Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/04/2024, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe
Resource
win10v2004-20240419-en
General
-
Target
31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe
-
Size
4.1MB
-
MD5
0473ef4659547c66339a72d00c0655a8
-
SHA1
de0801690033096c5a87bfec4315a395d8bc59bd
-
SHA256
31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3
-
SHA512
e0a41cd04df88918e08545d26f9214e3036e09048da6024097e5cdce40a386285d418de04ab4a40fcbd9a47ec1a06168245950000205180e09b08ee8729e8549
-
SSDEEP
98304:VB+pokA3uLr67t8MVyOHX+J6fh0VTXiCNKfogoP0GUbubAei:VBc4uLrIK0u8fYNDf0GUb+Aei
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral2/memory/1484-2-0x0000000005030000-0x000000000591B000-memory.dmp family_glupteba behavioral2/memory/1484-3-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1484-50-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1484-53-0x0000000005030000-0x000000000591B000-memory.dmp family_glupteba behavioral2/memory/3632-100-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/3632-128-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1224-150-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1224-154-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1224-208-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1224-211-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1224-214-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1224-217-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1224-220-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1224-223-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1224-226-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba behavioral2/memory/1224-229-0x0000000000400000-0x0000000002ED3000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2516 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1224 csrss.exe 4300 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-891789021-684472942-1795878712-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\S-1-5-21-891789021-684472942-1795878712-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe File created C:\Windows\rss\csrss.exe 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5020 schtasks.exe 4584 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4260 powershell.exe 4260 powershell.exe 1484 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 1484 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 2248 powershell.exe 2248 powershell.exe 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 2444 powershell.exe 2444 powershell.exe 2512 powershell.exe 2512 powershell.exe 4828 powershell.exe 4828 powershell.exe 3260 powershell.exe 3260 powershell.exe 2120 powershell.exe 2120 powershell.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 1224 csrss.exe 1224 csrss.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 1224 csrss.exe 1224 csrss.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe 4300 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4260 powershell.exe Token: SeDebugPrivilege 1484 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Token: SeImpersonatePrivilege 1484 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeDebugPrivilege 2444 powershell.exe Token: SeDebugPrivilege 2512 powershell.exe Token: SeDebugPrivilege 4828 powershell.exe Token: SeDebugPrivilege 3260 powershell.exe Token: SeDebugPrivilege 2120 powershell.exe Token: SeSystemEnvironmentPrivilege 1224 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1484 wrote to memory of 4260 1484 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 82 PID 1484 wrote to memory of 4260 1484 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 82 PID 1484 wrote to memory of 4260 1484 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 82 PID 3632 wrote to memory of 2248 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 87 PID 3632 wrote to memory of 2248 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 87 PID 3632 wrote to memory of 2248 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 87 PID 3632 wrote to memory of 4596 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 89 PID 3632 wrote to memory of 4596 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 89 PID 4596 wrote to memory of 2516 4596 cmd.exe 91 PID 4596 wrote to memory of 2516 4596 cmd.exe 91 PID 3632 wrote to memory of 2444 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 92 PID 3632 wrote to memory of 2444 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 92 PID 3632 wrote to memory of 2444 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 92 PID 3632 wrote to memory of 2512 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 94 PID 3632 wrote to memory of 2512 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 94 PID 3632 wrote to memory of 2512 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 94 PID 3632 wrote to memory of 1224 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 96 PID 3632 wrote to memory of 1224 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 96 PID 3632 wrote to memory of 1224 3632 31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe 96 PID 1224 wrote to memory of 4828 1224 csrss.exe 97 PID 1224 wrote to memory of 4828 1224 csrss.exe 97 PID 1224 wrote to memory of 4828 1224 csrss.exe 97 PID 1224 wrote to memory of 3260 1224 csrss.exe 103 PID 1224 wrote to memory of 3260 1224 csrss.exe 103 PID 1224 wrote to memory of 3260 1224 csrss.exe 103 PID 1224 wrote to memory of 2120 1224 csrss.exe 105 PID 1224 wrote to memory of 2120 1224 csrss.exe 105 PID 1224 wrote to memory of 2120 1224 csrss.exe 105 PID 1224 wrote to memory of 4300 1224 csrss.exe 107 PID 1224 wrote to memory of 4300 1224 csrss.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe"C:\Users\Admin\AppData\Local\Temp\31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe"C:\Users\Admin\AppData\Local\Temp\31a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2516
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:5020
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4584
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5293ed8fd1c9e27fb6db51e3588258355
SHA1f75a4b4db9cc84f038aacc45e9e6dd98c831e332
SHA2564b3da996902b6ced3af494c0bdd13cae30fb73f4194e717bff2fc4422b400fda
SHA512f21e391e876cf9b1d4da5e5ddbfa4a9b838e961e5727b97ed3fb5dc28d457d9abb51df0e3215b82a1e53c2bd227d042b42154262d338b04f5874774f2d078166
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a98c6951ea02c7b738176565b2f9a289
SHA109c0ee168c5e83e9f31da1db4a46a7404bea20c3
SHA25660e47a9edeeb5d0ad6d35db66513add38f785a6d92164a32f9e863e738e95784
SHA51253cb6e2986c390aa171f1adf582982bbabc91a83e566c62c7c383b7f30512620d194849b2076141a484c5fd1179279a0324905fa7928c4d5417b0f1adfd82bbf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5999f588b45b83e2ade17f85cda8d675b
SHA1c658372c0fb412fe1a332aa357b7d464d5a2036a
SHA25646d3f3d8a12cbae2bc869b8573ea9bc9f47001c0e947d0813eeb357bb30cc573
SHA512987a733cc2782da42282b43577f13241e61e25ef0793150f080ddad15493f560274707a37574e2553fe19c8bd06b7d54d2ae38b9584a4a2242760d251f0a86d1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cb1f3812ae27565870c79c71b986ec6d
SHA1e8989000132831cc47cb75fd81e45556fbf8984b
SHA2567850cba5cac6525756556c8a23f55289e9b35faa2403ae70954d6ca1b6bbe713
SHA5127b534aff64540f5cc42a771ecf04079b706f100498c2ac4f2ed211a1f2c4d4d43ce5011135593ceea94489f83fcf453a02d783be78b3e1204e8fa6ff5350be33
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5502d4596b7ee940b22c0ff2bf344d518
SHA1588a4ec0de1c764c7443fb023d8b9eb6c326fbf0
SHA256c241a2e2edb8c60431f19d575a4c1889f0237396b027bc9872279f179995abc9
SHA5129c37c4280d6fcd6079311ed0830d1b976f4a45fe506696e751a7f5e6ee8eda3bf1325aea966a2dcca6fcb733eaf2a870b093523b139d9eb3d3f2e28f94d5f3e9
-
Filesize
4.1MB
MD50473ef4659547c66339a72d00c0655a8
SHA1de0801690033096c5a87bfec4315a395d8bc59bd
SHA25631a25019889dd75ec99f4c5efbc753a0438279b96ef6dbdbb309018cf7926fa3
SHA512e0a41cd04df88918e08545d26f9214e3036e09048da6024097e5cdce40a386285d418de04ab4a40fcbd9a47ec1a06168245950000205180e09b08ee8729e8549