Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe
Resource
win7-20230831-en
General
-
Target
c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe
-
Size
4.2MB
-
MD5
11e62016486a227fe72f2511ca663c49
-
SHA1
50452b540dd0d9fafd2852c8641d2fd089bc22f3
-
SHA256
c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237
-
SHA512
9124f079c271cc6ae35e0018a39e1148188ef0b7e7b209ee943cc4ac14815c4dfc5fbb95ffed749b2ac913c5191f90aec2bd242a08cea0f8224e379938b5f5c5
-
SSDEEP
98304:jW1Ko89cJBnW71csqM4JvnYRqlnZFQddiRQeBR8s52kURTa+nIW:wP89cJBnGcsqBvQqlnZZRtxAa+IW
Malware Config
Signatures
-
Glupteba payload 21 IoCs
resource yara_rule behavioral2/memory/2924-2-0x0000000003010000-0x00000000038FB000-memory.dmp family_glupteba behavioral2/memory/2924-3-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2924-26-0x0000000003010000-0x00000000038FB000-memory.dmp family_glupteba behavioral2/memory/2924-27-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2924-57-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2924-62-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3032-64-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3032-93-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3032-98-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3032-153-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3032-159-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1320-230-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1320-263-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1320-271-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1320-273-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1320-275-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1320-277-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1320-279-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1320-281-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1320-283-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1320-285-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1168 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 1320 csrss.exe 672 injector.exe 4692 windefender.exe 2572 windefender.exe -
resource yara_rule behavioral2/files/0x000700000002326d-266.dat upx behavioral2/files/0x000700000002326d-268.dat upx behavioral2/files/0x000700000002326d-269.dat upx behavioral2/memory/4692-270-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2572-272-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2572-276-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2572-282-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe File created C:\Windows\rss\csrss.exe c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3388 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe 1236 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-341 = "Egypt Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4212 powershell.exe 4212 powershell.exe 2924 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 2924 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 4460 powershell.exe 4460 powershell.exe 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 3064 powershell.exe 3064 powershell.exe 3432 powershell.exe 3432 powershell.exe 2736 powershell.exe 2736 powershell.exe 1412 powershell.exe 1412 powershell.exe 4908 powershell.exe 4908 powershell.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 1320 csrss.exe 1320 csrss.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 1320 csrss.exe 1320 csrss.exe 1320 csrss.exe 1320 csrss.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe 672 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4212 powershell.exe Token: SeDebugPrivilege 2924 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Token: SeImpersonatePrivilege 2924 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe Token: SeDebugPrivilege 4460 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 3432 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 1412 powershell.exe Token: SeDebugPrivilege 4908 powershell.exe Token: SeSystemEnvironmentPrivilege 1320 csrss.exe Token: SeSecurityPrivilege 3388 sc.exe Token: SeSecurityPrivilege 3388 sc.