Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
28/05/2023, 20:11
Static task
static1
General
-
Target
f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe
-
Size
4.2MB
-
MD5
6145c4a854c7cb096f718fcfed3661b1
-
SHA1
587ea31107da8e6ff3eb9ff46154148e4a76bb31
-
SHA256
f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37
-
SHA512
d6a105a232132bff67b9bfc7d74d7d947fec044d78ab549a07b2e4b423ccbb59f964794a7dc8603f815b91409a15948d5161a5250d338ab38c16f4de5c6f7809
-
SSDEEP
98304:ewE1QZDOvttQeixPv/OzaV7KVjP9D+85PnLMGOy15oxuUz/hm4OS5I:G02TQeixPHB74j16QzH1ipzJ55I
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral1/memory/3680-118-0x0000000003020000-0x000000000390B000-memory.dmp family_glupteba behavioral1/memory/3680-271-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3680-412-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2188-682-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2188-1146-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1455-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1885-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1886-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1887-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1888-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1889-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1890-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1891-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1892-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1893-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1200-1894-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5032 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1200 csrss.exe 3908 injector.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe File created C:\Windows\rss\csrss.exe f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3340 schtasks.exe 4432 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4392 powershell.exe 4392 powershell.exe 4392 powershell.exe 3680 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 3680 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 1612 powershell.exe 1612 powershell.exe 1612 powershell.exe 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 5024 powershell.exe 5024 powershell.exe 5024 powershell.exe 3936 powershell.exe 3936 powershell.exe 3936 powershell.exe 3160 powershell.exe 3160 powershell.exe 3160 powershell.exe 4996 powershell.exe 4996 powershell.exe 4996 powershell.exe 3744 powershell.exe 3744 powershell.exe 3744 powershell.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 1200 csrss.exe 1200 csrss.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 1200 csrss.exe 1200 csrss.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe 3908 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4392 powershell.exe Token: SeDebugPrivilege 3680 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Token: SeImpersonatePrivilege 3680 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeDebugPrivilege 3936 powershell.exe Token: SeDebugPrivilege 3160 powershell.exe Token: SeDebugPrivilege 4996 powershell.exe Token: SeDebugPrivilege 3744 powershell.exe Token: SeSystemEnvironmentPrivilege 1200 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4392 3680 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 67 PID 3680 wrote to memory of 4392 3680 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 67 PID 3680 wrote to memory of 4392 3680 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 67 PID 2188 wrote to memory of 1612 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 73 PID 2188 wrote to memory of 1612 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 73 PID 2188 wrote to memory of 1612 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 73 PID 2188 wrote to memory of 4836 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 74 PID 2188 wrote to memory of 4836 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 74 PID 4836 wrote to memory of 5032 4836 cmd.exe 76 PID 4836 wrote to memory of 5032 4836 cmd.exe 76 PID 2188 wrote to memory of 5024 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 77 PID 2188 wrote to memory of 5024 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 77 PID 2188 wrote to memory of 5024 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 77 PID 2188 wrote to memory of 3936 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 79 PID 2188 wrote to memory of 3936 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 79 PID 2188 wrote to memory of 3936 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 79 PID 2188 wrote to memory of 1200 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 81 PID 2188 wrote to memory of 1200 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 81 PID 2188 wrote to memory of 1200 2188 f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe 81 PID 1200 wrote to memory of 3160 1200 csrss.exe 82 PID 1200 wrote to memory of 3160 1200 csrss.exe 82 PID 1200 wrote to memory of 3160 1200 csrss.exe 82 PID 1200 wrote to memory of 4996 1200 csrss.exe 89 PID 1200 wrote to memory of 4996 1200 csrss.exe 89 PID 1200 wrote to memory of 4996 1200 csrss.exe 89 PID 1200 wrote to memory of 3744 1200 csrss.exe 91 PID 1200 wrote to memory of 3744 1200 csrss.exe 91 PID 1200 wrote to memory of 3744 1200 csrss.exe 91 PID 1200 wrote to memory of 3908 1200 csrss.exe 93 PID 1200 wrote to memory of 3908 1200 csrss.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe"C:\Users\Admin\AppData\Local\Temp\f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe"C:\Users\Admin\AppData\Local\Temp\f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:5032
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3340
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3212
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4432
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5cbd955b0e2d1859e6e4785d94182f6d1
SHA1ed6094841f826441baec955a6ea074fa77c1bb0a
SHA256a11dfe7ab634890b6898f2f5d3e4c19a84d56244c3d3ed7a5451ba09df15d6d2
SHA512d977e396e23b25a5f52d5faabe3aa6fad37cb687ac6f6e4dbd7e979e2606c7b9cdd531489baf72cb6b241952ebebc2f1b46fcb4491bdcd270e07a4f6ce709fef
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD57a4a92237caf947c2fb185904e6746b8
SHA1554d5842f882687471ca3568961fc6092176a99d
SHA2560cab9a7ec7ac6980e19c0de8b0a57fffec78cacaaecf10536333cee3c4e1f81b
SHA5128abc920591793d29d1f97ee9265aed01d19877fb4d42c92e346f256d0e9ba820baae4782d87536d517d527cbc3cb38ae09a4dc8f7f527f652efedafd3d210bb1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD516d686166d0bd08006baf1a45db1a6de
SHA1dc2f42704c2465521221764279ac0b785c2d71ec
SHA2567706b7f3ab61f69e095ca0d03019b1e54f813bb690cdf467ba47faa84112f29a
SHA512d3f2fed7e740afe6cabfcf1d41369a41f3756511193a33594a25c5d7333ef024a6a5ca42a081f059d03e2cc2dfd6547b8d28ac7dacdaaadabaff574f4aacfab6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5e8934bac5a8059c2c0d05d09aa066c83
SHA193d798ad0b66643bd6941911dc2d13a05e4cc504
SHA256f0e1c7eabe1a9c16835fc22d66aaccb43cd83ae2a20293a235a6ec63c324cf03
SHA5121b9b75fa0af58f8798bad0a26016bd30e93ed531a2358f7a21b5095b5e04b6371cb132bd10fd822f610a2c60bb9c0357ef595a00cbb6429cbb03b6726234dd14
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a598cbe518c27777b371cd354b312491
SHA12c937f7d156c0b1eb42d496e54ece47699954b57
SHA256e89dc169a64a1d5cc23d5e5191dbea84fbedd6be08dabf67824e11131bc7cdfd
SHA5120ce37649aaa2d7b73f5952f61d9a302cf344f7195cfaff8c28f6c9aedaef8d81cc68bde7f8af6e92975020ab8d9b1299c7f6d35da648fca741a5fb95586a3665
-
Filesize
4.2MB
MD56145c4a854c7cb096f718fcfed3661b1
SHA1587ea31107da8e6ff3eb9ff46154148e4a76bb31
SHA256f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37
SHA512d6a105a232132bff67b9bfc7d74d7d947fec044d78ab549a07b2e4b423ccbb59f964794a7dc8603f815b91409a15948d5161a5250d338ab38c16f4de5c6f7809
-
Filesize
4.2MB
MD56145c4a854c7cb096f718fcfed3661b1
SHA1587ea31107da8e6ff3eb9ff46154148e4a76bb31
SHA256f24bb741546d91451260327453939743066d9f7ced343704ea2ea1b893fb4f37
SHA512d6a105a232132bff67b9bfc7d74d7d947fec044d78ab549a07b2e4b423ccbb59f964794a7dc8603f815b91409a15948d5161a5250d338ab38c16f4de5c6f7809