Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2023, 19:38
Static task
static1
General
-
Target
d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe
-
Size
4.2MB
-
MD5
b2393609deb4119903537e58339d743e
-
SHA1
162fd16b9d2f0892f7f5f4d2f30835ee4647e4f0
-
SHA256
d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61
-
SHA512
1176cf631de41b8adfc51647291b77f307dd451189f0297ab977cc34ea67185e7ea5e386bab19f1fbca43a0f949da80a5688ba690c905a8155b491c82b03a3f1
-
SSDEEP
98304:TuTcGkGclvNOD2hP0ZZ/cfYxJETx2j8jgtzyxAEoBfKrJybx:TGclYU0ng09tzMA1BfKgx
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral1/memory/4224-134-0x0000000002E10000-0x00000000036FB000-memory.dmp family_glupteba behavioral1/memory/4224-173-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4224-179-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2400-232-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2400-264-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-316-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-350-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-351-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-352-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-353-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-354-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-355-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-356-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-357-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-358-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2908-359-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2872 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2908 csrss.exe 4576 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe File created C:\Windows\rss\csrss.exe d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1556 4224 WerFault.exe 82 4864 2400 WerFault.exe 90 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1068 schtasks.exe 2244 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4788 powershell.exe 4788 powershell.exe 4224 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 4224 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2072 powershell.exe 2072 powershell.exe 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 2848 powershell.exe 2848 powershell.exe 1468 powershell.exe 1468 powershell.exe 3028 powershell.exe 3028 powershell.exe 1520 powershell.exe 1520 powershell.exe 1180 powershell.exe 1180 powershell.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 2908 csrss.exe 2908 csrss.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 2908 csrss.exe 2908 csrss.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe 4576 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4788 powershell.exe Token: SeDebugPrivilege 4224 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Token: SeImpersonatePrivilege 4224 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 1468 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 1520 powershell.exe Token: SeDebugPrivilege 1180 powershell.exe Token: SeSystemEnvironmentPrivilege 2908 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4788 4224 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 83 PID 4224 wrote to memory of 4788 4224 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 83 PID 4224 wrote to memory of 4788 4224 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 83 PID 2400 wrote to memory of 2072 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 93 PID 2400 wrote to memory of 2072 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 93 PID 2400 wrote to memory of 2072 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 93 PID 2400 wrote to memory of 1168 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 97 PID 2400 wrote to memory of 1168 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 97 PID 1168 wrote to memory of 2872 1168 cmd.exe 99 PID 1168 wrote to memory of 2872 1168 cmd.exe 99 PID 2400 wrote to memory of 2848 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 100 PID 2400 wrote to memory of 2848 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 100 PID 2400 wrote to memory of 2848 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 100 PID 2400 wrote to memory of 1468 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 102 PID 2400 wrote to memory of 1468 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 102 PID 2400 wrote to memory of 1468 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 102 PID 2400 wrote to memory of 2908 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 105 PID 2400 wrote to memory of 2908 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 105 PID 2400 wrote to memory of 2908 2400 d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe 105 PID 2908 wrote to memory of 3028 2908 csrss.exe 108 PID 2908 wrote to memory of 3028 2908 csrss.exe 108 PID 2908 wrote to memory of 3028 2908 csrss.exe 108 PID 2908 wrote to memory of 1520 2908 csrss.exe 114 PID 2908 wrote to memory of 1520 2908 csrss.exe 114 PID 2908 wrote to memory of 1520 2908 csrss.exe 114 PID 2908 wrote to memory of 1180 2908 csrss.exe 116 PID 2908 wrote to memory of 1180 2908 csrss.exe 116 PID 2908 wrote to memory of 1180 2908 csrss.exe 116 PID 2908 wrote to memory of 4576 2908 csrss.exe 118 PID 2908 wrote to memory of 4576 2908 csrss.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe"C:\Users\Admin\AppData\Local\Temp\d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe"C:\Users\Admin\AppData\Local\Temp\d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2872
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1068
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1280
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 7443⤵
- Program crash
PID:4864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 8642⤵
- Program crash
PID:1556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4224 -ip 42241⤵PID:3332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2400 -ip 24001⤵PID:1812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f37fa18df2a4b3aa11e73751cf060d31
SHA170f48e590e887bca9371af1e9587c2ff390695ce
SHA2561fc6f4f8b5b6d0bcad804453ab3b166926e38294a4fd70ce1480a051bda3f382
SHA51204dab23136b41d8a6b600880c72666ec0d7fa6ef7eb406fa51b731d0a150c258a55553bda0da75700e2847f8aab6ed5b3878b98d5607fc9496d28ae981b8bb43
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56e89fb6cab7b7cdadaa4bee9cea7c572
SHA1b94490737d244e5893aa3083344a637f5542bfa0
SHA256980f7c2cf479d0c3dbab92fa153e0d7e6108cefb1bca9c0c311956de03da68d0
SHA5120ca20567346135527c507152b54894e9156fa898127288a15e428c817dc52c4d93d7c6089a39b60dc3e5ded167780a056036a71c9300ed5fbc77b17d7293e82c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD523c24be7635bd4708f94370385e32b46
SHA196c757e3e6ef8da8d0dc2da893222804168be5bd
SHA2568610e4a260b40112acabb75de503329765be80fb981d1d3205b804324bd6d308
SHA512e39a48ecac445d8dba51975be455a0713e6ee568da902df143f95d0b33f4e61abdecccba83516b31d82aa7346f8cee6d0ed97dc21e6930f1b51aa5bd3e07b18a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5129ea588cf5f67e98de7891ed3e500e3
SHA1e508da6ff49ca65384ffaf5eed20383e243602fd
SHA2562041a198d671e88851024615e8cd981e266fa3d67e8b6307633b390afbaef549
SHA512e6f23d9d7ac9f0ba288cfee9da9dc59777c0a4fb8cb9de1bd69283c65b162fc608662b0176161141d31b24b0c5286882070c8227edd9af58943f5c9a4b164731
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e8dd2476944deefe9d497d6ef95aff2e
SHA1e8585b861155a10caa0e4a048efd6b705bea90a2
SHA2569065d42047a7b49d9807ac8ae48370842489e1c2150ee7f263743a316c2facba
SHA512fc95de26836752f9fb77b01a8a839d333433738c819e5e774074898ac90dd07d723f3a6340cf084b693ebc76d2b9807e6ade8ed796df0e54ba8e23d48f1b21a8
-
Filesize
4.2MB
MD5b2393609deb4119903537e58339d743e
SHA1162fd16b9d2f0892f7f5f4d2f30835ee4647e4f0
SHA256d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61
SHA5121176cf631de41b8adfc51647291b77f307dd451189f0297ab977cc34ea67185e7ea5e386bab19f1fbca43a0f949da80a5688ba690c905a8155b491c82b03a3f1
-
Filesize
4.2MB
MD5b2393609deb4119903537e58339d743e
SHA1162fd16b9d2f0892f7f5f4d2f30835ee4647e4f0
SHA256d6b81c1dc800d979622aa9d7b003c9c9ecc213bf426cc7934dcd5bcda6c88b61
SHA5121176cf631de41b8adfc51647291b77f307dd451189f0297ab977cc34ea67185e7ea5e386bab19f1fbca43a0f949da80a5688ba690c905a8155b491c82b03a3f1