Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/04/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe
Resource
win10v2004-20240412-en
General
-
Target
9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe
-
Size
4.1MB
-
MD5
b112cedd3d1145a2dfbc547147ad102e
-
SHA1
24e601fa27ad21b036471c58c5a4f39db521551f
-
SHA256
9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5
-
SHA512
fe6e8d27513e16fa56009fdace73ef085334d21eb363c2dfad359cacd994372443dfda8e59017633da2b50d66ce3ffbbf520b4fb121aee28a87e1dbfc1d36d75
-
SSDEEP
98304:LGRQeQQeLbhY3YC8OTEShpVlj4GtGZsj8hIKq+MMI+rDx/:LGRQUIYIPOTESx5TwMMI+rd
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral2/memory/432-2-0x0000000005240000-0x0000000005B2B000-memory.dmp family_glupteba behavioral2/memory/432-3-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/432-52-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/432-54-0x0000000005240000-0x0000000005B2B000-memory.dmp family_glupteba behavioral2/memory/2856-57-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/2856-102-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/2856-147-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/5012-174-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/5012-240-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/5012-256-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/5012-271-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/5012-287-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/5012-302-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/5012-317-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/5012-332-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba behavioral2/memory/5012-347-0x0000000000400000-0x0000000002EE0000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 832 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 5012 csrss.exe -
resource yara_rule behavioral2/memory/3408-255-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3648-270-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3648-300-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe File created C:\Windows\rss\csrss.exe 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4908 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1488 schtasks.exe 892 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 668 powershell.exe 668 powershell.exe 432 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 432 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 3420 powershell.exe 3420 powershell.exe 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 2560 powershell.exe 2560 powershell.exe 3180 powershell.exe 3180 powershell.exe 836 powershell.exe 836 powershell.exe 4968 powershell.exe 4968 powershell.exe 4328 powershell.exe 4328 powershell.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe 3528 injector.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 668 powershell.exe Token: SeDebugPrivilege 432 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Token: SeImpersonatePrivilege 432 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe Token: SeDebugPrivilege 3420 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 3180 powershell.exe Token: SeDebugPrivilege 836 powershell.exe Token: SeDebugPrivilege 4968 powershell.exe Token: SeDebugPrivilege 4328 powershell.exe Token: SeSecurityPrivilege 4908 sc.exe Token: SeSecurityPrivilege 4908 sc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 432 wrote to memory of 668 432 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 81 PID 432 wrote to memory of 668 432 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 81 PID 432 wrote to memory of 668 432 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 81 PID 2856 wrote to memory of 3420 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 86 PID 2856 wrote to memory of 3420 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 86 PID 2856 wrote to memory of 3420 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 86 PID 2856 wrote to memory of 3528 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 88 PID 2856 wrote to memory of 3528 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 88 PID 3528 wrote to memory of 832 3528 cmd.exe 90 PID 3528 wrote to memory of 832 3528 cmd.exe 90 PID 2856 wrote to memory of 2560 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 91 PID 2856 wrote to memory of 2560 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 91 PID 2856 wrote to memory of 2560 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 91 PID 2856 wrote to memory of 3180 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 93 PID 2856 wrote to memory of 3180 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 93 PID 2856 wrote to memory of 3180 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 93 PID 2856 wrote to memory of 5012 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 95 PID 2856 wrote to memory of 5012 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 95 PID 2856 wrote to memory of 5012 2856 9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe 95 PID 3408 wrote to memory of 3524 3408 windefender.exe 112 PID 3408 wrote to memory of 3524 3408 windefender.exe 112 PID 3408 wrote to memory of 3524 3408 windefender.exe 112 PID 3524 wrote to memory of 4908 3524 cmd.exe 113 PID 3524 wrote to memory of 4908 3524 cmd.exe 113 PID 3524 wrote to memory of 4908 3524 cmd.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe"C:\Users\Admin\AppData\Local\Temp\9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe"C:\Users\Admin\AppData\Local\Temp\9e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:832
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1488
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1420
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:892
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Modifies data under HKEY_USERS
PID:3648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52a124698a435927e5cb1e9b943f0ad95
SHA1594f6c72017385d64bc59dc054032e6f2ff8f362
SHA256c9b7539cc4aec1ad7384eff25b9203a4b52ef38c6f518724e80a676232388cda
SHA51249e043c28f7fcd928a843630f20f8b5d40c23f1dc9f920373c1057af8c6982e4b7ecdde5807f8062e2504d24fa6bcdaad8a1aa552079c0d5cbf54bc9fb83cfcf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b5f2025d29fb2425e41a49359aa723bf
SHA14f341c69b941c3b9522a06e0ed7d2160d69a5bd2
SHA256c0fbea0e5bcb2d9b81f2b3efeed255ac9c7d3ca29253e34574a303ec32cd94ac
SHA512b50e1e9db10711a05cea2e33a3d178ccee3a2b927e60bb99ba7d7eb40dff24a2aaffaedc2a3b2a8e7d6f8329cb853a3b3697c301fc129931581cdcfc8eac7607
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD515997b1d8f11465ac3367a98c5d73dac
SHA18da9301e3ee6cc5fb6efd0228be96700c475f9aa
SHA25636647c15735d64700cb03294d517f2846c8c5a8d709ecf0773674ec6a092b27b
SHA5128778dfe2033fa31ae9ad9a8fd8806be6640c0d7153576173c86e28c1429d3aa0b906db0a14a6b1e4164568a95f223a5394eb29d42232d8d163cf3861f90fa833
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD546aaec273d9f2e420386cfdc28251dcc
SHA18ede3efe55450a36dc28d4681a827abbbcf7607b
SHA2564ecf92bdb1167fe4babd00a486e56b9217488406b1f871f8d3c0d28cae3b75e3
SHA51262485e08a36744ae02dccf2170e7e908e05e23252064c2d4386a7391c182d24ddca6b6f9ace174e68f8630201415d0f1e8dedef366c03a1ca9c77c30f5e33ec2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ce79081e38dd364cd3dd90fc4457a614
SHA1de4d2c460423a355855ccfc1c8d8204765b3c653
SHA256b916d3d6fdd04b4831f6f6cd042f748599b69f0dcd5db6d755daf8ffe16c49af
SHA512e9a4ed46e76653d688781d84da5e8b63e34f457cbd55ba9e760afe1824873e4343fc7c5956835ea07a7332934dae7ead3af3b1552ca22293ea910eecf2cc93fd
-
Filesize
4.1MB
MD5b112cedd3d1145a2dfbc547147ad102e
SHA124e601fa27ad21b036471c58c5a4f39db521551f
SHA2569e8e031be70b114dbce28220bb611d779ba80d67fd74b15cc8f5ad1c61904cf5
SHA512fe6e8d27513e16fa56009fdace73ef085334d21eb363c2dfad359cacd994372443dfda8e59017633da2b50d66ce3ffbbf520b4fb121aee28a87e1dbfc1d36d75