Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
20s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
06/11/2023, 01:09
Static task
static1
General
-
Target
4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe
-
Size
4.1MB
-
MD5
346f7cec1ca5e01ad4915782a9766e2f
-
SHA1
2626ca931cf677616212e7cb42c813425da7b597
-
SHA256
4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e
-
SHA512
4e1abff954a2601dc89800ae37d4416655c10918bc85a20cd794b001eb0b9d8ad41dfc5f6b538fc2d0f321b060f7513886953038382f6547c356cabbbe25f1a5
-
SSDEEP
98304:NdTo180BUDmy/cmtnZjtg+GKFSPeUtG02X:/oC0KDjtJUtG0e
Malware Config
Signatures
-
Glupteba payload 12 IoCs
resource yara_rule behavioral1/memory/2920-2-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba behavioral1/memory/2920-3-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2920-40-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba behavioral1/memory/2920-71-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2920-86-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2920-307-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1636-310-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1636-412-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1636-559-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1636-828-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1636-1053-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/5076-1057-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1012 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 5076 csrss.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe = "0" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1534848907-968546671-3000393597-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe File opened for modification C:\Windows\rss 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3852 powershell.exe 3852 powershell.exe 3852 powershell.exe 2920 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 2920 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 3592 powershell.exe 3592 powershell.exe 3592 powershell.exe 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 4024 powershell.exe 4024 powershell.exe 4024 powershell.exe 32 powershell.exe 32 powershell.exe 32 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3852 powershell.exe Token: SeDebugPrivilege 2920 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Token: SeImpersonatePrivilege 2920 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe Token: SeDebugPrivilege 3592 powershell.exe Token: SeDebugPrivilege 4024 powershell.exe Token: SeDebugPrivilege 32 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2920 wrote to memory of 3852 2920 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 72 PID 2920 wrote to memory of 3852 2920 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 72 PID 2920 wrote to memory of 3852 2920 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 72 PID 1636 wrote to memory of 3592 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 77 PID 1636 wrote to memory of 3592 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 77 PID 1636 wrote to memory of 3592 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 77 PID 1636 wrote to memory of 3888 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 79 PID 1636 wrote to memory of 3888 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 79 PID 3888 wrote to memory of 1012 3888 cmd.exe 81 PID 3888 wrote to memory of 1012 3888 cmd.exe 81 PID 1636 wrote to memory of 4024 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 82 PID 1636 wrote to memory of 4024 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 82 PID 1636 wrote to memory of 4024 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 82 PID 1636 wrote to memory of 32 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 84 PID 1636 wrote to memory of 32 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 84 PID 1636 wrote to memory of 32 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 84 PID 1636 wrote to memory of 5076 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 86 PID 1636 wrote to memory of 5076 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 86 PID 1636 wrote to memory of 5076 1636 4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe"C:\Users\Admin\AppData\Local\Temp\4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe"C:\Users\Admin\AppData\Local\Temp\4f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1012
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
PID:5076
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5e330bf6cac8100bec0a15f7419cc921e
SHA1100ae3d45ce7c5143db96cb98115e1bcc96d0241
SHA256de19c5a8a07e91bc00a38e03fc84fb6e4aed897b2bb6ef92e5aa4b133009e306
SHA512b281c8e45dbe75d8453bab0ed0befda3e92fc6fd7e60dc73bbcb66916f18470d84d6755c135d39ca0f17dda0ee01a753be6eda785acc7546535a9e847dc76d2f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD58f49a991fc25d7b341f27d7d00ff40c8
SHA1d5bede7a4819ddfdc64bcf369d324388f5208673
SHA256aadfc6e92c80c1161e3ba23eee3f7f814e79ae7d4f5bd1230eae7853e42102ef
SHA5127e6256e5a666626b9781c4d8707bfd67c1d5a78187ecdec0e5d16cbe1f55ef3e2e21a7523eef3e730fc2ab1168176262d89d31c4263a14435b5177ca860e236b
-
Filesize
4.1MB
MD5346f7cec1ca5e01ad4915782a9766e2f
SHA12626ca931cf677616212e7cb42c813425da7b597
SHA2564f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e
SHA5124e1abff954a2601dc89800ae37d4416655c10918bc85a20cd794b001eb0b9d8ad41dfc5f6b538fc2d0f321b060f7513886953038382f6547c356cabbbe25f1a5
-
Filesize
4.1MB
MD5346f7cec1ca5e01ad4915782a9766e2f
SHA12626ca931cf677616212e7cb42c813425da7b597
SHA2564f8670f1f3022f7fde10833446afb03a229f11a3e308d5659cb2db535975996e
SHA5124e1abff954a2601dc89800ae37d4416655c10918bc85a20cd794b001eb0b9d8ad41dfc5f6b538fc2d0f321b060f7513886953038382f6547c356cabbbe25f1a5