Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 00:47
Static task
static1
General
-
Target
c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe
-
Size
4.2MB
-
MD5
e8647d1092c8ee7c721c52a85cbaa69b
-
SHA1
5b6ddef8fbed5e8e8c4af2bb5e1900e6c62c52b7
-
SHA256
c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d
-
SHA512
192b4dc1c0f88f9d7c44c2f6a7b52dc4e312aca0a143f95f8519438a0d371532e5ce38b552d13982588a061fc6c78ca7f1545222d4f096cf301afd25ac0a88fe
-
SSDEEP
98304:+DFie9VH8jZZET08mLXJRMokEW34xHbYw8q5UC7b6:WiqZ8408mL+EWohbj8sUou
Malware Config
Signatures
-
Glupteba payload 20 IoCs
resource yara_rule behavioral1/memory/3348-135-0x00000000051B0000-0x0000000005A9B000-memory.dmp family_glupteba behavioral1/memory/3348-136-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/3348-155-0x00000000051B0000-0x0000000005A9B000-memory.dmp family_glupteba behavioral1/memory/3348-156-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/3348-185-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/3332-191-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/3348-203-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/3332-217-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/3332-237-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/3332-284-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/4740-288-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/4740-302-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/4740-360-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/4740-381-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/4740-383-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/4740-385-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/4740-387-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/4740-389-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/4740-391-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba behavioral1/memory/4740-393-0x0000000000400000-0x0000000002F32000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2760 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 4740 csrss.exe 2500 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive schtasks.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log schtasks.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe File created C:\Windows\rss\csrss.exe c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4560 schtasks.exe 1396 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3600 powershell.exe 3600 powershell.exe 3348 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3348 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 1288 powershell.exe 1288 powershell.exe 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 3312 powershell.exe 3312 powershell.exe 2116 powershell.exe 2116 powershell.exe 4144 powershell.exe 4144 powershell.exe 2100 powershell.exe 2100 powershell.exe 3932 powershell.exe 3932 powershell.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 4740 csrss.exe 4740 csrss.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 4740 csrss.exe 4740 csrss.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe 2500 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3600 powershell.exe Token: SeDebugPrivilege 3348 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Token: SeImpersonatePrivilege 3348 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe Token: SeDebugPrivilege 1288 powershell.exe Token: SeDebugPrivilege 3312 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 4144 powershell.exe Token: SeDebugPrivilege 2100 powershell.exe Token: SeDebugPrivilege 3932 powershell.exe Token: SeSystemEnvironmentPrivilege 4740 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3348 wrote to memory of 3600 3348 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 90 PID 3348 wrote to memory of 3600 3348 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 90 PID 3348 wrote to memory of 3600 3348 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 90 PID 3332 wrote to memory of 1288 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 97 PID 3332 wrote to memory of 1288 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 97 PID 3332 wrote to memory of 1288 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 97 PID 3332 wrote to memory of 3120 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 101 PID 3332 wrote to memory of 3120 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 101 PID 3120 wrote to memory of 2760 3120 cmd.exe 103 PID 3120 wrote to memory of 2760 3120 cmd.exe 103 PID 3332 wrote to memory of 3312 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 104 PID 3332 wrote to memory of 3312 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 104 PID 3332 wrote to memory of 3312 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 104 PID 3332 wrote to memory of 2116 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 106 PID 3332 wrote to memory of 2116 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 106 PID 3332 wrote to memory of 2116 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 106 PID 3332 wrote to memory of 4740 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 109 PID 3332 wrote to memory of 4740 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 109 PID 3332 wrote to memory of 4740 3332 c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe 109 PID 4740 wrote to memory of 4144 4740 csrss.exe 110 PID 4740 wrote to memory of 4144 4740 csrss.exe 110 PID 4740 wrote to memory of 4144 4740 csrss.exe 110 PID 4740 wrote to memory of 2100 4740 csrss.exe 115 PID 4740 wrote to memory of 2100 4740 csrss.exe 115 PID 4740 wrote to memory of 2100 4740 csrss.exe 115 PID 4740 wrote to memory of 3932 4740 csrss.exe 119 PID 4740 wrote to memory of 3932 4740 csrss.exe 119 PID 4740 wrote to memory of 3932 4740 csrss.exe 119 PID 4740 wrote to memory of 2500 4740 csrss.exe 121 PID 4740 wrote to memory of 2500 4740 csrss.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe"C:\Users\Admin\AppData\Local\Temp\c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe"C:\Users\Admin\AppData\Local\Temp\c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2760
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4560
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1288
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1396
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e8086f3c09acc1210f0fd34263e8a591
SHA192afa52f054054fe3069916157c2ca33fbd74536
SHA256084b2e7f4d33cc7216987d96b4b10b3205dd2f0c319729d4b7770da66d7ab171
SHA512e4fc698b7c36a17fad330379b2c1374bbfaa96f76cf989f99654f2c8c60acb45feb38326aa877727e519886c67069d78bd26a34f7f7b134b6a921d66b69e8252
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f7ca8a70117b4e20fb578b4cae88b3c0
SHA128a1f876fa420f2e6e80920a0cb80c695e68d1ae
SHA25624cc75cf4728679ad45f1eece6bf4072d72d7efb672b2e4bcf4dc2760cd78117
SHA512d2a6492ca8ce6affb14f10ca740a6f5c72ef7da4b845498449e9d7464a6cb4a7e9737e3e207a8353ed4f9d79e52608c71140d7a235c4944cb7baae54e50a09b2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c26d0d5db6b1d0fc45b185fd2b4d0dd9
SHA1fa0a0710503107ae32aac6aa97ab79950cb33795
SHA256c4f285467b8ba00f189ef8c8608efa87e0ddb7b89797533832e8f92ffa58bdd7
SHA5125e0c9bc9f7d215168656af236902bba6f512209f21cf6293eb34fcbcd238a33bc0b3f00f3d6dada7428e37cdb64b7d9ac617541d191d44a3eeaeb9d75349b5c0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fbcfa70a562e068306f717ac71afc415
SHA12dac27866076ad3b23c0de5b50de01fa2f5af79e
SHA25632b1ab67e7334a20eebdacce30c86ea85dde8d625d65d025f5136467b6a95e30
SHA512a52344c727d4e5db08760e74f44e889bb1da1638d9a6560ff6a5610b3fb9480578b6871f6caf69e4a7ce1a87ed2d13f12adf2c7f9b4ecbfc2b2ad8fc69197f22
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5967fb84cdbd4f50aac9473c457b1d308
SHA18db3d1f5b049072dd209a3eb9c8a525e15046d5c
SHA2564b8a27aef3dfc99821b6042a6e67173cf7a52c2df5a2a8690b89ed5db50c43bc
SHA5121b816024938f29fda90d37ea86b085bb929b20ddd1b398da1d4d262c1dbb7b331c1c4fc9e1f0b0ce466702ff29092516d1d741ef77394005a366c4fa31ac30d1
-
Filesize
4.2MB
MD5e8647d1092c8ee7c721c52a85cbaa69b
SHA15b6ddef8fbed5e8e8c4af2bb5e1900e6c62c52b7
SHA256c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d
SHA512192b4dc1c0f88f9d7c44c2f6a7b52dc4e312aca0a143f95f8519438a0d371532e5ce38b552d13982588a061fc6c78ca7f1545222d4f096cf301afd25ac0a88fe
-
Filesize
4.2MB
MD5e8647d1092c8ee7c721c52a85cbaa69b
SHA15b6ddef8fbed5e8e8c4af2bb5e1900e6c62c52b7
SHA256c858de05299d4643df3602137d0240d031d01109de01dd5e87ce95990ec6977d
SHA512192b4dc1c0f88f9d7c44c2f6a7b52dc4e312aca0a143f95f8519438a0d371532e5ce38b552d13982588a061fc6c78ca7f1545222d4f096cf301afd25ac0a88fe