Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 08:37
Static task
static1
General
-
Target
321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe
-
Size
4.2MB
-
MD5
fb5e19d4335fcdc40ba3980c5d3a1bcc
-
SHA1
1d707cb928336a1d6903a24354cc1df1d06bf7de
-
SHA256
321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd
-
SHA512
d983432a56c8201444d77e8befc8aa0d8beb2183b73dea1e64a7d28b3158a6c394c8d3884a7038037fbb2a2c57951f07d8770ef3b6d6f051ed7e415f181d0414
-
SSDEEP
98304:OfrTbheRqFixgd2vdUGHDWyNS6A06u71wPfCzjVACDb:wbheAjdutRNS6L1tzj
Malware Config
Signatures
-
Glupteba payload 22 IoCs
resource yara_rule behavioral1/memory/4776-2-0x0000000004CC0000-0x00000000055AB000-memory.dmp family_glupteba behavioral1/memory/4776-3-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/4776-26-0x0000000004CC0000-0x00000000055AB000-memory.dmp family_glupteba behavioral1/memory/4776-45-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/4776-46-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/4776-59-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/4852-61-0x0000000004510000-0x000000000490B000-memory.dmp family_glupteba behavioral1/memory/4852-62-0x0000000004A10000-0x00000000052FB000-memory.dmp family_glupteba behavioral1/memory/4852-63-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/4852-94-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/4852-155-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/4852-161-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/2688-257-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/2688-265-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/2688-266-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/2688-267-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/2688-268-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/2688-269-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/2688-270-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/2688-271-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/2688-272-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba behavioral1/memory/2688-273-0x0000000000400000-0x000000000298A000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2292 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2688 csrss.exe 4248 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe File opened for modification C:\Windows\rss 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5060 schtasks.exe 2148 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1224 powershell.exe 1224 powershell.exe 1224 powershell.exe 4776 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4776 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4444 powershell.exe 4444 powershell.exe 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 1996 powershell.exe 1996 powershell.exe 1996 powershell.exe 4528 powershell.exe 4528 powershell.exe 4528 powershell.exe 4972 powershell.exe 4972 powershell.exe 4972 powershell.exe 208 powershell.exe 208 powershell.exe 208 powershell.exe 3132 powershell.exe 3132 powershell.exe 3132 powershell.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 2688 csrss.exe 4248 injector.exe 2688 csrss.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 2688 csrss.exe 2688 csrss.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe 4248 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1224 powershell.exe Token: SeDebugPrivilege 4776 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Token: SeImpersonatePrivilege 4776 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe Token: SeDebugPrivilege 4444 powershell.exe Token: SeDebugPrivilege 1996 powershell.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 208 powershell.exe Token: SeDebugPrivilege 3132 powershell.exe Token: SeSystemEnvironmentPrivilege 2688 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4776 wrote to memory of 1224 4776 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 89 PID 4776 wrote to memory of 1224 4776 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 89 PID 4776 wrote to memory of 1224 4776 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 89 PID 4852 wrote to memory of 4444 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 102 PID 4852 wrote to memory of 4444 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 102 PID 4852 wrote to memory of 4444 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 