Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe
Resource
win10v2004-20240412-en
General
-
Target
f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe
-
Size
4.2MB
-
MD5
0d0ac90416ced2c9439f4208e038157f
-
SHA1
2f974065b4e8efa7ea35042e8d48d473feb297ec
-
SHA256
f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30
-
SHA512
8631860851a5c494e20007424ae19f14158c771783415d4766328c12013b5dd7bbd8a22c5a28700d28667066441e6636fb1118f06bca882b4cef22bccbf66167
-
SSDEEP
98304:SQN9zSKVNFzRCmd+S43cfxiJtNQ15bXu+MABfSPDEeLX1+Kw3YL/t3u:9TWsFQmkSqeYdK5bXuOBmD/txFe
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral1/memory/4904-2-0x0000000006610000-0x0000000006EFB000-memory.dmp family_glupteba behavioral1/memory/4904-54-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/4904-56-0x0000000006610000-0x0000000006EFB000-memory.dmp family_glupteba behavioral1/memory/3520-149-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-242-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-253-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-264-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-278-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-290-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-302-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-314-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-326-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-338-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-356-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-374-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-392-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba behavioral1/memory/1956-410-0x0000000000400000-0x0000000004428000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4852 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1956 csrss.exe -
resource yara_rule behavioral1/memory/2032-276-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2804-289-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2804-313-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe File created C:\Windows\rss\csrss.exe f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3836 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2956 4904 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4288 schtasks.exe 2828 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2096 powershell.exe 2096 powershell.exe 4904 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 4904 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 3856 powershell.exe 3856 powershell.exe 3856 powershell.exe 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 2772 powershell.exe 2772 powershell.exe 2772 powershell.exe 2416 powershell.exe 2416 powershell.exe 2416 powershell.exe 2792 powershell.exe 2792 powershell.exe 2792 powershell.exe 3524 powershell.exe 3524 powershell.exe 3524 powershell.exe 4032 powershell.exe 4032 powershell.exe 4032 powershell.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe 3808 injector.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2096 powershell.exe Token: SeDebugPrivilege 4904 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Token: SeImpersonatePrivilege 4904 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe Token: SeDebugPrivilege 3856 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2416 powershell.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 3524 powershell.exe Token: SeDebugPrivilege 4032 powershell.exe Token: SeSecurityPrivilege 3836 sc.exe Token: SeSecurityPrivilege 3836 sc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4904 wrote to memory of 2096 4904 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 88 PID 4904 wrote to memory of 2096 4904 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 88 PID 4904 wrote to memory of 2096 4904 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 88 PID 3520 wrote to memory of 3856 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 104 PID 3520 wrote to memory of 3856 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 104 PID 3520 wrote to memory of 3856 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 104 PID 3520 wrote to memory of 1044 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 121 PID 3520 wrote to memory of 1044 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 121 PID 1044 wrote to memory of 4852 1044 cmd.exe 109 PID 1044 wrote to memory of 4852 1044 cmd.exe 109 PID 3520 wrote to memory of 2772 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 110 PID 3520 wrote to memory of 2772 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 110 PID 3520 wrote to memory of 2772 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 110 PID 3520 wrote to memory of 2416 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 113 PID 3520 wrote to memory of 2416 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 113 PID 3520 wrote to memory of 2416 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 113 PID 3520 wrote to memory of 1956 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 115 PID 3520 wrote to memory of 1956 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 115 PID 3520 wrote to memory of 1956 3520 f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe 115 PID 2032 wrote to memory of 4672 2032 windefender.exe 134 PID 2032 wrote to memory of 4672 2032 windefender.exe 134 PID 2032 wrote to memory of 4672 2032 windefender.exe 134 PID 4672 wrote to memory of 3836 4672 cmd.exe 135 PID 4672 wrote to memory of 3836 4672 cmd.exe 135 PID 4672 wrote to memory of 3836 4672 cmd.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe"C:\Users\Admin\AppData\Local\Temp\f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe"C:\Users\Admin\AppData\Local\Temp\f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4852
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4288
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1044
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2828
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 7442⤵
- Program crash
PID:2956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4904 -ip 49041⤵PID:2804
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Modifies data under HKEY_USERS
PID:2804
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51fe1bc5c42469e3cdf3db8656e02a9b6
SHA1f89a4859e720d38612ac63cfddbbd00723073a19
SHA256641402005bc9940c80a5150c99b7f2ae20bddc71cc4163092a433cf319ef92af
SHA51230b1e5e4c78c7a7c10f3f9ed68c56dabfe6f1405be1e46b365d3f6087fb9dd31feb0e6e41e49cda518839fa6100a9109e1d030ee21e8f3239a3c5b31d47aa1e9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56700ef3977885e8b6770778be0857666
SHA178c5148e67112f11da593f3494444523ee47eac5
SHA2565f48b0e991421bbb779bde7a7002a13182c4d2aba7634ae91d5905af04dfb5d4
SHA512c2b923700717abe33891c16b42f61b5699aa05723a31848c7139859e033baefbc75f91f46838983bcd83cfa99d824119bc6a55ca58851ba124263c1f26e59e5c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD523bcb8e865de0ec96863ddc2f6b10237
SHA1b05b385f0dbe9279898d6e9bcaf545ec128a7d7e
SHA2569560bc1a6d041e668c2751d2df0c9f515533ad625e7682403f4eb1e2e61f4a63
SHA5129b9e92eae7753c87daad159838b75438b3235f5604e752b9384c4a6ed35ddbcc83bae91f8e53a4b7df6d981b8073720771f0eb66f352c6066f29c65e296f62ee
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50250920d63da3e4fd8cd907c0bcf0c93
SHA1f77313385e360e0a775e4168edaaf583f70e1a81
SHA256e4d1f9d80d285972a7b8fa5ef5eb9a35e078c016ad16e3af57d777fb2e896e3e
SHA512c5edb69bb648653fcd213d7d6f804a8d860672d3a3408f54bf819e678951a6f1a596d2b425c30c21010b9db5ad05a77161359cf9e2dafd34533b7342d5bc15d4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c22c1c095f080d4c9b277c5cabeed762
SHA1aca337a4a45789a7efab71bafc1d61b7dd151d7e
SHA25624627c2c2f6eb97e83b29cd2cf13619486e43e7020a05790a484c1c8a49fbac0
SHA512c7ed9526f636b7a89e7a3740e230a611b3f93895b5b4747d354c0c9402b439244a08da94a31c1df4ea2f659b7db677e8d2b539f2cc12e703a4b72a82e775c729
-
Filesize
4.2MB
MD50d0ac90416ced2c9439f4208e038157f
SHA12f974065b4e8efa7ea35042e8d48d473feb297ec
SHA256f5a98b8f1ac435bc5cb81f7868ee669d90f1fb8ad6a49137080b38db311d6a30
SHA5128631860851a5c494e20007424ae19f14158c771783415d4766328c12013b5dd7bbd8a22c5a28700d28667066441e6636fb1118f06bca882b4cef22bccbf66167