Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
16/11/2023, 05:41
Static task
static1
General
-
Target
e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe
-
Size
4.2MB
-
MD5
77aef547ab6abb3c133c8380a609a3b4
-
SHA1
730d3298f045523be4063590891740c5b47e165f
-
SHA256
e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d
-
SHA512
bd86565457817b084117bca5120cd65b77a3a03023e75b6f0a1547f05b09a4e0770dc4b8434e350b92e562785f19d66160585241c4209339babd848155bb2272
-
SSDEEP
98304:09M9U+zveFd8itJtRStO0JWkONG13pGEcE42kp:KcU+z0d8IJt4lh8GtpG7X
Malware Config
Signatures
-
Glupteba payload 11 IoCs
resource yara_rule behavioral1/memory/680-2-0x0000000002E80000-0x000000000376B000-memory.dmp family_glupteba behavioral1/memory/680-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/680-207-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/680-303-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/680-304-0x0000000002E80000-0x000000000376B000-memory.dmp family_glupteba behavioral1/memory/4272-307-0x0000000002D70000-0x000000000365B000-memory.dmp family_glupteba behavioral1/memory/4272-308-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4272-560-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4272-804-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4272-836-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4272-1054-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5100 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 356 csrss.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-946614337-2046421199-3397417319-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe File opened for modification C:\Windows\rss e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3092 powershell.exe 3092 powershell.exe 3092 powershell.exe 680 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 680 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 3028 powershell.exe 3028 powershell.exe 3028 powershell.exe 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 3256 powershell.exe 3256 powershell.exe 3256 powershell.exe 1616 powershell.exe 1616 powershell.exe 1616 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3092 powershell.exe Token: SeDebugPrivilege 680 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Token: SeImpersonatePrivilege 680 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 3256 powershell.exe Token: SeDebugPrivilege 1616 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 680 wrote to memory of 3092 680 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 72 PID 680 wrote to memory of 3092 680 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 72 PID 680 wrote to memory of 3092 680 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 72 PID 4272 wrote to memory of 3028 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 77 PID 4272 wrote to memory of 3028 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 77 PID 4272 wrote to memory of 3028 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 77 PID 4272 wrote to memory of 524 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 79 PID 4272 wrote to memory of 524 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 79 PID 524 wrote to memory of 5100 524 cmd.exe 81 PID 524 wrote to memory of 5100 524 cmd.exe 81 PID 4272 wrote to memory of 3256 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 82 PID 4272 wrote to memory of 3256 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 82 PID 4272 wrote to memory of 3256 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 82 PID 4272 wrote to memory of 1616 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 85 PID 4272 wrote to memory of 1616 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 85 PID 4272 wrote to memory of 1616 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 85 PID 4272 wrote to memory of 356 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 86 PID 4272 wrote to memory of 356 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 86 PID 4272 wrote to memory of 356 4272 e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe"C:\Users\Admin\AppData\Local\Temp\e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe"C:\Users\Admin\AppData\Local\Temp\e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:5100
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
PID:356
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5dc228c368c6ddd0d1837c53292363cd8
SHA185defc3a00f4e5d91efb76a74b2ec3c3b199eff2
SHA2566391eb10b6eba0d153fb1b039b1b264d420190817ff492bab41b13c4f2c9c8a3
SHA5123c1b32bb3253ba67255a162c26a90bec7f7d9a748f106b65161493ce2461a157278cedbb25c33012ec4503eb8db6e27af46f486f095d4070cc278430489a3856
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD59bd8b4cc9a2ec9bb8f103c93fb6d340f
SHA1ea337c0e67648bd9b63337d6e2430ad0ac30f185
SHA256b794afa71466ad6ca1589146701e9cdfab41b967531fe6903952f9f7ff2ff830
SHA512cbdf3f01e859619fc2be0902d1badbf49c83e71137e1cde70a38fde76bc7ea50883682ad3574403e88e82f0616790f4e0d060b469281cc22cc64b1408467274d
-
Filesize
4.2MB
MD577aef547ab6abb3c133c8380a609a3b4
SHA1730d3298f045523be4063590891740c5b47e165f
SHA256e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d
SHA512bd86565457817b084117bca5120cd65b77a3a03023e75b6f0a1547f05b09a4e0770dc4b8434e350b92e562785f19d66160585241c4209339babd848155bb2272
-
Filesize
4.2MB
MD577aef547ab6abb3c133c8380a609a3b4
SHA1730d3298f045523be4063590891740c5b47e165f
SHA256e7a02922687ff5c47aa236a92977a7ac3145068210e4a1b8a24559ea99feea3d
SHA512bd86565457817b084117bca5120cd65b77a3a03023e75b6f0a1547f05b09a4e0770dc4b8434e350b92e562785f19d66160585241c4209339babd848155bb2272