Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2023, 12:07
Static task
static1
General
-
Target
6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe
-
Size
4.2MB
-
MD5
fa5e956ae03f1747e5f7ffcb929f585d
-
SHA1
c0f9272c42f24c20466d58426df5e31226eb03a4
-
SHA256
6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e
-
SHA512
6741261c80fd34d836e8f5d9c7873f671281dfb6f41c7dd3eed2d6d91d912fab2719a6827371e24af8c59ee4da2d09f792a17cebb8125e760e7afad1d40feb32
-
SSDEEP
98304:Z80kK0psugryfHpgVJBY2uakw158j0FecvtH0hA5Njh1bz8ph:THulJgVJBYMkw100FntUhAXLsph
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral1/memory/1512-134-0x0000000002D30000-0x000000000361B000-memory.dmp family_glupteba behavioral1/memory/1512-171-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1512-179-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4468-233-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4468-264-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-317-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-350-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-351-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-352-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-353-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-354-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-355-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-356-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-357-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-358-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-359-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1744-360-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4824 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1744 csrss.exe 860 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe File created C:\Windows\rss\csrss.exe 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1732 1512 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4104 schtasks.exe 3252 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed csrss.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 636 powershell.exe 636 powershell.exe 1512 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 1512 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 824 powershell.exe 824 powershell.exe 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 4796 powershell.exe 4796 powershell.exe 2064 powershell.exe 2064 powershell.exe 5052 powershell.exe 5052 powershell.exe 4092 powershell.exe 4092 powershell.exe 4300 powershell.exe 4300 powershell.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 1744 csrss.exe 1744 csrss.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 1744 csrss.exe 1744 csrss.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe 860 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 636 powershell.exe Token: SeDebugPrivilege 1512 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Token: SeImpersonatePrivilege 1512 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe Token: SeDebugPrivilege 824 powershell.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeDebugPrivilege 2064 powershell.exe Token: SeDebugPrivilege 5052 powershell.exe Token: SeDebugPrivilege 4092 powershell.exe Token: SeDebugPrivilege 4300 powershell.exe Token: SeSystemEnvironmentPrivilege 1744 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1512 wrote to memory of 636 1512 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 84 PID 1512 wrote to memory of 636 1512 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 84 PID 1512 wrote to memory of 636 1512 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 84 PID 4468 wrote to memory of 824 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 96 PID 4468 wrote to memory of 824 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 96 PID 4468 wrote to memory of 824 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 96 PID 4468 wrote to memory of 3860 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 98 PID 4468 wrote to memory of 3860 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 98 PID 3860 wrote to memory of 4824 3860 cmd.exe 100 PID 3860 wrote to memory of 4824 3860 cmd.exe 100 PID 4468 wrote to memory of 4796 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 101 PID 4468 wrote to memory of 4796 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 101 PID 4468 wrote to memory of 4796 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 101 PID 4468 wrote to memory of 2064 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 103 PID 4468 wrote to memory of 2064 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 103 PID 4468 wrote to memory of 2064 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 103 PID 4468 wrote to memory of 1744 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 105 PID 4468 wrote to memory of 1744 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 105 PID 4468 wrote to memory of 1744 4468 6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe 105 PID 1744 wrote to memory of 5052 1744 csrss.exe 107 PID 1744 wrote to memory of 5052 1744 csrss.exe 107 PID 1744 wrote to memory of 5052 1744 csrss.exe 107 PID 1744 wrote to memory of 4092 1744 csrss.exe 113 PID 1744 wrote to memory of 4092 1744 csrss.exe 113 PID 1744 wrote to memory of 4092 1744 csrss.exe 113 PID 1744 wrote to memory of 4300 1744 csrss.exe 115 PID 1744 wrote to memory of 4300 1744 csrss.exe 115 PID 1744 wrote to memory of 4300 1744 csrss.exe 115 PID 1744 wrote to memory of 860 1744 csrss.exe 117 PID 1744 wrote to memory of 860 1744 csrss.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe"C:\Users\Admin\AppData\Local\Temp\6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe"C:\Users\Admin\AppData\Local\Temp\6b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4824
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4104
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4724
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3252
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 9242⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1512 -ip 15121⤵PID:3144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c2ca29becc9a6a5f543f1b0b507d6906
SHA11ebacfe8a7f79a4039f25bbb225f7efb6642dd22
SHA256d63869eb24286d5769f3f7d0033ed54ed045dcc6099084c969ba980db8583ce7
SHA5121d2636d713d99be1d571d7909e49adaf9e2d322af425cea45035aa53e1f0afa2ee594062d955a7e8ae3107cecc2134be8c05e173209129204a342077a0cd8e9d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5540a960472c6d34f9ec2cb4a39c435d6
SHA16b14487a265e0d769221331ccc72c48ae6f09842
SHA256bdfa164ef6f064068af976e6dde41041b1d7d1fabc2e79aa7cdc1389a252c288
SHA5125b4b2ce115d0a088d98af0331e3db387f5f33c0da45c1191142a6bf33904721baf3e98efed99e09b89cf3f7a248a587907eb9e6d082eeb4638465393f554fe08
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58d30c8194586f7a55d4098686a082efe
SHA1f568be5c400c96439a740acf1cab9fce6cc73408
SHA256bfa49b6c30a5b2fb883019b3bd005c5d61485c4c65b915b81bc1174b1e974c79
SHA51233b7e2001dc35941b180472dbcfa6d819281b0afc8b60f26354c4cb06bdc031a82eae11aba9abf185dc98a5a7fe926cf3c1bbfe34db7cdb1658b9d8a073c4fd2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f4f4f8b285678e03271aef1e96bc516d
SHA10924cd6a902ec4dca3c32cc64812b8eaee823054
SHA256b12e02887e4460ae772f950e12fe81e6274cc04913a0308e7f1d571e95ef1e72
SHA512a7ce561f409b9d105343593278eabda7dfb5b3ea38312df73f49da29b6aa1f9d2e563f862b63178dfc35ced3c1c70f6b4592d484b984fd49397e8eed1bb058ed
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58cbed11149d0ca7d3a63f5ab546541f8
SHA1afcfe3742f1f02de6fc3eea325e60db9211d71cf
SHA256e29979273865764ae2e0a4930c8d620feee7a84cb81ac304c078da8243296e1e
SHA51231fbe8652e3d0301fa4e40bd5a3cb3d177d1013dda4eade95a301f8edc2eb47ba6fd138c7a6e4aef481491c356a643995df8667b2f0b449db2851eaae1793d7b
-
Filesize
4.2MB
MD5fa5e956ae03f1747e5f7ffcb929f585d
SHA1c0f9272c42f24c20466d58426df5e31226eb03a4
SHA2566b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e
SHA5126741261c80fd34d836e8f5d9c7873f671281dfb6f41c7dd3eed2d6d91d912fab2719a6827371e24af8c59ee4da2d09f792a17cebb8125e760e7afad1d40feb32
-
Filesize
4.2MB
MD5fa5e956ae03f1747e5f7ffcb929f585d
SHA1c0f9272c42f24c20466d58426df5e31226eb03a4
SHA2566b1bbd84c0e2555a864f24eec342830de6993a5292dbd116870aa46d6cd4f88e
SHA5126741261c80fd34d836e8f5d9c7873f671281dfb6f41c7dd3eed2d6d91d912fab2719a6827371e24af8c59ee4da2d09f792a17cebb8125e760e7afad1d40feb32