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2924 wrote to memory of 4212 2924 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 84 PID 2924 wrote to memory of 4212 2924 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 84 PID 2924 wrote to memory of 4212 2924 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 84 PID 3032 wrote to memory of 4460 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 95 PID 3032 wrote to memory of 4460 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 95 PID 3032 wrote to memory of 4460 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 95 PID 3032 wrote to memory of 3312 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 98 PID 3032 wrote to memory of 3312 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 98 PID 3032 wrote to memory of 3064 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 101 PID 3032 wrote to memory of 3064 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 101 PID 3032 wrote to memory of 3064 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 101 PID 3032 wrote to memory of 3432 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 103 PID 3032 wrote to memory of 3432 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 103 PID 3032 wrote to memory of 3432 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 103 PID 3032 wrote to memory of 1320 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 105 PID 3032 wrote to memory of 1320 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 105 PID 3032 wrote to memory of 1320 3032 c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe 105 PID 1320 wrote to memory of 2736 1320 csrss.exe 106 PID 1320 wrote to memory of 2736 1320 csrss.exe 106 PID 1320 wrote to memory of 2736 1320 csrss.exe 106 PID 1320 wrote to memory of 1412 1320 csrss.exe 111 PID 1320 wrote to memory of 1412 1320 csrss.exe 111 PID 1320 wrote to memory of 1412 1320 csrss.exe 111 PID 1320 wrote to memory of 4908 1320 csrss.exe 114 PID 1320 wrote to memory of 4908 1320 csrss.exe 114 PID 1320 wrote to memory of 4908 1320 csrss.exe 114 PID 1320 wrote to memory of 672 1320 csrss.exe 116 PID 1320 wrote to memory of 672 1320 csrss.exe 116 PID 4692 wrote to memory of 1812 4692 windefender.exe 122 PID 4692 wrote to memory of 1812 4692 windefender.exe 122 PID 4692 wrote to memory of 1812 4692 windefender.exe 122 PID 1812 wrote to memory of 3388 1812 cmd.exe 123 PID 1812 wrote to memory of 3388 1812 cmd.exe 123 PID 1812 wrote to memory of 3388 1812 cmd.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe"C:\Users\Admin\AppData\Local\Temp\c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe"C:\Users\Admin\AppData\Local\Temp\c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:3312
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1168
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2820
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4212
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1236
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f20ced99ed8051c17a33ad9ca5dba0b4
SHA11a0c1e11424c4acb4fd5729865e621dcf1e80711
SHA256e5cddb96e6642dcd2764cc1044562a0c18a619374ddafd1c8b7053ed929d8db1
SHA51215f95510d2e853100b330ddbf7fd0cda9ed853dec064e48ec8cb7c51535bda3e2cdc1243c29310f7d4843a09f9fbece2f7e308d2dece4f71d107b2e4a303a587
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5051152ac5c3aebf94dadd583c094a547
SHA1a69214d00742a4a35a18b46a344170fae2f6fffd
SHA256fe44f8f4856cace2f9106e41b3eec5366463b8c963c4812fffa41b014db3c6eb
SHA512a053a49be2ddd1ef8f22f3d3b5004f0ad420e2fc26a0db7e00d2f4c05c14e04abdf8405dd84519e90d1d9b1d6759536eb0ca15e9e025c8d273271b92031bb79d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51dbc711790fc94c5450a7e8587f9a72f
SHA1f3db2f523dabc50f40bef8858391ecaedf2d5814
SHA256a6e8d63482e84ff3b062ae44c353cf002b33097b88e70a7ee401f4d08597074d
SHA5121400339e81bb33ecae4a1f26256bea61beee40d366fabfa01c6282df3eacc3376ce8ccd73cc6e5c4450fe9232d67311305f0851a5e6b4679af2607af48576261
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c9bae44323a05fef7c53674e33447d56
SHA178b8384759f135d1a6437c598a46f072f8f3a5a8
SHA25615738f845d08d95285ae94bd8f939495f047bf34b33aa21d8225237355c4559b
SHA512487a92254e553e5666b28e47042483164ff20611bcde9c7f3309dd647125630f5dcab217b2a3bd00594552c67456a3e144f3dcc8729975f67fd30b399836d0ec
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52cfed4127f654492d55898a996a1a3bc
SHA1c38864f2e8de69d48e586ff3e0939f8ee9ca358b
SHA2566d06b6b95b5c3b0fae552da34012bbcfeb5de1c3d12628520c644d354e310406
SHA512711197264e41b74a613f413bb77f5d7bd6f8b5cbf60fbb9ac0b51ed9b4f814b882fec9d13544ecfaae4672107f379acf2405fe13bfd97d2769fefd1a9f09031e
-
Filesize
4.2MB
MD511e62016486a227fe72f2511ca663c49
SHA150452b540dd0d9fafd2852c8641d2fd089bc22f3
SHA256c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237
SHA5129124f079c271cc6ae35e0018a39e1148188ef0b7e7b209ee943cc4ac14815c4dfc5fbb95ffed749b2ac913c5191f90aec2bd242a08cea0f8224e379938b5f5c5
-
Filesize
4.2MB
MD511e62016486a227fe72f2511ca663c49
SHA150452b540dd0d9fafd2852c8641d2fd089bc22f3
SHA256c597c4965ddbc764e5d1af9464b33dec07e4913aca9b874a71e4aa8c4981d237
SHA5129124f079c271cc6ae35e0018a39e1148188ef0b7e7b209ee943cc4ac14815c4dfc5fbb95ffed749b2ac913c5191f90aec2bd242a08cea0f8224e379938b5f5c5
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec