Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2023, 05:09
Static task
static1
General
-
Target
8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe
-
Size
4.2MB
-
MD5
a74f977a76a84e9abe226d37060a60ff
-
SHA1
d0fdd076ee5b88112d0c5a9f599b4680bf391c55
-
SHA256
8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965
-
SHA512
26e517452636bbb3ae20187ccf52b9d628c8771b7f7a8459d53684a5b57007677708844eeccd666ea3dabf538f0cc35932d4b3ef07701eba34b08f25122c1854
-
SSDEEP
98304:+EetIp/wDrYhBLw7jCPSQSbSuKLRXxaJCNcYPEKwlzgxt5Y/LrznN5YT4:Es/cr2AKZuTKNxaKcYpLxEz7
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral1/memory/2256-134-0x0000000003110000-0x00000000039FB000-memory.dmp family_glupteba behavioral1/memory/2256-173-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2256-180-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4752-218-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4752-264-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-317-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-350-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-351-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-352-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-353-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-354-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-355-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-356-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-357-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-358-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3564-359-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2984 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3564 csrss.exe 4912 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe File created C:\Windows\rss\csrss.exe 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3696 2256 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3760 schtasks.exe 4384 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4412 powershell.exe 4412 powershell.exe 2256 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 2256 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 3148 powershell.exe 3148 powershell.exe 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 2440 powershell.exe 2440 powershell.exe 3092 powershell.exe 3092 powershell.exe 1944 powershell.exe 1944 powershell.exe 3088 powershell.exe 3088 powershell.exe 5040 powershell.exe 5040 powershell.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 3564 csrss.exe 3564 csrss.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 3564 csrss.exe 3564 csrss.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe 4912 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4412 powershell.exe Token: SeDebugPrivilege 2256 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Token: SeImpersonatePrivilege 2256 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 3092 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 3088 powershell.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeSystemEnvironmentPrivilege 3564 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2256 wrote to memory of 4412 2256 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 84 PID 2256 wrote to memory of 4412 2256 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 84 PID 2256 wrote to memory of 4412 2256 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 84 PID 4752 wrote to memory of 3148 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 98 PID 4752 wrote to memory of 3148 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 98 PID 4752 wrote to memory of 3148 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 98 PID 4752 wrote to memory of 1308 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 100 PID 4752 wrote to memory of 1308 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 100 PID 1308 wrote to memory of 2984 1308 cmd.exe 102 PID 1308 wrote to memory of 2984 1308 cmd.exe 102 PID 4752 wrote to memory of 2440 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 103 PID 4752 wrote to memory of 2440 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 103 PID 4752 wrote to memory of 2440 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 103 PID 4752 wrote to memory of 3092 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 105 PID 4752 wrote to memory of 3092 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 105 PID 4752 wrote to memory of 3092 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 105 PID 4752 wrote to memory of 3564 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 108 PID 4752 wrote to memory of 3564 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 108 PID 4752 wrote to memory of 3564 4752 8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe 108 PID 3564 wrote to memory of 1944 3564 csrss.exe 109 PID 3564 wrote to memory of 1944 3564 csrss.exe 109 PID 3564 wrote to memory of 1944 3564 csrss.exe 109 PID 3564 wrote to memory of 3088 3564 csrss.exe 114 PID 3564 wrote to memory of 3088 3564 csrss.exe 114 PID 3564 wrote to memory of 3088 3564 csrss.exe 114 PID 3564 wrote to memory of 5040 3564 csrss.exe 117 PID 3564 wrote to memory of 5040 3564 csrss.exe 117 PID 3564 wrote to memory of 5040 3564 csrss.exe 117 PID 3564 wrote to memory of 4912 3564 csrss.exe 119 PID 3564 wrote to memory of 4912 3564 csrss.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe"C:\Users\Admin\AppData\Local\Temp\8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe"C:\Users\Admin\AppData\Local\Temp\8b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2984
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3760
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 8722⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2256 -ip 22561⤵PID:3844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD565703d1df8ec1cc077bed9b777e489af
SHA104b21612c1f14fe09fb6272683d70a009997b65f
SHA256b5678194b81b838b39cbce14a817be8ea277c0a51c3adaccfa10c3e8c0b3c60c
SHA512d09badb3105b9f1a9dfc71cb13c92f81a58a5f2dce8048f4cb4c3785a02234eaae07e5e8b18c61505aa25b2de91e77be5d90a73955b6a09bd442c851563ca3e7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d756bf6f32752c1f5fcf85c1b30d64ae
SHA1d5a863643a640cb667c9433f720da5b40fb21e43
SHA25617d60096b174ad6f049979e7f527f443218d4ce6ccdf61d3e249baa6529a265a
SHA5122fb7f92191930520e7710aa600d0e7b252c901126530684dc2f093984967f67babad23d95ffb5c8aa89a9f9537102622eb337199dc45376cbe33fdc9e211978e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59c1369426d65579cf5a6552892849268
SHA177dc2c6ae32625f836868093b7f04e84ac4dc73f
SHA256154c775b9a4cd0d4dd9941abc04f81fce57c9d07bcbf84572286c901779a9988
SHA512230fa463d673633fecf35add7cb3cf001ad0a46fb0605b2f8ec4d130c3747c753bb398e9c37d09d1d857ebc0c5417bd1eb540d53496552e572315cdc09bd6c8b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f61cd181778da0deb9e3385d53eb3aaa
SHA187561e5f1d4d5656419817e5da00428783357c39
SHA25672ea7ada5cd91818c016c57a372fe17a001f5f1b2e2b70367af346bfd14de80b
SHA5123ec0d88be7f9ad0c46c3acafa0514c09e465200490109adebeb7264ed6677c5e031476e4be45e2fcb190c9614c2d248d0d8a45b246eede6c881f34107fe6ab55
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50614ac9a74a533dfa0c93b4388a346d3
SHA1b24e548802736bf3fdb639316e9fff34b80a3bc3
SHA256bd6fd1450511e5f4b1ab57556dc078368574f4430e0959929f367bd5fb22c8bb
SHA5122820319cc0a98e05a1c1cea8cff0f9add288e9e24a5d0b43b4e149836492cb2006db017e554af39d6e90f81fd2c3e858662918057d3ceb4b386eed81dba42fb4
-
Filesize
4.2MB
MD5a74f977a76a84e9abe226d37060a60ff
SHA1d0fdd076ee5b88112d0c5a9f599b4680bf391c55
SHA2568b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965
SHA51226e517452636bbb3ae20187ccf52b9d628c8771b7f7a8459d53684a5b57007677708844eeccd666ea3dabf538f0cc35932d4b3ef07701eba34b08f25122c1854
-
Filesize
4.2MB
MD5a74f977a76a84e9abe226d37060a60ff
SHA1d0fdd076ee5b88112d0c5a9f599b4680bf391c55
SHA2568b47875c3610c14308db0bbd7028fada1f511d419255887ddcfc693334070965
SHA51226e517452636bbb3ae20187ccf52b9d628c8771b7f7a8459d53684a5b57007677708844eeccd666ea3dabf538f0cc35932d4b3ef07701eba34b08f25122c1854