Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/01/2025, 15:50
250122-s99tasvlcp 1022/01/2025, 15:46
250122-s7peksvkbr 1022/01/2025, 15:45
250122-s7aanatkgx 1022/01/2025, 14:49
250122-r7c6wa1ncx 10Analysis
-
max time kernel
65s -
max time network
66s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22/01/2025, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
TDMenu_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
TDMenu_x64.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
TDMenu_x64.exe
-
Size
6.4MB
-
MD5
3f9d8993daa6e07221f9a12eaa011ca6
-
SHA1
a33290d94fb3bba06337b7b847d971b1a8fd6110
-
SHA256
109bf7761442498abd03f972c2b315b6ea8727a79ed35e7e75a90e6d1e4b7f79
-
SHA512
ffb917e3a01e72b5cec0c8ff41328bac3840c6be0dcb05a58513a3f77a32c2280fc6881109725ba931b31809fbb0abb83bdacd9ec8022ea8a49d6476ca2177c0
-
SSDEEP
98304:S/STPMYacPcyyc7Ht40MV+9eN+jCxf8/kbqEVgUmSr7CqnfMwd+mJbKc1rm7cNAH:S9xcPj9Hy0MWGxk/kWEu72t+mKlPDT
Malware Config
Extracted
xworm
23.27.201.57:7000
-
Install_directory
%ProgramData%
-
install_file
DirectX End-User Runtime.exe
Extracted
redline
godseye3-01-25
23.27.201.57:62529
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x00280000000461a0-15.dat family_xworm behavioral2/memory/1372-33-0x00000000009F0000-0x0000000000A0A000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1372-155-0x000000001B5E0000-0x000000001B5FE000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/1372-155-0x000000001B5E0000-0x000000001B5FE000-memory.dmp family_sectoprat -
Sectoprat family
-
Xmrig family
-
Xworm family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/4640-100-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4640-103-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4640-102-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4640-106-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4640-105-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4640-104-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4640-99-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4640-158-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/4640-159-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2544 powershell.exe 5072 powershell.exe 4632 powershell.exe 3176 powershell.exe 1204 powershell.exe 2964 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts GameBarUpdateService.exe File created C:\Windows\system32\drivers\etc\hosts GameBar-Update-Service.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1581648047-808845429-2272123689-1000\Control Panel\International\Geo\Nation TDMenu_x64.exe Key value queried \REGISTRY\USER\S-1-5-21-1581648047-808845429-2272123689-1000\Control Panel\International\Geo\Nation DirectX End-User Runtime.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe -
Executes dropped EXE 4 IoCs
pid Process 4100 TDMenu.exe 1372 DirectX End-User Runtime.exe 2508 GameBar-Update-Service.exe 2204 GameBarUpdateService.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1581648047-808845429-2272123689-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DirectX End-User Runtime = "C:\\ProgramData\\DirectX End-User Runtime.exe" DirectX End-User Runtime.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe GameBarUpdateService.exe File opened for modification C:\Windows\system32\MRT.exe GameBar-Update-Service.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2204 set thread context of 1616 2204 GameBarUpdateService.exe 114 PID 2204 set thread context of 4640 2204 GameBarUpdateService.exe 116 -
resource yara_rule behavioral2/memory/4640-98-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-95-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-94-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-100-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-103-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-102-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-106-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-105-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-104-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-99-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-97-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-96-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-158-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/4640-159-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3784 sc.exe 1960 sc.exe 1868 sc.exe 1140 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2944 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 GameBar-Update-Service.exe 1204 powershell.exe 1204 powershell.exe 2508 GameBar-Update-Service.exe 2508 GameBar-Update-Service.exe 2508 GameBar-Update-Service.exe 2508 GameBar-Update-Service.exe 2508 GameBar-Update-Service.exe 2508 GameBar-Update-Service.exe 2204 GameBarUpdateService.exe 2964 powershell.exe 2964 powershell.exe 2204 GameBarUpdateService.exe 2204 GameBarUpdateService.exe 2204 GameBarUpdateService.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 2544 powershell.exe 2544 powershell.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 5072 powershell.exe 5072 powershell.exe 4640 explorer.exe 4640 explorer.exe 4632 powershell.exe 4632 powershell.exe 4640 explorer.exe 4640 explorer.exe 3176 powershell.exe 3176 powershell.exe 4640 explorer.exe 4640 explorer.exe 1372 DirectX End-User Runtime.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe 4640 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1372 DirectX End-User Runtime.exe Token: SeDebugPrivilege 1204 powershell.exe Token: SeIncreaseQuotaPrivilege 1204 powershell.exe Token: SeSecurityPrivilege 1204 powershell.exe Token: SeTakeOwnershipPrivilege 1204 powershell.exe Token: SeLoadDriverPrivilege 1204 powershell.exe Token: SeSystemProfilePrivilege 1204 powershell.exe Token: SeSystemtimePrivilege 1204 powershell.exe Token: SeProfSingleProcessPrivilege 1204 powershell.exe Token: SeIncBasePriorityPrivilege 1204 powershell.exe Token: SeCreatePagefilePrivilege 1204 powershell.exe Token: SeBackupPrivilege 1204 powershell.exe Token: SeRestorePrivilege 1204 powershell.exe Token: SeShutdownPrivilege 1204 powershell.exe Token: SeDebugPrivilege 1204 powershell.exe Token: SeSystemEnvironmentPrivilege 1204 powershell.exe Token: SeRemoteShutdownPrivilege 1204 powershell.exe Token: SeUndockPrivilege 1204 powershell.exe Token: SeManageVolumePrivilege 1204 powershell.exe Token: 33 1204 powershell.exe Token: 34 1204 powershell.exe Token: 35 1204 powershell.exe Token: 36 1204 powershell.exe Token: SeDebugPrivilege 2964 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2964 powershell.exe Token: SeIncreaseQuotaPrivilege 2964 powershell.exe Token: SeSecurityPrivilege 2964 powershell.exe Token: SeTakeOwnershipPrivilege 2964 powershell.exe Token: SeLoadDriverPrivilege 2964 powershell.exe Token: SeSystemtimePrivilege 2964 powershell.exe Token: SeBackupPrivilege 2964 powershell.exe Token: SeRestorePrivilege 2964 powershell.exe Token: SeShutdownPrivilege 2964 powershell.exe Token: SeSystemEnvironmentPrivilege 2964 powershell.exe Token: SeUndockPrivilege 2964 powershell.exe Token: SeManageVolumePrivilege 2964 powershell.exe Token: SeLockMemoryPrivilege 4640 explorer.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeIncreaseQuotaPrivilege 2544 powershell.exe Token: SeSecurityPrivilege 2544 powershell.exe Token: SeTakeOwnershipPrivilege 2544 powershell.exe Token: SeLoadDriverPrivilege 2544 powershell.exe Token: SeSystemProfilePrivilege 2544 powershell.exe Token: SeSystemtimePrivilege 2544 powershell.exe Token: SeProfSingleProcessPrivilege 2544 powershell.exe Token: SeIncBasePriorityPrivilege 2544 powershell.exe Token: SeCreatePagefilePrivilege 2544 powershell.exe Token: SeBackupPrivilege 2544 powershell.exe Token: SeRestorePrivilege 2544 powershell.exe Token: SeShutdownPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeSystemEnvironmentPrivilege 2544 powershell.exe Token: SeRemoteShutdownPrivilege 2544 powershell.exe Token: SeUndockPrivilege 2544 powershell.exe Token: SeManageVolumePrivilege 2544 powershell.exe Token: 33 2544 powershell.exe Token: 34 2544 powershell.exe Token: 35 2544 powershell.exe Token: 36 2544 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeIncreaseQuotaPrivilege 5072 powershell.exe Token: SeSecurityPrivilege 5072 powershell.exe Token: SeTakeOwnershipPrivilege 5072 powershell.exe Token: SeLoadDriverPrivilege 5072 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1372 DirectX End-User Runtime.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2876 wrote to memory of 4100 2876 TDMenu_x64.exe 81 PID 2876 wrote to memory of 4100 2876 TDMenu_x64.exe 81 PID 2876 wrote to memory of 1372 2876 TDMenu_x64.exe 83 PID 2876 wrote to memory of 1372 2876 TDMenu_x64.exe 83 PID 2876 wrote to memory of 2508 2876 TDMenu_x64.exe 84 PID 2876 wrote to memory of 2508 2876 TDMenu_x64.exe 84 PID 872 wrote to memory of 1816 872 cmd.exe 102 PID 872 wrote to memory of 1816 872 cmd.exe 102 PID 4280 wrote to memory of 3504 4280 cmd.exe 109 PID 4280 wrote to memory of 3504 4280 cmd.exe 109 PID 2204 wrote to memory of 1616 2204 GameBarUpdateService.exe 114 PID 2204 wrote to memory of 1616 2204 GameBarUpdateService.exe 114 PID 2204 wrote to memory of 1616 2204 GameBarUpdateService.exe 114 PID 2204 wrote to memory of 1616 2204 GameBarUpdateService.exe 114 PID 2204 wrote to memory of 1616 2204 GameBarUpdateService.exe 114 PID 2204 wrote to memory of 1616 2204 GameBarUpdateService.exe 114 PID 2204 wrote to memory of 1616 2204 GameBarUpdateService.exe 114 PID 2204 wrote to memory of 1616 2204 GameBarUpdateService.exe 114 PID 2204 wrote to memory of 1616 2204 GameBarUpdateService.exe 114 PID 2204 wrote to memory of 4640 2204 GameBarUpdateService.exe 116 PID 2204 wrote to memory of 4640 2204 GameBarUpdateService.exe 116 PID 2204 wrote to memory of 4640 2204 GameBarUpdateService.exe 116 PID 2204 wrote to memory of 4640 2204 GameBarUpdateService.exe 116 PID 2204 wrote to memory of 4640 2204 GameBarUpdateService.exe 116 PID 4692 wrote to memory of 3764 4692 cmd.exe 117 PID 4692 wrote to memory of 3764 4692 cmd.exe 117 PID 1372 wrote to memory of 2544 1372 DirectX End-User Runtime.exe 118 PID 1372 wrote to memory of 2544 1372 DirectX End-User Runtime.exe 118 PID 1372 wrote to memory of 5072 1372 DirectX End-User Runtime.exe 120 PID 1372 wrote to memory of 5072 1372 DirectX End-User Runtime.exe 120 PID 1372 wrote to memory of 4632 1372 DirectX End-User Runtime.exe 122 PID 1372 wrote to memory of 4632 1372 DirectX End-User Runtime.exe 122 PID 1372 wrote to memory of 3176 1372 DirectX End-User Runtime.exe 124 PID 1372 wrote to memory of 3176 1372 DirectX End-User Runtime.exe 124 PID 1372 wrote to memory of 2944 1372 DirectX End-User Runtime.exe 126 PID 1372 wrote to memory of 2944 1372 DirectX End-User Runtime.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\ProgramData\TDMenu.exe"C:\ProgramData\TDMenu.exe"2⤵
