Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe
Resource
win10v2004-20240226-en
General
-
Target
a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe
-
Size
4.2MB
-
MD5
a3929426f6905faa5f4acb7953cc92ca
-
SHA1
24e48ebb800b5b5b7a93c357f5da4aaf54a46ebb
-
SHA256
a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1
-
SHA512
94d7fd056d52f4667ffbe4dbab0673b0ca21d12022f2dd317c67358ce788dae4b9bd1b764015454dcd2efa0a5d649c4a6c38e27ba84d63c271ede3517270da89
-
SSDEEP
98304:hcc1VimWaGwQyR5Ub10pmF8uf1WAu/wu8XRZ5MLcu:6gqwQyDUbupZwu/38XH5MLh
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/812-2-0x0000000003140000-0x0000000003A2B000-memory.dmp family_glupteba behavioral1/memory/812-3-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/812-55-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/2592-57-0x0000000003000000-0x00000000038EB000-memory.dmp family_glupteba behavioral1/memory/2592-58-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/2592-157-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-260-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-269-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-271-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-273-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-275-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-277-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-279-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-281-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-283-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-285-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-287-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-289-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba behavioral1/memory/4996-291-0x0000000000400000-0x0000000000ED8000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3348 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 4996 csrss.exe 3984 injector.exe 4164 windefender.exe 3048 windefender.exe -
resource yara_rule behavioral1/files/0x000a00000002321d-263.dat upx behavioral1/memory/4164-268-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3048-270-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3048-274-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe File created C:\Windows\rss\csrss.exe a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5080 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1780 812 WerFault.exe 87 4456 2592 WerFault.exe 98 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2084 schtasks.exe 2484 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2452 powershell.exe 2452 powershell.exe 812 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 812 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 596 powershell.exe 596 powershell.exe 596 powershell.exe 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 4176 powershell.exe 4176 powershell.exe 4176 powershell.exe 3020 powershell.exe 3020 powershell.exe 3020 powershell.exe 4548 powershell.exe 4548 powershell.exe 4548 powershell.exe 508 powershell.exe 508 powershell.exe 508 powershell.exe 880 powershell.exe 880 powershell.exe 880 powershell.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 4996 csrss.exe 4996 csrss.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 4996 csrss.exe 4996 csrss.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 4996 csrss.exe 4996 csrss.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe 3984 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 812 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Token: SeImpersonatePrivilege 812 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe Token: SeDebugPrivilege 596 powershell.exe Token: SeDebugPrivilege 4176 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 4548 powershell.exe Token: SeDebugPrivilege 508 powershell.exe Token: SeDebugPrivilege 880 powershell.exe Token: SeSystemEnvironmentPrivilege 4996 csrss.exe Token: SeSecurityPrivilege 5080 sc.exe Token: SeSecurityPrivilege 5080 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 812 wrote to memory of 2452 812 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 91 PID 812 wrote to memory of 2452 812 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 91 PID 812 wrote to memory of 2452 812 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 91 PID 2592 wrote to memory of 596 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 102 PID 2592 wrote to memory of 596 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 102 PID 2592 wrote to memory of 596 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 102 PID 2592 wrote to memory of 4836 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 106 PID 2592 wrote to memory of 4836 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 106 PID 4836 wrote to memory of 3348 4836 cmd.exe 108 PID 4836 wrote to memory of 3348 4836 cmd.exe 108 PID 2592 wrote to memory of 4176 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 109 PID 2592 wrote to memory of 4176 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 109 PID 2592 wrote to memory of 4176 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 109 PID 2592 wrote to memory of 3020 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 113 PID 2592 wrote to memory of 3020 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 113 PID 2592 wrote to memory of 3020 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 113 PID 2592 wrote to memory of 4996 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 115 PID 2592 wrote to memory of 4996 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 115 PID 2592 wrote to memory of 4996 2592 a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe 115 PID 4996 wrote to memory of 4548 4996 csrss.exe 118 PID 4996 wrote to memory of 4548 4996 csrss.exe 118 PID 4996 wrote to memory of 4548 4996 csrss.exe 118 PID 4996 wrote to memory of 508 4996 csrss.exe 123 PID 4996 wrote to memory of 508 4996 csrss.exe 123 PID 4996 wrote to memory of 508 4996 csrss.exe 123 PID 4996 wrote to memory of 880 4996 csrss.exe 126 PID 4996 wrote to memory of 880 4996 csrss.exe 126 PID 4996 wrote to memory of 880 4996 csrss.exe 126 PID 4996 wrote to memory of 3984 4996 csrss.exe 128 PID 4996 wrote to memory of 3984 4996 csrss.exe 128 PID 4164 wrote to memory of 4964 4164 windefender.exe 134 PID 4164 wrote to memory of 4964 4164 windefender.exe 134 PID 4164 wrote to memory of 4964 4164 windefender.exe 134 PID 4964 wrote to memory of 5080 4964 cmd.exe 135 PID 4964 wrote to memory of 5080 4964 cmd.exe 135 PID 4964 wrote to memory of 5080 4964 cmd.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe"C:\Users\Admin\AppData\Local\Temp\a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe"C:\Users\Admin\AppData\Local\Temp\a8fd268f71cf14f567150d24036a970b430f2394b2e59f3934f3ddc247c8bbf1.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3348
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2084
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2688
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:508
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2484
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 5883⤵
- Program crash
PID:4456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 9322⤵
- Program crash
PID:1780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 812 -ip 8121⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2592 -ip 25921⤵PID:2252
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
181KB
MD50f315edff94dbd1e283b1b8d53fdf846
SHA17cf6a3e2be157598d0161befdc7654dc7e8640e2
SHA2566b36ddc7cab7626b515e000a4d719f493280c90b49c51ae21e47607b55da57cc
SHA5121e2b999716ef33b23c8a2c18b3a9c9b2412292d6a860c6c923cc3dcc0948d93ffd41a1d3cd5208abb0a794ee518d7fb4f725a2abc574fe4406042c7cf18b6cce
-
Filesize
57KB
MD51868d1207d734ac95ef900476b1d1fc2
SHA158dc6fd96a51edd9894302048989a40f239159c2
SHA2567d75b5eb33370ba631f86ab8d9582866df942897066b2a12f10ae8b0202f48af
SHA512ce2a0b5d43539278aebde9e7389db357e4bcaf864227f46abc8565361c17ccfbac0a9c0ef058b71f35cb0331b910a70f40de9c9f05232fd8f7d5044ffefc470c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50496fe8dd8f5c1f37030f1f471571de6
SHA184b1d26a069f2269791d61be4de5569458069c3b
SHA256f47aa6aec65396ee27dbd22e632668beb556e3a67a6e8c5e88cb29eb88e80594
SHA512147962e7c1c1677951ed60a8a85c1d7501439e91f6d387cd854509666695d80e2963892ec9719bb21c9c70ee2a57576b8005b1c0fcfa75dbd3e3938e8ccbb215
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d502bcfc42016bff0031810c3ccf0992
SHA1d37e5c42e4bfdd7158849608a29b74cdca57d184
SHA256df2669a0b29d059ba7515d18e1df1579613bf4b3481f443a4a8a3b840cbb99b5
SHA51254effaa752c803b1383eee826a240a21824020ff4e82e386a354f8d95a5db98404e030c44bd3384d43155668deed8b113412d5e19528216b3080deadf03abf41
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD576a499ba417acad43ac3c7d2579ca505
SHA1e24fe3b9aeef903dcf3bbd6894ad4ef971549104
SHA256ffe45405ce87a488a1b064eac1caf71edcd0d15c5e6997cc995e8650ecf153aa
SHA512ccbfc86831f0791b9c5ac56a1a4fa9c686f5099150ffc87268946508dee2da8c8c9564d240f23aae3e88f1aeca691de0ecc85045dc01597b2c4a26ed99ea19b0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52db5ad1ceb84e0b38e8693298167eb7d
SHA180766bb515f37f51073b57dd893b7b0ecf102e1b
SHA2564a7b2e5a68e145e135a6861efd9a44c08b915b1440a6047b0d5d4eee53c67538
SHA5128e6ebd329ea3b2fd0368a82594675d9ff19a361aecdfbee043d8a5462e35b95dd4d01c70807a60d5dbbc4f88b8ad968b7b75a3356720a21a0e09349c821316f1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55538ca782f3ef60fd517f963ba641d05
SHA1211be20cd5f65d162e43c44d4a25bddc45549db6
SHA25619d2cbbeaa5af0cb930b87affec636a38a2ed1fb727026e98816e7812b81df13
SHA512ca3f1cd9915946b5ec6381505d3f2e2c36e25ae7333a1a301e1b733d8a3f22c5c534e13cd750931bbb44d95006f5eb01d61e8bfbc3558251b74249757545af3a
-
Filesize
335KB
MD522410ab9e244fd09cba39da0b05ba256
SHA1aa14742109154add6bba5c7e52f22fad2721bb15
SHA256df151511c991534d65936535b08522d0152605bfd6c15595df5da4cfe54b90e3
SHA51294661960cf6c52d894b8599b70810dc546eb5846ee0afdf81de047b0f8f7036e197e4ed6f991bfa4f05e32341e28fd0e239a132fb342e262781ac49c365e467a
-
Filesize
425KB
MD5113595a3aa17a5609d8b538690e89e9a
SHA13f2c302c7fb14686f179812bd200d95e5562996d
SHA256124ceeed03adc5b7a95183b44b618b2ac7fafafffe78498d1293cef0fa57bb49
SHA5127d4bc71e3c73ffc6b8bb6e42afbef4899a2a309f60efe904b484fe61debb8535f97701d3f33e05fd883be251b9d97ed22691750daef92c78f260617edc7e8594
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec