Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 15:47
Static task
static1
Behavioral task
behavioral1
Sample
TDMenu_x64.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
TDMenu_x64.exe
Resource
win10v2004-20241007-en
General
-
Target
TDMenu_x64.exe
-
Size
6.4MB
-
MD5
3f9d8993daa6e07221f9a12eaa011ca6
-
SHA1
a33290d94fb3bba06337b7b847d971b1a8fd6110
-
SHA256
109bf7761442498abd03f972c2b315b6ea8727a79ed35e7e75a90e6d1e4b7f79
-
SHA512
ffb917e3a01e72b5cec0c8ff41328bac3840c6be0dcb05a58513a3f77a32c2280fc6881109725ba931b31809fbb0abb83bdacd9ec8022ea8a49d6476ca2177c0
-
SSDEEP
98304:S/STPMYacPcyyc7Ht40MV+9eN+jCxf8/kbqEVgUmSr7CqnfMwd+mJbKc1rm7cNAH:S9xcPj9Hy0MWGxk/kWEu72t+mKlPDT
Malware Config
Extracted
xworm
23.27.201.57:7000
-
Install_directory
%ProgramData%
-
install_file
DirectX End-User Runtime.exe
Extracted
redline
godseye3-01-25
23.27.201.57:62529
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0031000000023b75-13.dat family_xworm behavioral2/memory/2208-20-0x0000000000F10000-0x0000000000F2A000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2208-152-0x000000001DC80000-0x000000001DC9E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/2208-152-0x000000001DC80000-0x000000001DC9E000-memory.dmp family_sectoprat -
Sectoprat family
-
Xmrig family
-
Xworm family
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/1532-97-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1532-96-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1532-100-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1532-101-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1532-102-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1532-99-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1532-103-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1532-155-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/1532-156-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2092 powershell.exe 4624 powershell.exe 928 powershell.exe 4644 powershell.exe 452 powershell.exe 4840 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts GameBar-Update-Service.exe File created C:\Windows\system32\drivers\etc\hosts GameBarUpdateService.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation TDMenu_x64.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation DirectX End-User Runtime.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe -
Executes dropped EXE 6 IoCs
pid Process 3688 TDMenu.exe 2208 DirectX End-User Runtime.exe 3620 GameBar-Update-Service.exe 1828 GameBarUpdateService.exe 2044 DirectX End-User Runtime.exe 2336 DirectX End-User Runtime.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DirectX End-User Runtime = "C:\\ProgramData\\DirectX End-User Runtime.exe" DirectX End-User Runtime.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe GameBarUpdateService.exe File opened for modification C:\Windows\system32\MRT.exe GameBar-Update-Service.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1828 set thread context of 3596 1828 GameBarUpdateService.exe 106 PID 1828 set thread context of 1532 1828 GameBarUpdateService.exe 107 -
resource yara_rule behavioral2/memory/1532-91-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-92-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-93-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-94-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-97-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-96-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-95-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-100-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-101-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-102-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-99-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-103-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-155-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/1532-156-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4924 sc.exe 4304 sc.exe 5072 sc.exe 820 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2388 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3620 GameBar-Update-Service.exe 2092 powershell.exe 2092 powershell.exe 3620 GameBar-Update-Service.exe 3620 GameBar-Update-Service.exe 3620 GameBar-Update-Service.exe 3620 GameBar-Update-Service.exe 3620 GameBar-Update-Service.exe 3620 GameBar-Update-Service.exe 1828 GameBarUpdateService.exe 4624 powershell.exe 4624 powershell.exe 1828 GameBarUpdateService.exe 1828 GameBarUpdateService.exe 1828 GameBarUpdateService.exe 1532 explorer.exe 1532 explorer.exe 928 powershell.exe 928 powershell.exe 4644 powershell.exe 4644 powershell.exe 1532 explorer.exe 1532 explorer.exe 452 powershell.exe 452 powershell.exe 1532 explorer.exe 1532 explorer.exe 4840 powershell.exe 4840 powershell.exe 1532 explorer.exe 1532 explorer.exe 2208 DirectX End-User Runtime.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe 1532 explorer.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2208 DirectX End-User Runtime.exe Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 4624 powershell.exe Token: SeLockMemoryPrivilege 1532 explorer.exe Token: SeDebugPrivilege 928 powershell.exe Token: SeDebugPrivilege 4644 powershell.exe Token: SeDebugPrivilege 452 powershell.exe Token: SeDebugPrivilege 4840 powershell.exe Token: SeDebugPrivilege 2208 DirectX End-User Runtime.exe Token: SeDebugPrivilege 2044 DirectX End-User Runtime.exe Token: SeDebugPrivilege 2336 DirectX End-User Runtime.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 DirectX End-User Runtime.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3688 3992 TDMenu_x64.exe 82 PID 3992 wrote to memory of 3688 3992 TDMenu_x64.exe 82 PID 3992 wrote to memory of 2208 3992 TDMenu_x64.exe 84 PID 3992 wrote to memory of 2208 3992 TDMenu_x64.exe 84 PID 3992 wrote to memory of 3620 3992 TDMenu_x64.exe 85 PID 3992 wrote to memory of 3620 3992 TDMenu_x64.exe 85 PID 5080 wrote to memory of 4184 5080 cmd.exe 94 PID 5080 wrote to memory of 4184 5080 cmd.exe 94 PID 4772 wrote to memory of 3760 4772 cmd.exe 102 PID 4772 wrote to memory of 3760 4772 cmd.exe 102 PID 1828 wrote to memory of 3596 1828 GameBarUpdateService.exe 106 PID 1828 wrote to memory of 3596 1828 GameBarUpdateService.exe 106 PID 1828 wrote to memory of 3596 1828 GameBarUpdateService.exe 106 PID 1828 wrote to memory of 3596 1828 GameBarUpdateService.exe 106 PID 1828 wrote to memory of 3596 1828 GameBarUpdateService.exe 106 PID 1828 wrote to memory of 3596 1828 GameBarUpdateService.exe 106 PID 1828 wrote to memory of 3596 1828 GameBarUpdateService.exe 106 PID 1828 wrote to memory of 3596 1828 GameBarUpdateService.exe 106 PID 1828 wrote to memory of 3596 1828 GameBarUpdateService.exe 106 PID 1828 wrote to memory of 1532 1828 GameBarUpdateService.exe 107 PID 1828 wrote to memory of 1532 1828 GameBarUpdateService.exe 107 PID 1828 wrote to memory of 1532 1828 GameBarUpdateService.exe 107 PID 1828 wrote to memory of 1532 1828 GameBarUpdateService.exe 107 PID 1828 wrote to memory of 1532 1828 GameBarUpdateService.exe 107 PID 4932 wrote to memory of 3988 4932 cmd.exe 109 PID 4932 wrote to memory of 3988 4932 cmd.exe 109 PID 2208 wrote to memory of 928 2208 DirectX End-User Runtime.exe 113 PID 2208 wrote to memory of 928 2208 DirectX End-User Runtime.exe 113 PID 2208 wrote to memory of 4644 2208 DirectX End-User Runtime.exe 115 PID 2208 wrote to memory of 4644 2208 DirectX End-User Runtime.exe 115 PID 2208 wrote to memory of 452 2208 DirectX End-User Runtime.exe 118 PID 2208 wrote to memory of 452 2208 DirectX End-User Runtime.exe 118 PID 2208 wrote to memory of 4840 2208 DirectX End-User Runtime.exe 120 PID 2208 wrote to memory of 4840 2208 DirectX End-User Runtime.exe 120 PID 2208 wrote to memory of 2388 2208 DirectX End-User Runtime.exe 122 PID 2208 wrote to memory of 2388 2208 DirectX End-User Runtime.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\ProgramData\TDMenu.exe"C:\ProgramData\TDMenu.exe"2⤵
- Executes dropped EXE
PID:3688
-
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DirectX End-User Runtime" /tr "C:\ProgramData\DirectX End-User Runtime.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2388
-
-
-
C:\ProgramData\GameBar-Update-Service.exe"C:\ProgramData\GameBar-Update-Service.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3620 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:4184
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:4924
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Xbox GameBar Update" binpath= "C:\ProgramData\XboxGame\GameBarUpdateService.exe" start= "auto"3⤵
- Launches sc.exe
PID:4304
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:5072
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\ProgramData\GameBar-Update-Service.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:3760
-
-
-
-
C:\ProgramData\XboxGame\GameBarUpdateService.exeC:\ProgramData\XboxGame\GameBarUpdateService.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:3988
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3596
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2336
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD518d86f6b69457eb245764f48643697df
SHA181da90762a99e970874a1c9a0ce60c267c02b18c
SHA25675a6a0ee2e9749380b9c26dedea02ce7cb7d7b140e45ed054868be6f80d56b33
SHA5129e1f2851e3c9e2a32f710521259fa637b20daad431573f941e89fb731143a83d147ff849ecc1c7e3c95a88d708f56aa4ace707ce52789ac40c1cd048ecd119c1
-
Filesize
5.1MB
MD502f3666b4f382f4b9c64ddda3183ab7e
SHA1ef7828f1040da2c09788d56a0205358fcc533065
SHA2562b2653d6ba0add65199560b9315aa06a157d80271b5bcd6a5c7caca7a5e27bb6
SHA5127b70ec1a76c296525310e4f1984b279639ed25e70114d7aa890e76a4c9a6eae14169195247f1613f1c83ace40f62ef29902c54676718a9299b38bd9d85638f75
-
Filesize
1.2MB
MD5443a251e35d62f4ca4aeb3b5350adea9
SHA1edd6c016656e1eb673066cb19f6d0187e4db046f
SHA2568f73d7c48e9bf46f6a31e0a76090ff6b61f5ccc208f9a0f523f7604fcbc7273e
SHA51291b04727b34f73432eac1dadd86d451d794cc72414ea0f864237a782959910a916a9162d9ac7b9bc5575e603480732bd8e7f59015d770a0ab8105476f030bd94
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD5ba169f4dcbbf147fe78ef0061a95e83b
SHA192a571a6eef49fff666e0f62a3545bcd1cdcda67
SHA2565ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1
SHA5128d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c
-
Filesize
944B
MD56b62626c9199f4688488fc54a3c44277
SHA12ad24e90c73e200c49eab2a74bf93b2c4e357686
SHA2562c4d975787bde30963988a0a87f0b02e10c695ea795896f640169491a52884b8
SHA512d8856a30fe27a90d4366850313fe1f8ff61733df37e0cc49d15e3b51336d1a786f25813f90e90e894fbe4fba6352a57523f7fd0a9724f4b075a511686777459a
-
Filesize
944B
MD510890cda4b6eab618e926c4118ab0647
SHA11e1d63b73a0e6c7575f458b3c7917a9ce5ba776d
SHA25600f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14
SHA512a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5e1bc11b4431e4d20a764ceae5159f3c4
SHA10c34c0f1b360caa3a9d5ca118a512523a5e82b3b
SHA256c7f0ecce330d3e41e4cdda8f6c20ff61004e343229f34f4db37ecf01e516c35c
SHA512dd7a7dfa8f115b4664f458d69229d6b4dfeb5252b4e20edf4aed717033fa7588d861abc116d648514bada34cb5f51c5c0a74bd0285e91e3e34e9d195dd216b18