- Executes dropped EXE
PID:4100
-
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DirectX End-User Runtime" /tr "C:\ProgramData\DirectX End-User Runtime.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2944
-
-
-
C:\ProgramData\GameBar-Update-Service.exe"C:\ProgramData\GameBar-Update-Service.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1816
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:1140
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Xbox GameBar Update" binpath= "C:\ProgramData\XboxGame\GameBarUpdateService.exe" start= "auto"3⤵
- Launches sc.exe
PID:3784
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:1960
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:1868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\ProgramData\GameBar-Update-Service.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:3504
-
-
-
-
C:\ProgramData\XboxGame\GameBarUpdateService.exeC:\ProgramData\XboxGame\GameBarUpdateService.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:3764
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1616
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD518d86f6b69457eb245764f48643697df
SHA181da90762a99e970874a1c9a0ce60c267c02b18c
SHA25675a6a0ee2e9749380b9c26dedea02ce7cb7d7b140e45ed054868be6f80d56b33
SHA5129e1f2851e3c9e2a32f710521259fa637b20daad431573f941e89fb731143a83d147ff849ecc1c7e3c95a88d708f56aa4ace707ce52789ac40c1cd048ecd119c1
-
Filesize
5.1MB
MD502f3666b4f382f4b9c64ddda3183ab7e
SHA1ef7828f1040da2c09788d56a0205358fcc533065
SHA2562b2653d6ba0add65199560b9315aa06a157d80271b5bcd6a5c7caca7a5e27bb6
SHA5127b70ec1a76c296525310e4f1984b279639ed25e70114d7aa890e76a4c9a6eae14169195247f1613f1c83ace40f62ef29902c54676718a9299b38bd9d85638f75
-
Filesize
1.2MB
MD5443a251e35d62f4ca4aeb3b5350adea9
SHA1edd6c016656e1eb673066cb19f6d0187e4db046f
SHA2568f73d7c48e9bf46f6a31e0a76090ff6b61f5ccc208f9a0f523f7604fcbc7273e
SHA51291b04727b34f73432eac1dadd86d451d794cc72414ea0f864237a782959910a916a9162d9ac7b9bc5575e603480732bd8e7f59015d770a0ab8105476f030bd94
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5d6d1b8bb34838ccf42d5f69e919b1612
SHA120e9df1f5dd5908ce1b537d158961e0b1674949e
SHA2568a4e7eae00df2e789c958a38e78ac0b53f439afe2d5bfe8a81fb8c6e232b6491
SHA512ff3ba5dc3cb548018747a315f098e01c5a6f8aee029223ef4080b3db76b0ecaa6a01a1c79e1434bdf2aa5b2ae66ec85d33e760064282411c7712fba890a0309d
-
Filesize
1KB
MD598cbd734a71723f7d320eaecdda5afef
SHA118d8c69cc4e6f0c4bce11a8270ec689beaa2dd9d
SHA256228c2df15c324c26adea7128a712241e14cb2142d4c1c84c3f39f7b373beaef8
SHA512f1b0966f0bb33bb2d3ef7ab077014eb77798c51e4602c9ecc998692c35ccd45835ff0395c7e6e35a9307d679ff5bb598d64f8403b57d6d252837aaa201d05430
-
Filesize
1KB
MD5860b6a25e4b29f37d34502a3a1a41ab9
SHA1bd6a3df843c83d1654ad99f749ea53fd3c0498b7
SHA256e4e6c182d7f03de2859fd8f1dca9bdafc129aff10aea0fdab2838987366f1a7c
SHA5125582b8b44ae8c258731185f2a18d21d5796c6d9830b4d508a6504a0fc0a21914650a87876276fc3fe301bf1fb238b57d7d8e1134f93c124883ba54c779786548
-
Filesize
1KB
MD515ed72e7a326eff117a6be509ba8e355
SHA1723e65c24f43b093ac337094eab829a0712b91ee
SHA25621a002d18a78e6b727b70644b118cbca43fedaf770c32f2a635ac93a1d21bd82
SHA5126602c9907dd75cc8569a395535220a858baa7d942192eef8691ac83caae617d5ef8c5a5df9e7ae6b4912fd547e0ba9875afe6161f991471ce11893b98a8420c7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5e1bc11b4431e4d20a764ceae5159f3c4
SHA10c34c0f1b360caa3a9d5ca118a512523a5e82b3b
SHA256c7f0ecce330d3e41e4cdda8f6c20ff61004e343229f34f4db37ecf01e516c35c
SHA512dd7a7dfa8f115b4664f458d69229d6b4dfeb5252b4e20edf4aed717033fa7588d861abc116d648514bada34cb5f51c5c0a74bd0285e91e3e34e9d195dd216b18