Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe
Resource
win10v2004-20230915-en
General
-
Target
JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe
-
Size
4.3MB
-
MD5
8fd45a13d0b0fc1e73c1093bf5799c7f
-
SHA1
4933562a034b06f6f867fe2f6fc131d8c99f0848
-
SHA256
fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748
-
SHA512
92792c37b12a998c7d722f07d33e150f660e27a4769763d3af701350681328c12297bcef5083d129d6480cb6b1df03133bd7548e8e9d9ecc6d6077c7678a1071
-
SSDEEP
98304:o9ZVpR1RvsgcoZYa8LDryDHaWQvdJlvtcbYoRSm7fYPlmzngL6:E1Rvsgc2Yhr0aTlvmbqm7woB
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/520-1-0x0000000004AB0000-0x000000000539B000-memory.dmp family_glupteba behavioral2/memory/520-2-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/520-3-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/520-5-0x0000000004AB0000-0x000000000539B000-memory.dmp family_glupteba behavioral2/memory/520-6-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/520-7-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/520-33-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/520-60-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/4400-63-0x00000000048F0000-0x00000000051DB000-memory.dmp family_glupteba behavioral2/memory/4400-64-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/4400-65-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/4400-80-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/4400-95-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/4400-132-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/4400-164-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/4556-169-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/4556-200-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba behavioral2/memory/4556-235-0x0000000000400000-0x0000000002833000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1628 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 4556 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe File opened for modification C:\Windows\rss JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 380 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4360 powershell.exe 4360 powershell.exe 520 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 520 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 4216 powershell.exe 4216 powershell.exe 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 2844 powershell.exe 2844 powershell.exe 2836 powershell.exe 2836 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4360 powershell.exe Token: SeDebugPrivilege 520 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Token: SeImpersonatePrivilege 520 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe Token: SeDebugPrivilege 4216 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 520 wrote to memory of 4360 520 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 92 PID 520 wrote to memory of 4360 520 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 92 PID 520 wrote to memory of 4360 520 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 92 PID 4400 wrote to memory of 4216 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 96 PID 4400 wrote to memory of 4216 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 96 PID 4400 wrote to memory of 4216 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 96 PID 4400 wrote to memory of 3412 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 98 PID 4400 wrote to memory of 3412 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 98 PID 3412 wrote to memory of 1628 3412 cmd.exe 100 PID 3412 wrote to memory of 1628 3412 cmd.exe 100 PID 4400 wrote to memory of 2844 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 101 PID 4400 wrote to memory of 2844 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 101 PID 4400 wrote to memory of 2844 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 101 PID 4400 wrote to memory of 2836 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 103 PID 4400 wrote to memory of 2836 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 103 PID 4400 wrote to memory of 2836 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 103 PID 4400 wrote to memory of 4556 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 105 PID 4400 wrote to memory of 4556 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 105 PID 4400 wrote to memory of 4556 4400 JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe"C:\Users\Admin\AppData\Local\Temp\JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe"C:\Users\Admin\AppData\Local\Temp\JC_fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1628
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
PID:4556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1480
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:380
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3396
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:488
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:404
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5dcbddf1aaa0d57c09aba065299082cf4
SHA1eec006db9c96ae81c9f8ac54df8278b1b7ba521e
SHA256c7ac036e08cc5c1bd5a116a269fc68da30ca04ae8a27eaca29debdf7c8e70fce
SHA5123973fb6c0c8d6f303856fa571f8886e44cd9633ed4f19f8ccd54f1bf5a17bcad1054cbbef9be39730e271f79a41c8b7a2d6201359f523858e2b716fc8a364e24
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e1ae4f000c5231c69b258acf09b86cff
SHA1635cdb33466d0bbcc67dde0b02a31e4022d4a289
SHA256cb70fb1df4bf1412fd8b443548cc2f1fc5b254487ede7b1bdd2c374a7e582698
SHA512fb49c609ee95fe2ed4f8e6a36e8bab0ef958651fe0e208124f52a534706074ce8c15875ed5f3205ca48f942435a6708a240a711dc96d37e8b588c447fa8fd7db
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51126bbbc2f75b78f798154e49b18df74
SHA137ebb7c3f988e8aa08d9eab518fde1e1f9ec5514
SHA256c5b67a2f637c9381eacdc4755169d1199956ade9884cb1779292c1eab42555c9
SHA5121ae10171c6c6df28546caa994f3c23c5f85baa7589dcfaff01880032645846067b8f2651f23fb6a8649f70572daa55942686fb0ebc338d8acbb891dc56c35f4c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56652a922fd395d4f97f3b249fd190fa3
SHA16bb0c072646372d06a753dfa9ce1519129c7659b
SHA256001e2796b48773e4d824e8f463bbb54424a942b6f5715591a0bc8927d334ece9
SHA5122007fa24efc13d5f4ad9ba73b54d4a4a2dea0a67b82c764029a8d8ac2897bc5dca5e82a92339161dafd2264c5968699083a740dd45595129e4e579cce488cfff
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5872aab7e73b76b345ac4c145b30649b5
SHA18355062558002b5fed910e5b0fd26faec8be3269
SHA256c0a4c9387a986958922e7ce05ff9e13a9c6a32f27c75ec22265ff1b7165b364f
SHA51217481571bdcc8fed6fd23b6b6601b7f1d331fcc8ea1ebd9bb45f3aff99b8ce1aa0f87f4061c3f64fccccb5143ef3f53f3c0a8dbc22b99f04847212366e122b1c
-
Filesize
4.3MB
MD58fd45a13d0b0fc1e73c1093bf5799c7f
SHA14933562a034b06f6f867fe2f6fc131d8c99f0848
SHA256fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748
SHA51292792c37b12a998c7d722f07d33e150f660e27a4769763d3af701350681328c12297bcef5083d129d6480cb6b1df03133bd7548e8e9d9ecc6d6077c7678a1071
-
Filesize
4.3MB
MD58fd45a13d0b0fc1e73c1093bf5799c7f
SHA14933562a034b06f6f867fe2f6fc131d8c99f0848
SHA256fe8d8c528579d7bf0d15a929a85fc832bd4b1050188251ed07bdfb7f64c30748
SHA51292792c37b12a998c7d722f07d33e150f660e27a4769763d3af701350681328c12297bcef5083d129d6480cb6b1df03133bd7548e8e9d9ecc6d6077c7678a1071