Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
10/10/2023, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe
Resource
win7-20230831-en
General
-
Target
977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe
-
Size
4.1MB
-
MD5
b46d217c0d5c4c03782f888c14494f9a
-
SHA1
77ccfcee0e3c798c47072bf69647b154cd2e92f9
-
SHA256
977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2
-
SHA512
2ae80257125cbb6f8b3f6f53751567c2b9b032b0e71656bbf69565f785e9fa4788fb91bc6450ff8cce8dfaebf54c00a10a00dc045ab41d68d9384646b64c41c0
-
SSDEEP
98304:rP9dSxW/w3gvzHy8a/x5Aa8V5QELTGRVPw/uqGXKZAotd6Kb5tBagOS46FiH7:L9dSxE0QzS8a/MD5QsiRBYC6ZNtdt5t6
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/4184-2-0x0000000005170000-0x0000000005A5B000-memory.dmp family_glupteba behavioral2/memory/4184-3-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/4184-70-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/4184-76-0x0000000005170000-0x0000000005A5B000-memory.dmp family_glupteba behavioral2/memory/4184-305-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2908-308-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2908-333-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2908-661-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2908-1053-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2204-1056-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2204-1065-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2204-1555-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2204-1805-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2204-1814-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2204-1816-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2204-1818-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2204-1820-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba behavioral2/memory/2204-1822-0x0000000000400000-0x0000000002FB3000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4260 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2204 csrss.exe 3808 injector.exe 2364 windefender.exe 4380 windefender.exe -
resource yara_rule behavioral2/files/0x000700000001b013-1808.dat upx behavioral2/files/0x000700000001b013-1809.dat upx behavioral2/files/0x000700000001b013-1811.dat upx behavioral2/memory/2364-1813-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4380-1815-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4380-1819-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe = "0" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4768 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4544 schtasks.exe 1412 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 376 powershell.exe 376 powershell.exe 376 powershell.exe 4184 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 4184 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 4544 powershell.exe 4544 powershell.exe 4544 powershell.exe 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 2824 powershell.exe 2824 powershell.exe 2824 powershell.exe 4372 powershell.exe 4372 powershell.exe 4372 powershell.exe 3460 powershell.exe 3460 powershell.exe 3460 powershell.exe 4696 powershell.exe 4696 powershell.exe 4696 powershell.exe 4464 powershell.exe 4464 powershell.exe 4464 powershell.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 2204 csrss.exe 2204 csrss.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 2204 csrss.exe 2204 csrss.exe 3808 injector.exe 3808 injector.exe 2204 csrss.exe 2204 csrss.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 376 powershell.exe Token: SeDebugPrivilege 4184 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Token: SeImpersonatePrivilege 4184 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe Token: SeDebugPrivilege 4544 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 4372 powershell.exe Token: SeDebugPrivilege 3460 powershell.exe Token: SeDebugPrivilege 4696 powershell.exe Token: SeDebugPrivilege 4464 powershell.exe Token: SeSystemEnvironmentPrivilege 2204 csrss.exe Token: SeSecurityPrivilege 4768 sc.exe Token: SeSecurityPrivilege 4768 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4184 wrote to memory of 376 4184 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 71 PID 4184 wrote to memory of 376 4184 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 71 PID 4184 wrote to memory of 376 4184 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 71 PID 2908 wrote to memory of 4544 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 76 PID 2908 wrote to memory of 4544 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 76 PID 2908 wrote to memory of 4544 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 76 PID 2908 wrote to memory of 2976 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 78 PID 2908 wrote to memory