102 PID 4852 wrote to memory of 1692 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 103 PID 4852 wrote to memory of 1692 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 103 PID 1692 wrote to memory of 2292 1692 cmd.exe 106 PID 1692 wrote to memory of 2292 1692 cmd.exe 106 PID 4852 wrote to memory of 1996 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 107 PID 4852 wrote to memory of 1996 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 107 PID 4852 wrote to memory of 1996 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 107 PID 4852 wrote to memory of 4528 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 111 PID 4852 wrote to memory of 4528 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 111 PID 4852 wrote to memory of 4528 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 111 PID 4852 wrote to memory of 2688 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 113 PID 4852 wrote to memory of 2688 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 113 PID 4852 wrote to memory of 2688 4852 321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe 113 PID 2688 wrote to memory of 4972 2688 csrss.exe 114 PID 2688 wrote to memory of 4972 2688 csrss.exe 114 PID 2688 wrote to memory of 4972 2688 csrss.exe 114 PID 2688 wrote to memory of 208 2688 csrss.exe 120 PID 2688 wrote to memory of 208 2688 csrss.exe 120 PID 2688 wrote to memory of 208 2688 csrss.exe 120 PID 2688 wrote to memory of 3132 2688 csrss.exe 122 PID 2688 wrote to memory of 3132 2688 csrss.exe 122 PID 2688 wrote to memory of 3132 2688 csrss.exe 122 PID 2688 wrote to memory of 4248 2688 csrss.exe 124 PID 2688 wrote to memory of 4248 2688 csrss.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe"C:\Users\Admin\AppData\Local\Temp\321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe"C:\Users\Admin\AppData\Local\Temp\321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2292
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:5060
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2196
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2148
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5db9930a3477ae31353bb34c060496283
SHA11d9a6e3da62a41e45453ed6f7ef8564edf026fa7
SHA2562b64502b81ff1187c658a2a7f458e00900b199354394de304729b295fec6acd4
SHA512ba154db46d15f6fa7100ec2e9261dd97e4c98148d3cff06544182181f569c21591d604f645e65a2af61cc2251c17eda3671933d36a0191b04488a6c201db6795
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD529557fb9112337ca2ef9277b6315a1fa
SHA1b6cb9a66ca93da80948ebbce410ab58c8a0179eb
SHA256594a9bc683a3b8aa52eb72d2dcc50e377459ac17cd3996cfebacdf537477a0e3
SHA51254e04eb5a02b80cf287d94469aad5eac8516d110c860e07aabbc4fadfa8b3e61b5e1545883d69bc9848b9ad0758dcce677cbf7621e9ef4fdeba43d435d3c19f6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD504784c08817f22a251b6bf173eb730cf
SHA139322dc7bc49a59688d36eb696460869adec1e0e
SHA2562097f1def714f8033e00fc88b5b60eddc6662c8e6ff7408a826fdd7ce079ab3a
SHA512263625e62f07e5492a82ccfc3ac8f1ccc2a55fc56e299613202cc7dfdd21094c6a541b5b5310770e3a719b7145c29d56e55bfb53b7ba42a8ce32c668b23438fb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD580807f6dbef7c0dc8d1509cca0b6a4c5
SHA15002b35ef0873bb3060b3c8e5a0cc8c3fec71d1b
SHA256b938b5ef292481d5f19cf92b0a528b2ec29bc4b3652f404fb8b297e2ae594e49
SHA5120e849128ffde78840beab36c8d95d074cc4052cd0749465e78df46dd32ac139885294f912109088dab762bceb7a1f89e6dccee7c3ab903d894dc42549115667d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d582adfdd60a742da5a9e25f6b38dcac
SHA1d833b909697686f0db65fb4c174bd559ffb0a692
SHA256c992ed897da8813070daccbb290f4f1a58d10d620a1f92f2081977a9087b068b
SHA512139f75353c195bae2650a12f4da7780d11ab94ad7e4058eb8276343d84020eff210e20575d53b814ddf9915bc9c1aa426f01e8c3945dd82382efbdf8fc3cd536
-
Filesize
4.2MB
MD5fb5e19d4335fcdc40ba3980c5d3a1bcc
SHA11d707cb928336a1d6903a24354cc1df1d06bf7de
SHA256321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd
SHA512d983432a56c8201444d77e8befc8aa0d8beb2183b73dea1e64a7d28b3158a6c394c8d3884a7038037fbb2a2c57951f07d8770ef3b6d6f051ed7e415f181d0414
-
Filesize
4.2MB
MD5fb5e19d4335fcdc40ba3980c5d3a1bcc
SHA11d707cb928336a1d6903a24354cc1df1d06bf7de
SHA256321acfeb0098a86373ab3752f9b7145cc85fd5bc5b50d8876241b28d4d5724dd
SHA512d983432a56c8201444d77e8befc8aa0d8beb2183b73dea1e64a7d28b3158a6c394c8d3884a7038037fbb2a2c57951f07d8770ef3b6d6f051ed7e415f181d0414