0f1b360caa3a9d5ca118a512523a5e82b3b
SHA256c7f0ecce330d3e41e4cdda8f6c20ff61004e343229f34f4db37ecf01e516c35c
SHA512dd7a7dfa8f115b4664f458d69229d6b4dfeb5252b4e20edf4aed717033fa7588d861abc116d648514bada34cb5f51c5c0a74bd0285e91e3e34e9d195dd216b18