of 2976 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 78 PID 2976 wrote to memory of 4260 2976 cmd.exe 80 PID 2976 wrote to memory of 4260 2976 cmd.exe 80 PID 2908 wrote to memory of 2824 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 81 PID 2908 wrote to memory of 2824 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 81 PID 2908 wrote to memory of 2824 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 81 PID 2908 wrote to memory of 4372 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 83 PID 2908 wrote to memory of 4372 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 83 PID 2908 wrote to memory of 4372 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 83 PID 2908 wrote to memory of 2204 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 85 PID 2908 wrote to memory of 2204 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 85 PID 2908 wrote to memory of 2204 2908 977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe 85 PID 2204 wrote to memory of 3460 2204 csrss.exe 87 PID 2204 wrote to memory of 3460 2204 csrss.exe 87 PID 2204 wrote to memory of 3460 2204 csrss.exe 87 PID 2204 wrote to memory of 4696 2204 csrss.exe 94 PID 2204 wrote to memory of 4696 2204 csrss.exe 94 PID 2204 wrote to memory of 4696 2204 csrss.exe 94 PID 2204 wrote to memory of 4464 2204 csrss.exe 96 PID 2204 wrote to memory of 4464 2204 csrss.exe 96 PID 2204 wrote to memory of 4464 2204 csrss.exe 96 PID 2204 wrote to memory of 3808 2204 csrss.exe 98 PID 2204 wrote to memory of 3808 2204 csrss.exe 98 PID 2364 wrote to memory of 4140 2364 windefender.exe 105 PID 2364 wrote to memory of 4140 2364 windefender.exe 105 PID 2364 wrote to memory of 4140 2364 windefender.exe 105 PID 4140 wrote to memory of 4768 4140 cmd.exe 106 PID 4140 wrote to memory of 4768 4140 cmd.exe 106 PID 4140 wrote to memory of 4768 4140 cmd.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe"C:\Users\Admin\AppData\Local\Temp\977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Users\Admin\AppData\Local\Temp\977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe"C:\Users\Admin\AppData\Local\Temp\977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:4260
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4544
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2792
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1412
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4380
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a59dae61889c7e9788f000f124e5a36d
SHA14fa50d479afacc99e579cc751821543d2c395a29
SHA2569b252115a51637ee8a34b198dfa915a32cf563b48c5101eaaeace436393809ab
SHA5127db9bd535f7a9b5a10988b02d98eb1475198646ab3eff29d82a54241cde66fff8b469f9792afaad25f2f91c976f50b7bb386f9248c70e53a78ed24852192032c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD581daacf4e25a685f69a11544d0c1bf56
SHA1c2e37e6299a480774a2af7e77730217f988bd3a4
SHA2560a6e452d60adf296ffb799188f78a9fdbb7a799820018f3d498f67c5f20ba7cd
SHA512e3f2f06d7dd4e437af4b7d2dd8c7bd11eecd6787277c24a7f7c67da09dbf37f5a3450f6ea41540f69315202b2460f52ae4bd30e9183d6eeacfb555ce5bb0ae6d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5b487c4dc37eb45e34897b1beec8faa6e
SHA11c65da8afa39f1f9ea1e2beb7472c2b77afcc54a
SHA25693fb74bb9814e55aa717454b12bbb57845eec3756699d6bac3abae61b698090f
SHA512a619c3aab734350854f1b9735fde3894ed46c4da057aae4a62f5f7a3780079873c930e15955d122c8c1dd6131097eb82f1a310b8bebc343530ec3996c7f5d59c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5327bbc733dac498d55adc7acbccf9517
SHA19f2b2101440a3cbfa02076a09ca8f3805990288a
SHA2563e69e0e71b0b126c5af784872bc135dd474d53b6c2cc01f8abf43d7a3e0fd913
SHA512242dad1c8116d40615065c75b0f1c1b2c099ec9f41e6d2aac03805aa5491f1b9e147d4bd3573866cd16bf46ebc3e2f8c7e1a9516cf4eca95387408d096f057dd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5aeaea195de3a3b581cd3d45762a5e541
SHA1e980e5495c0092324ab85215313bb8376e76579b
SHA2568d5bf275a02924dab9974e1a983d5bca6cc4b36d1eeae06661dcafb27fd85ef0
SHA5121e405acb152000dbb826ce05b788bf730769fe671594c61326a99e821670ba329b98b6742646676304ed647285f120eaaf0b1b39876541e5d30aa7904fd1697a
-
Filesize
4.1MB
MD5b46d217c0d5c4c03782f888c14494f9a
SHA177ccfcee0e3c798c47072bf69647b154cd2e92f9
SHA256977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2
SHA5122ae80257125cbb6f8b3f6f53751567c2b9b032b0e71656bbf69565f785e9fa4788fb91bc6450ff8cce8dfaebf54c00a10a00dc045ab41d68d9384646b64c41c0
-
Filesize
4.1MB
MD5b46d217c0d5c4c03782f888c14494f9a
SHA177ccfcee0e3c798c47072bf69647b154cd2e92f9
SHA256977a2e45c0d236baf1ecdd444e9ce0617f4959006d98f7e087adc7729c9894b2
SHA5122ae80257125cbb6f8b3f6f53751567c2b9b032b0e71656bbf69565f785e9fa4788fb91bc6450ff8cce8dfaebf54c00a10a00dc045ab41d68d9384646b64c41c0
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec