Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe
Resource
win7-20240220-en
General
-
Target
b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe
-
Size
4.2MB
-
MD5
89dbbd2f1461d68ee434f6892130a1b1
-
SHA1
4e145e27f03fc19db5d148587fd58edabc5f05fd
-
SHA256
b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5
-
SHA512
32d909207414d3a2c92d1b856b24261ba5cfa9ac290a1ef32982684b788cc12aef480549a769118a59f6f14c5bcc6d862b61d4d9ab622ee7d16b9549ad865d08
-
SSDEEP
98304:teW8UzsHIbLf9dWRHWVRhdNR5S1sJRNc/DhpLv/dFcsAkZ5z:q0L1dWRH6Rb9w/n3rVAkT
Malware Config
Signatures
-
Glupteba payload 22 IoCs
resource yara_rule behavioral1/memory/2220-2-0x0000000003B60000-0x000000000444B000-memory.dmp family_glupteba behavioral1/memory/2220-3-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2220-4-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2220-7-0x0000000003B60000-0x000000000444B000-memory.dmp family_glupteba behavioral1/memory/2680-9-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2680-18-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-22-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-103-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-116-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-117-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-118-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-119-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-120-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-121-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-122-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-123-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-124-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-125-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-126-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-127-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-128-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral1/memory/2068-129-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe -
Detects Windows executables referencing non-Windows User-Agents 20 IoCs
resource yara_rule behavioral1/memory/2220-3-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2220-4-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2680-9-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2680-18-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-22-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-103-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-116-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-117-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-118-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-119-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-120-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-121-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-122-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-123-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-124-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-125-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-126-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-127-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-128-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2068-129-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables Discord URL observed in first stage droppers 20 IoCs
resource yara_rule behavioral1/memory/2220-3-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2220-4-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2680-9-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2680-18-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-22-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-103-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-116-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-117-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-118-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-119-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-120-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-121-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-122-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-123-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-124-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-125-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-126-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-127-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-128-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral1/memory/2068-129-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables containing URLs to raw contents of a Github gist 20 IoCs
resource yara_rule behavioral1/memory/2220-3-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2220-4-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2680-9-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2680-18-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-22-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-103-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-116-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-117-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-118-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-119-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-120-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-121-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-122-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-123-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-124-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-125-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-126-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-127-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-128-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral1/memory/2068-129-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 20 IoCs
resource yara_rule behavioral1/memory/2220-3-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2220-4-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2680-9-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2680-18-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-22-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-103-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-116-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-117-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-118-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-119-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-120-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-121-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-122-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-123-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-124-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-125-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-126-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-127-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-128-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral1/memory/2068-129-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables referencing many varying, potentially fake Windows User-Agents 20 IoCs
resource yara_rule behavioral1/memory/2220-3-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2220-4-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2680-9-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2680-18-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-22-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-103-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-116-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-117-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-118-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-119-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-120-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-121-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-122-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-123-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-124-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-125-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-126-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-127-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-128-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral1/memory/2068-129-0x0000000000400000-0x0000000001E17000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2492 netsh.exe -
Executes dropped EXE 3 IoCs
pid Process 2068 csrss.exe 1960 patch.exe 2076 injector.exe -
Loads dropped DLL 9 IoCs
pid Process 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 876 Process not Found 1960 patch.exe 1960 patch.exe 1960 patch.exe 1960 patch.exe 1960 patch.exe 2068 csrss.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Logs\CBS\CbsPersist_20240312030539.cab makecab.exe File opened for modification C:\Windows\rss b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe File created C:\Windows\rss\csrss.exe b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 860 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-422 = "Russian Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-551 = "North Asia Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-521 = "N. Central Asia Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-552 = "North Asia Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe 2076 injector.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2220 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Token: SeImpersonatePrivilege 2220 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe Token: SeSystemEnvironmentPrivilege 2068 csrss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2112 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 33 PID 2680 wrote to memory of 2112 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 33 PID 2680 wrote to memory of 2112 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 33 PID 2680 wrote to memory of 2112 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 33 PID 2112 wrote to memory of 2492 2112 cmd.exe 35 PID 2112 wrote to memory of 2492 2112 cmd.exe 35 PID 2112 wrote to memory of 2492 2112 cmd.exe 35 PID 2680 wrote to memory of 2068 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 36 PID 2680 wrote to memory of 2068 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 36 PID 2680 wrote to memory of 2068 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 36 PID 2680 wrote to memory of 2068 2680 b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe 36 PID 2068 wrote to memory of 2076 2068 csrss.exe 44 PID 2068 wrote to memory of 2076 2068 csrss.exe 44 PID 2068 wrote to memory of 2076 2068 csrss.exe 44 PID 2068 wrote to memory of 2076 2068 csrss.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe"C:\Users\Admin\AppData\Local\Temp\b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe"C:\Users\Admin\AppData\Local\Temp\b79c2d817b0ced7a0f16ebbb1a91defae311debe95bf3e54b8194003bb9985c5.exe"2⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2492
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:860
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240312030539.log C:\Windows\Logs\CBS\CbsPersist_20240312030539.cab1⤵
- Drops file in Windows directory
PID:2688
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
1.2MB
MD55dfb78797711bcb5fc4f4e8a91477034
SHA19119fe2cefd35d64aea2167f990dd26bd70fd2fc
SHA2567f79ce338da2aeb0e5536091383ad1566212c07cdaa157c3c29aeaf80a352aed
SHA51287bfe2c414a4efba774c911f5ee8e8047bec4df2cee689b74d66588818701f3098348758512dde0afa63451958486e127d925bd975fa5486e704699312397d3c
-
Filesize
686KB
MD5186c3a2e6fd16cb05bd46cb1a41555e2
SHA1ddfd25d5be90e54caa711a72aaa87d0f36eefb4a
SHA256c812e29ec8438f6327f0ecb59bc662b0240cd63fa3390d2ca7fc24b55527b09b
SHA5121acfe6318dfb40b4b4d63bb0883e6df91ab825dbfa4b95d05b44c1d2b199888d53aac8e14a21f9b3644e3e62dc801e656ceb95f9a34f605d35dd076c6b42eec3
-
Filesize
1.7MB
MD5f039386a3736fb98f13b67895482f7d7
SHA198606fcec92964d89646d26bb534fd1b415737f1
SHA25642969bc3409df4e063c16863212b3002df7248e86b01d6bc0a13da572935e938
SHA51283efe196895ce2762b33554e61773302098109a94d9ddded8bbf6b70d5c98dd3deaf5f79002032776c536b9234c61da046862a66128ce7bc353bdc8ffdec8817
-
Filesize
1.4MB
MD58f9441286d306bdcd60cc72ace1c5343
SHA1c3c5a264d9444592e14bc73782d4c0e13361d67a
SHA2568c45099707e5123fff8a3e1ac491184f830fb28e47bc852199c2c433e52364bd
SHA51279751ec7c02775e877194f2a383a21a739074c905b974fcd1f6f14ba362b85d30788c8777eaf066c50a86ac2c89f41b1d7486108d8524c992c0b194b0e8a03c2
-
Filesize
907KB
MD58554c27b903d9b125ecb1091ee715e7e
SHA16dcd24b83f03521b394a6751695df1133e5a8178
SHA256bab77d2a3528768901cc33f83cd5ded2587c11fd74cd2cba13bea6972596b1af
SHA512a752d555e38e24387824b19a68b9ae428cba162a333df40b7ce1c0208c65452ef879d98f7f9b023b9c2a3541cb2db9e2bb683483e762a3513ab3ad873b686fc5
-
Filesize
981KB
MD51f34d1086a3e9fa864b8b0da50c29ca3
SHA1c955e7841d1aed9ecb022eac4e6930643fdcbe28
SHA256215bea33b9b9aee9de04f09429b2b0992332fa53659043b9a917820bd803448a
SHA5122c947aa0ca361dcda3bca6478ecf87830d94ae67a1d6db564e3f0fc72fb3de59fdd10343756974c0dd15d1f44b052ecdae5902769382724622f58f84ac4fd904
-
Filesize
824KB
MD569bb459214115cbf049d76e9ac552e4a
SHA16315b5f166aaea2f68b9a91243e847e85de592a9
SHA2563fc1abb3b4ab89f1886c06de86753fe2752c458541145dada49a55067cee0030
SHA512736070262cd1103f23ebd0ebc880698872b994cc370ad81ee74b16a36f4be1a0c2c242a012461b4642cfedd05dde0c25a3532c8cdecd85a18c660d9d31debcd2
-
Filesize
1.1MB
MD5b7bc592541685e18e43851a2987964b9
SHA1035d0272518de286da97034eec089fd0bd90cd7a
SHA2560daaf1987a41b3efa01eac06b78a1b0a20afe1538c1682622c471c8187a93703
SHA512c17d1fcf30f6b97248d840d67f583072938ccdb69d7e02b0459bee0100ed26cb1010de316b6db1d4da33f7ec911f6a14eef33fd0c11b525919a7ce0b6cc24b53
-
Filesize
1.0MB
MD56a59d88c8f0d5f52c6fbee03329df1ae
SHA10a72f84d715ebca7aa58f652da1678cbe3dd48bf
SHA256cb025f512d204d0c3d7a2cd3dfa3ac6ec5100341c5497362eb66850bef30e472
SHA512b52dfe2be687e1eeb68c9b695ed53fe73f61802de1de0588e9aefda0d525927c35aaa24b0abef0cb0d5fd5888e15178bc00a7c528b684f865ff5ece66d1119f8
-
Filesize
163KB
MD55c399d34d8dc01741269ff1f1aca7554
SHA1e0ceed500d3cef5558f3f55d33ba9c3a709e8f55
SHA256e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f
SHA5128ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d
-
Filesize
1.6MB
MD5d5ef4ef30797809004b11c2ea06d168c
SHA11b39be251295aa604dac3fc6a5185a53596176ee
SHA256093a923c3bef8eb8f09968a6a8fc016e273913f2fc0859bfb36dcddb192f7f7a
SHA512bb5efe89c77e3e934bb47b32e714960316f3f75132c675d25d69184b2b93a53219b04cfb9cfe2c4025b5ccb2249134a37b286bb7d9423c9107da3c4c44960350
-
Filesize
1.7MB
MD5d3ce643ee5ad2c6a4b9780e334470c6f
SHA1f94dac40d90314aee2e1a8abc48ee9599f8c0806
SHA256e36e8a679f1e3ea8283cf1fd58cac7657fc1bcc250705691f31c9eea7947de7d
SHA51208dd216286bcac89d05b5e0c1efe36c41995277625b297342c16ed66461c30c9681c309aa3129eba56790d54d436975239d10c7247023dbd06b2046cca03a141