Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/04/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe
Resource
win10v2004-20240412-en
General
-
Target
20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe
-
Size
4.2MB
-
MD5
8d71b8e8b589239f198164a0faebdf5f
-
SHA1
1f7f4cf9e56b1c113c4157fd18a05064736bcf63
-
SHA256
20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52
-
SHA512
8ae3f1778b5ec4353eaed944cd3511c3a7718467ec258e72b5f3681f1866cd3e0b3377cc590bb461e8bfbcd3378dd5281eef5feee311467a114f3f2842abcecf
-
SSDEEP
98304:u3vZTnjS5GCKvA/oSgOrUma7UiV1QsRLti3Sky:+ZTnjSw8A2VCUio4Lxb
Malware Config
Signatures
-
Glupteba payload 21 IoCs
resource yara_rule behavioral2/memory/1592-2-0x0000000005220000-0x0000000005B0B000-memory.dmp family_glupteba behavioral2/memory/1592-3-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1592-27-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1592-52-0x0000000005220000-0x0000000005B0B000-memory.dmp family_glupteba behavioral2/memory/1592-55-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1804-56-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1804-84-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1804-103-0x0000000004E10000-0x000000000520A000-memory.dmp family_glupteba behavioral2/memory/1804-116-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1804-118-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1804-143-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1804-149-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1492-197-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1492-246-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1492-254-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1492-258-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1492-261-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1492-264-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1492-267-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1492-270-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/1492-273-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2228 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 1492 csrss.exe 5024 injector.exe 2036 windefender.exe 788 windefender.exe -
resource yara_rule behavioral2/files/0x000200000002a9ea-250.dat upx behavioral2/memory/2036-255-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/788-265-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/788-274-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1734202354-1504186683-2192872036-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\S-1-5-21-1734202354-1504186683-2192872036-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3040 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2160 schtasks.exe 1444 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-511 = "Central Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 powershell.exe 3048 powershell.exe 1592 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1592 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 4460 powershell.exe 4460 powershell.exe 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 1240 powershell.exe 1240 powershell.exe 2116 powershell.exe 2116 powershell.exe 4576 powershell.exe 4576 powershell.exe 3428 powershell.exe 3428 powershell.exe 4936 powershell.exe 4936 powershell.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 1492 csrss.exe 1492 csrss.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 1492 csrss.exe 1492 csrss.exe 5024 injector.exe 5024 injector.exe 1492 csrss.exe 1492 csrss.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe 5024 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 1592 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Token: SeImpersonatePrivilege 1592 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe Token: SeDebugPrivilege 4460 powershell.exe Token: SeDebugPrivilege 1240 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 4576 powershell.exe Token: SeDebugPrivilege 3428 powershell.exe Token: SeDebugPrivilege 4936 powershell.exe Token: SeSystemEnvironmentPrivilege 1492 csrss.exe Token: SeSecurityPrivilege 3040 sc.exe Token: SeSecurityPrivilege 3040 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3048 1592 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 78 PID 1592 wrote to memory of 3048 1592 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 78 PID 1592 wrote to memory of 3048 1592 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 78 PID 1804 wrote to memory of 4460 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 83 PID 1804 wrote to memory of 4460 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 83 PID 1804 wrote to memory of 4460 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 83 PID 1804 wrote to memory of 1444 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 85 PID 1804 wrote to memory of 1444 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 85 PID 1444 wrote to memory of 2228 1444 cmd.exe 87 PID 1444 wrote to memory of 2228 1444 cmd.exe 87 PID 1804 wrote to memory of 1240 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 88 PID 1804 wrote to memory of 1240 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 88 PID 1804 wrote to memory of 1240 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 88 PID 1804 wrote to memory of 2116 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 90 PID 1804 wrote to memory of 2116 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 90 PID 1804 wrote to memory of 2116 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 90 PID 1804 wrote to memory of 1492 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 92 PID 1804 wrote to memory of 1492 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 92 PID 1804 wrote to memory of 1492 1804 20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe 92 PID 1492 wrote to memory of 4576 1492 csrss.exe 93 PID 1492 wrote to memory of 4576 1492 csrss.exe 93 PID 1492 wrote to memory of 4576 1492 csrss.exe 93 PID 1492 wrote to memory of 3428 1492 csrss.exe 99 PID 1492 wrote to memory of 3428 1492 csrss.exe 99 PID 1492 wrote to memory of 3428 1492 csrss.exe 99 PID 1492 wrote to memory of 4936 1492 csrss.exe 101 PID 1492 wrote to memory of 4936 1492 csrss.exe 101 PID 1492 wrote to memory of 4936 1492 csrss.exe 101 PID 1492 wrote to memory of 5024 1492 csrss.exe 103 PID 1492 wrote to memory of 5024 1492 csrss.exe 103 PID 2036 wrote to memory of 332 2036 windefender.exe 109 PID 2036 wrote to memory of 332 2036 windefender.exe 109 PID 2036 wrote to memory of 332 2036 windefender.exe 109 PID 332 wrote to memory of 3040 332 cmd.exe 110 PID 332 wrote to memory of 3040 332 cmd.exe 110 PID 332 wrote to memory of 3040 332 cmd.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe"C:\Users\Admin\AppData\Local\Temp\20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe"C:\Users\Admin\AppData\Local\Temp\20974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2228
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2160
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1444
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:788
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e0ee88a0a2e519a9ab1f009aafdd6718
SHA1983762492b5977b0f2c548051471183d79c80fab
SHA256bd0845b67818fcb2754523723480ac011ebbceaf405373249d30403148e0f8c8
SHA512dabf072cd692ee7b9fda9f00e6bd251902247f38cfc9c1a2e055b872b70046991e49ee40cbf78e9978152bb2e749a56e6a9f761535a2d13ee28479d6c5755ec2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a0d4e9f22fc7d46cb341069a565e7c40
SHA133a9e6ad361054f3957c1f00539d18e27ea285c7
SHA2563cb16df6fbb7d6b2ef53973817a713aa48c074656b71cec503238764b9de5f71
SHA5128b4aee24154f76f55385d14accdebe5b1cfd0eece7f27f38afd4ae6130a1a567fa41113eab2d8504daf6209af30b25d0c009b422344159778614eb649c255d4e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54ddbdad18fb8d1b5661362844232ba38
SHA1ba55e0070b7c02e3b2fdaeb794e37d6097e49c67
SHA25606b37b3a16c752be8a04add21b8a1f99ac50269603670b73c6396459fe9afec7
SHA512e793f94d3e324ed7634f13afb98a316513409ee5882853c73cfdf416794e09907ede61358094304bdc86cee9a92cf191524a44d2d734ca822c85196e9fff3340
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fee003f5ecc11e094ee6ab8bd1e6305e
SHA13dc145d4cd658ddb9cd4e0423f78045509045606
SHA25632e9d857447df4bba13ee32d990a97f098d0a8e6d6f39fd71accaa22ed4dcdf1
SHA512f710e27fca5dacae70d4fe5eb7c68ebb7cba9862160d0252e0488a8c6c83833cc6a9be2df67c4c847646a4d26fc731b40d5a22d1fa9a425836ea27b1aca52fbc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c733a7f8908109b986420aab3fcee8cb
SHA148d447638de29658d4c2884276e1e40e27f9a180
SHA2568b3537b2d814bc715831817e472949a058b5ffa44bb9ab6abc737d651bacb97f
SHA512f9a857438a2035b38bff18b42c00d3f0e19894dbd60bc3a9fd6a85a84a0681d1ced6ff2ce97175b215aadc59057f28ddd42738ca605cde1c2ad8972714ae299a
-
Filesize
4.2MB
MD58d71b8e8b589239f198164a0faebdf5f
SHA11f7f4cf9e56b1c113c4157fd18a05064736bcf63
SHA25620974159ea8221e4a80e4bb1290d57cf172ef2c7ba2f9b566c0cac88dd37ed52
SHA5128ae3f1778b5ec4353eaed944cd3511c3a7718467ec258e72b5f3681f1866cd3e0b3377cc590bb461e8bfbcd3378dd5281eef5feee311467a114f3f2842abcecf
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec