Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe
Resource
win7-20240221-en
General
-
Target
65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe
-
Size
4.2MB
-
MD5
aaf32430b1db20419ee11a21f9fff012
-
SHA1
c88cc08c0c5b4c03f259b520074fbf190c2b3377
-
SHA256
65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98
-
SHA512
2d6836f289a3c759917901e62bcdf8a763537a0ac627a447921209211471ba4d9a51ca64c005c213dcfcb3b324413e48896b55fe0ccd946f02f5ddd94bfb382d
-
SSDEEP
98304:9IBNXOOfwLGhP6KRoj027D5HGyNAiNcOh9MZ99WifgA28ff94Zz:Ejfa7j0YDNAHCC9Miz28ffM
Malware Config
Signatures
-
Glupteba payload 20 IoCs
resource yara_rule behavioral2/memory/4788-2-0x0000000005230000-0x0000000005B1B000-memory.dmp family_glupteba behavioral2/memory/4788-3-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1304-56-0x0000000005200000-0x0000000005AEB000-memory.dmp family_glupteba behavioral2/memory/1304-57-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/4788-70-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1304-145-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1304-182-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-255-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-259-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-262-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-273-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-277-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-282-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-286-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-289-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-293-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-297-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-301-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-305-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba behavioral2/memory/1924-309-0x0000000000400000-0x0000000003111000-memory.dmp family_glupteba -
Detects Windows executables referencing non-Windows User-Agents 18 IoCs
resource yara_rule behavioral2/memory/4788-3-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1304-57-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/4788-70-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1304-145-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1304-182-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-255-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-259-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-262-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-273-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-277-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-282-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-286-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-289-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-293-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-297-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-301-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-305-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1924-309-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables Discord URL observed in first stage droppers 18 IoCs
resource yara_rule behavioral2/memory/4788-3-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1304-57-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/4788-70-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1304-145-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1304-182-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-255-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-259-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-262-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-273-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-277-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-282-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-286-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-289-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-293-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-297-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-301-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-305-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1924-309-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables containing URLs to raw contents of a Github gist 18 IoCs
resource yara_rule behavioral2/memory/4788-3-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1304-57-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4788-70-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1304-145-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1304-182-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-255-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-259-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-262-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-273-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-277-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-282-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-286-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-289-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-293-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-297-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-301-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-305-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1924-309-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 18 IoCs
resource yara_rule behavioral2/memory/4788-3-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1304-57-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/4788-70-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1304-145-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1304-182-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-255-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-259-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-262-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-273-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-277-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-282-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-286-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-289-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-293-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-297-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-301-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-305-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1924-309-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables referencing many varying, potentially fake Windows User-Agents 18 IoCs
resource yara_rule behavioral2/memory/4788-3-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1304-57-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/4788-70-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1304-145-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1304-182-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-255-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-259-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-262-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-273-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-277-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-282-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-286-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-289-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-293-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-297-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-301-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-305-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1924-309-0x0000000000400000-0x0000000003111000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA -
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/files/0x000900000002342b-266.dat UPX behavioral2/memory/1500-271-0x0000000000400000-0x00000000008DF000-memory.dmp UPX behavioral2/memory/2984-276-0x0000000000400000-0x00000000008DF000-memory.dmp UPX behavioral2/memory/2984-284-0x0000000000400000-0x00000000008DF000-memory.dmp UPX -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2684 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 1924 csrss.exe 4240 injector.exe 1500 windefender.exe 2984 windefender.exe -
resource yara_rule behavioral2/files/0x000900000002342b-266.dat upx behavioral2/memory/1500-271-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2984-276-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2984-284-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe File created C:\Windows\rss\csrss.exe 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4324 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4552 schtasks.exe 2480 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2892 = "Sudan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2648 powershell.exe 2648 powershell.exe 4788 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 4788 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 1952 powershell.exe 1952 powershell.exe 1952 powershell.exe 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 3628 powershell.exe 3628 powershell.exe 3628 powershell.exe 2296 powershell.exe 2296 powershell.exe 2296 powershell.exe 1472 powershell.exe 1472 powershell.exe 1472 powershell.exe 3280 powershell.exe 3280 powershell.exe 3280 powershell.exe 3136 powershell.exe 3136 powershell.exe 3136 powershell.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 1924 csrss.exe 1924 csrss.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 1924 csrss.exe 1924 csrss.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe 4240 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 4788 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Token: SeImpersonatePrivilege 4788 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe Token: SeDebugPrivilege 1952 powershell.exe Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 2296 powershell.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 3280 powershell.exe Token: SeDebugPrivilege 3136 powershell.exe Token: SeSystemEnvironmentPrivilege 1924 csrss.exe Token: SeSecurityPrivilege 4324 sc.exe Token: SeSecurityPrivilege 4324 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4788 wrote to memory of 2648 4788 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 87 PID 4788 wrote to memory of 2648 4788 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 87 PID 4788 wrote to memory of 2648 4788 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 87 PID 1304 wrote to memory of 1952 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 102 PID 1304 wrote to memory of 1952 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 102 PID 1304 wrote to memory of 1952 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 102 PID 1304 wrote to memory of 1792 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 106 PID 1304 wrote to memory of 1792 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 106 PID 1792 wrote to memory of 2684 1792 cmd.exe 108 PID 1792 wrote to memory of 2684 1792 cmd.exe 108 PID 1304 wrote to memory of 3628 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 110 PID 1304 wrote to memory of 3628 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 110 PID 1304 wrote to memory of 3628 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 110 PID 1304 wrote to memory of 2296 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 112 PID 1304 wrote to memory of 2296 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 112 PID 1304 wrote to memory of 2296 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 112 PID 1304 wrote to memory of 1924 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 114 PID 1304 wrote to memory of 1924 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 114 PID 1304 wrote to memory of 1924 1304 65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe 114 PID 1924 wrote to memory of 1472 1924 csrss.exe 115 PID 1924 wrote to memory of 1472 1924 csrss.exe 115 PID 1924 wrote to memory of 1472 1924 csrss.exe 115 PID 1924 wrote to memory of 3280 1924 csrss.exe 121 PID 1924 wrote to memory of 3280 1924 csrss.exe 121 PID 1924 wrote to memory of 3280 1924 csrss.exe 121 PID 1924 wrote to memory of 3136 1924 csrss.exe 123 PID 1924 wrote to memory of 3136 1924 csrss.exe 123 PID 1924 wrote to memory of 3136 1924 csrss.exe 123 PID 1924 wrote to memory of 4240 1924 csrss.exe 125 PID 1924 wrote to memory of 4240 1924 csrss.exe 125 PID 1500 wrote to memory of 3932 1500 windefender.exe 133 PID 1500 wrote to memory of 3932 1500 windefender.exe 133 PID 1500 wrote to memory of 3932 1500 windefender.exe 133 PID 3932 wrote to memory of 4324 3932 cmd.exe 134 PID 3932 wrote to memory of 4324 3932 cmd.exe 134 PID 3932 wrote to memory of 4324 3932 cmd.exe 134 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe"C:\Users\Admin\AppData\Local\Temp\65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe"C:\Users\Admin\AppData\Local\Temp\65a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2684
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4552
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2480
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2984
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cc69aeaca985c4d4bc83160d00c79bbe
SHA184ce27adc97453a022fcbf28230294dd48dc5dc3
SHA2568eaf1b68871bdb27edaffb88a8bb1202fb00e222c75e557cf19647f6428636b8
SHA51271c8b5559e30a845dbd3b1d582bc860f3176879df60bb2352e251add032ce853863dd69e62d33a73459cbcd311551e2ff159f5841f869770c4efca2ea2c11036
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD520db49065cba24355ce58a289a207cfc
SHA15b83897cfb9e3cdef3c74a33e7b7ae53808d91d3
SHA25616c09dbdbb8bc7653b243505a0ca4be15395402de9ecf5914fb8a03a4944703b
SHA512e3a3d70cb970b6467e380cf983e76c74e01ac0aaa6e8983153ad7374e8489e99158c546a0e5b32b9e1e34f085b135e46d34eab9311a5b17a6eb08274d6b12026
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53cfffabd22d3240907e6255378b85bd2
SHA17a5a0c4d442249c8d127c1c1d77fb5679eb721d6
SHA2567a05344e555d697d051c765abfc62fc1ff919798184086177be64f6ba3d344d6
SHA51231fa6bb3e554cdbdfc76b093cd9e00867b1a9d483f06c5cbc256a046263cbf1c5f882b4e2e4da60fa8f7577b65fca72b3238be7e072127fd91ee87318738e1a0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e4de5c3d65b12b922166560417f3752a
SHA1434b8b69c5dcb3b5cb968e96d7f5773c82360e14
SHA25658ed64cc06f80242a1098950fc45e67aa964392da590a42532c6515fc3afa35e
SHA51269c805bedba8aaed2e64da5f1da2b89e48466ed051f44bab7fb868e88b71a19b1f0af789c5852285c9e3fa84994aaa361211fa2fe85088e3c6a6c2efa4b2c763
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58b2b1e9ca069fed6e2b9ecf654eee043
SHA11ca434d529f97c3a97810de8533048e2ba328c1e
SHA256e55aa1161befd9693f9d71df0558e36fb4d7b0d59ce9d37e5c12599ae3858381
SHA51218f76cafcc2d0ce59953f3c0aacc538763ed542c70bce75226c5cfb73a33f32691bb5dae960d877dffe68bbdc1629136cf5f8494ffd2a656f4659d06d87df27d
-
Filesize
4.2MB
MD5aaf32430b1db20419ee11a21f9fff012
SHA1c88cc08c0c5b4c03f259b520074fbf190c2b3377
SHA25665a937f2d1bf1f5592db03fb9369961c43e78b04cc71f3038dbc353e01abff98
SHA5122d6836f289a3c759917901e62bcdf8a763537a0ac627a447921209211471ba4d9a51ca64c005c213dcfcb3b324413e48896b55fe0ccd946f02f5ddd94bfb382d
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec