Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
292s -
max time network
289s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
3eef203fb515bda85f514e168abb5973.exe
Resource
win7-20230712-en
General
-
Target
3eef203fb515bda85f514e168abb5973.exe
-
Size
4.1MB
-
MD5
d52a5f6d591ea015b18fe22d2dcd92f8
-
SHA1
109e3631e9468718b6849ec32bb95b9d40b2faa2
-
SHA256
8e76b8195a7b4b91ad0d6f1ce7b6481dd6dca9078c1c74ec490a35ad3ccf8c42
-
SHA512
11b3a427ace913192478b3baaad1dab9338a89d81bac4cafddb061bcf647337a96e578d5a4ec02f557b0a1f4c8e066950f8af1bc9189e11c36f5f35a7f423e3a
-
SSDEEP
98304:eZVZxvb2cl6rdqoeYZOnrisna1w2AGTibHghBCndzEYRqIrKFKGw:erZxvb2c0rd1ZOnrisnf27mrgHMz1RqW
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/2652-135-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2652-136-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2652-137-0x0000000002F40000-0x000000000382B000-memory.dmp family_glupteba behavioral2/memory/2652-158-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2652-163-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2652-186-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/228-189-0x0000000002DF0000-0x00000000036DB000-memory.dmp family_glupteba behavioral2/memory/228-190-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/228-216-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/228-217-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/228-263-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/228-282-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4820-284-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4820-339-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4820-374-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4820-383-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4820-385-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4820-387-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4820-395-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1256 netsh.exe -
Executes dropped EXE 5 IoCs
pid Process 4820 csrss.exe 1288 injector.exe 4412 windefender.exe 2296 windefender.exe 4656 f801950a962ddba14caaa44bf084b55c.exe -
resource yara_rule behavioral2/files/0x0007000000023227-377.dat upx behavioral2/files/0x0007000000023227-379.dat upx behavioral2/files/0x0007000000023227-380.dat upx behavioral2/memory/4412-382-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2296-384-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x0007000000023209-391.dat upx behavioral2/files/0x0007000000023209-393.dat upx behavioral2/memory/2296-394-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4656-396-0x0000000000400000-0x0000000000C25000-memory.dmp upx behavioral2/memory/4656-398-0x0000000000400000-0x0000000000C25000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 3eef203fb515bda85f514e168abb5973.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 3eef203fb515bda85f514e168abb5973.exe File created C:\Windows\rss\csrss.exe 3eef203fb515bda85f514e168abb5973.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3524 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1860 schtasks.exe 4032 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 3eef203fb515bda85f514e168abb5973.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 3eef203fb515bda85f514e168abb5973.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 3eef203fb515bda85f514e168abb5973.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 3eef203fb515bda85f514e168abb5973.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 456 powershell.exe 456 powershell.exe 2652 3eef203fb515bda85f514e168abb5973.exe 2652 3eef203fb515bda85f514e168abb5973.exe 4420 powershell.exe 4420 powershell.exe 228 3eef203fb515bda85f514e168abb5973.exe 228 3eef203fb515bda85f514e168abb5973.exe 228 3eef203fb515bda85f514e168abb5973.exe 228 3eef203fb515bda85f514e168abb5973.exe 228 3eef203fb515bda85f514e168abb5973.exe 228 3eef203fb515bda85f514e168abb5973.exe 228 3eef203fb515bda85f514e168abb5973.exe 228 3eef203fb515bda85f514e168abb5973.exe 228 3eef203fb515bda85f514e168abb5973.exe 228 3eef203fb515bda85f514e168abb5973.exe 1944 powershell.exe 1944 powershell.exe 2220 powershell.exe 2220 powershell.exe 2336 powershell.exe 2336 powershell.exe 4052 powershell.exe 4052 powershell.exe 1256 powershell.exe 1256 powershell.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 4820 csrss.exe 4820 csrss.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 4820 csrss.exe 4820 csrss.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 4820 csrss.exe 4820 csrss.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe 1288 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 456 powershell.exe Token: SeDebugPrivilege 2652 3eef203fb515bda85f514e168abb5973.exe Token: SeImpersonatePrivilege 2652 3eef203fb515bda85f514e168abb5973.exe Token: SeDebugPrivilege 4420 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 2220 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 4052 powershell.exe Token: SeDebugPrivilege 1256 powershell.exe Token: SeSystemEnvironmentPrivilege 4820 csrss.exe Token: SeSecurityPrivilege 3524 sc.exe Token: SeSecurityPrivilege 3524 sc.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2652 wrote to memory of 456 2652 3eef203fb515bda85f514e168abb5973.exe 97 PID 2652 wrote to memory of 456 2652 3eef203fb515bda85f514e168abb5973.exe 97 PID 2652 wrote to memory of 456 2652 3eef203fb515bda85f514e168abb5973.exe 97 PID 228 wrote to memory of 4420 228 3eef203fb515bda85f514e168abb5973.exe 102 PID 228 wrote to memory of 4420 228 3eef203fb515bda85f514e168abb5973.exe 102 PID 228 wrote to memory of 4420 228 3eef203fb515bda85f514e168abb5973.exe 102 PID 228 wrote to memory of 4720 228 3eef203fb515bda85f514e168abb5973.exe 104 PID 228 wrote to memory of 4720 228 3eef203fb515bda85f514e168abb5973.exe 104 PID 4720 wrote to memory of 1256 4720 cmd.exe 106 PID 4720 wrote to memory of 1256 4720 cmd.exe 106 PID 228 wrote to memory of 1944 228 3eef203fb515bda85f514e168abb5973.exe 107 PID 228 wrote to memory of 1944 228 3eef203fb515bda85f514e168abb5973.exe 107 PID 228 wrote to memory of 1944 228 3eef203fb515bda85f514e168abb5973.exe 107 PID 228 wrote to memory of 2220 228 3eef203fb515bda85f514e168abb5973.exe 109 PID 228 wrote to memory of 2220 228 3eef203fb515bda85f514e168abb5973.exe 109 PID 228 wrote to memory of 2220 228 3eef203fb515bda85f514e168abb5973.exe 109 PID 228 wrote to memory of 4820 228 3eef203fb515bda85f514e168abb5973.exe 111 PID 228 wrote to memory of 4820 228 3eef203fb515bda85f514e168abb5973.exe 111 PID 228 wrote to memory of 4820 228 3eef203fb515bda85f514e168abb5973.exe 111 PID 4820 wrote to memory of 2336 4820 csrss.exe 112 PID 4820 wrote to memory of 2336 4820 csrss.exe 112 PID 4820 wrote to memory of 2336 4820 csrss.exe 112 PID 4820 wrote to memory of 4052 4820 csrss.exe 118 PID 4820 wrote to memory of 4052 4820 csrss.exe 118 PID 4820 wrote to memory of 4052 4820 csrss.exe 118 PID 4820 wrote to memory of 1256 4820 csrss.exe 120 PID 4820 wrote to memory of 1256 4820 csrss.exe 120 PID 4820 wrote to memory of 1256 4820 csrss.exe 120 PID 4820 wrote to memory of 1288 4820 csrss.exe 122 PID 4820 wrote to memory of 1288 4820 csrss.exe 122 PID 4412 wrote to memory of 1904 4412 windefender.exe 128 PID 4412 wrote to memory of 1904 4412 windefender.exe 128 PID 4412 wrote to memory of 1904 4412 windefender.exe 128 PID 1904 wrote to memory of 3524 1904 cmd.exe 129 PID 1904 wrote to memory of 3524 1904 cmd.exe 129 PID 1904 wrote to memory of 3524 1904 cmd.exe 129 PID 4820 wrote to memory of 4656 4820 csrss.exe 131 PID 4820 wrote to memory of 4656 4820 csrss.exe 131 PID 4820 wrote to memory of 4656 4820 csrss.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eef203fb515bda85f514e168abb5973.exe"C:\Users\Admin\AppData\Local\Temp\3eef203fb515bda85f514e168abb5973.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\3eef203fb515bda85f514e168abb5973.exe"C:\Users\Admin\AppData\Local\Temp\3eef203fb515bda85f514e168abb5973.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1256
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1860
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4032
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe4⤵
- Executes dropped EXE
PID:4656 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f5⤵PID:708
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f5⤵PID:1716
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2296
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
99KB
MD509031a062610d77d685c9934318b4170
SHA1880f744184e7774f3d14c1bb857e21cc7fe89a6d
SHA256778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd
SHA5129a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cd4d81078433d1cea3e14698528b3092
SHA1337a1a461e667272ddfc86b9ed9f5858b5e1a511
SHA2566310bb2e8780153a49eb0b8e1d30a8cdb38f8e49d1af7e334bb7ac01e0f30fd9
SHA5127393d6d9ed6af2911984f07ef71bbdc7362471c119699d83095ab31bb42dbfa307ec0ef234a9da5f3732f8bdaff97ad76e9b7d19fd216c8a22b7c01a1c5cd3f5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52f1b3ad42166c0c2051a9ef10a2e8f4b
SHA10b777dfd1c07bc1fddca8d86bc53cc118eb05d0c
SHA2566cba91e7375ea8257b1c20fb31168c0104b1cefee900bf2e3e6454ea0e394e22
SHA5124882c1019973d49dba71eb6b4ba6808bdb93b43933027c9eb0ef554ba8bdba5dbc0ceb212a491ecfabadf4da52b8bc6d565761c2bf1c5805c0458e02e65d4212
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50f32919d5788b031fa3cd780175217a4
SHA18cbdb43fdbed2ec8ced7349acb7360e930962869
SHA2566efb3af1026350ba8fd08a2d89f4f5a716909eebacdaeca155962254aa91e35c
SHA51296ee6ae932fe437e8b00efdf9025f712c1d3bf83b389d84f3eac9313cf0327fe25238fcb0997453885d984eeb1f1cdf84905e36b087235761a715e48b1606959
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5561590d595f8febbfe453257939a3494
SHA16ec4f060cbbc7fdecda8448bd5aa0e8ef0edf509
SHA25611a5782d52be11666222eaf82de38696c2b7949eac5f94aa71e498466638099c
SHA512ed6134f7fb7bbf70a6715fa25a86b2726062580c4da3149f87195f93cbdef9a6614353ba648bac5c4b85bd50fb9f08ce8ac0a6de86522bcc32bed38eac1e7eda
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD549f1835d7c17db07e3cecfb09420317c
SHA1de4c268f63210b8a3f3eec522a020236f4856ab7
SHA2565fbd104070e57fa068d5034aa0c0827ea2c3c7c9cee575e93249da458dfb4c16
SHA51265aee99df377c7a45dc7a82bd2a8183e9e5c81b6f5e70c2ed25595a75275a4e67508120e4fc0c9e3d3f19a234b5fe713e3b2579675d715e67448c852e539fb7d
-
Filesize
4.1MB
MD5d52a5f6d591ea015b18fe22d2dcd92f8
SHA1109e3631e9468718b6849ec32bb95b9d40b2faa2
SHA2568e76b8195a7b4b91ad0d6f1ce7b6481dd6dca9078c1c74ec490a35ad3ccf8c42
SHA51211b3a427ace913192478b3baaad1dab9338a89d81bac4cafddb061bcf647337a96e578d5a4ec02f557b0a1f4c8e066950f8af1bc9189e11c36f5f35a7f423e3a
-
Filesize
4.1MB
MD5d52a5f6d591ea015b18fe22d2dcd92f8
SHA1109e3631e9468718b6849ec32bb95b9d40b2faa2
SHA2568e76b8195a7b4b91ad0d6f1ce7b6481dd6dca9078c1c74ec490a35ad3ccf8c42
SHA51211b3a427ace913192478b3baaad1dab9338a89d81bac4cafddb061bcf647337a96e578d5a4ec02f557b0a1f4c8e066950f8af1bc9189e11c36f5f35a7f423e3a
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec