Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/05/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe
Resource
win10v2004-20240426-en
General
-
Target
0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe
-
Size
4.2MB
-
MD5
73375f6b548bfc5264be3f77b4e4acc2
-
SHA1
63d1a9f67f531fb100a1f08a4b8c7f68efc085b2
-
SHA256
0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d
-
SHA512
1977da4569660554b36306da56c87243c12162f3281cc881da75de07a0cc578c5d62ac7a204a2c9f061155740a32f449a98dd0e661fd39191836b7803da48a7a
-
SSDEEP
98304:UHR7Rw1UeVSInmC6Ni9K2pljSFG9v41SjEKwaqon:ydw1UenmC6NP2p5SGvC8E1aqon
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/3692-2-0x0000000005070000-0x000000000595B000-memory.dmp family_glupteba behavioral2/memory/3692-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3692-39-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/3692-53-0x0000000005070000-0x000000000595B000-memory.dmp family_glupteba behavioral2/memory/3692-52-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/3692-78-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4376-77-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/4376-125-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2448-201-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2448-211-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2448-213-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2448-217-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2448-220-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2448-223-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2448-225-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2448-229-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2448-232-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba behavioral2/memory/2448-235-0x0000000000400000-0x0000000002EE9000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2272 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2448 csrss.exe 4212 injector.exe 4568 windefender.exe 4412 windefender.exe -
resource yara_rule behavioral2/files/0x001a00000002ab58-205.dat upx behavioral2/memory/4568-206-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4568-210-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4412-214-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4412-219-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe File created C:\Windows\rss\csrss.exe 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2156 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1748 schtasks.exe 2664 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3016 powershell.exe 3016 powershell.exe 3692 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 3692 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 3052 powershell.exe 3052 powershell.exe 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 3588 powershell.exe 3588 powershell.exe 2192 powershell.exe 2192 powershell.exe 1392 powershell.exe 1392 powershell.exe 4836 powershell.exe 4836 powershell.exe 3516 powershell.exe 3516 powershell.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 2448 csrss.exe 2448 csrss.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 2448 csrss.exe 2448 csrss.exe 4212 injector.exe 4212 injector.exe 2448 csrss.exe 2448 csrss.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe 4212 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3016 powershell.exe Token: SeDebugPrivilege 3692 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Token: SeImpersonatePrivilege 3692 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe Token: SeDebugPrivilege 3052 powershell.exe Token: SeDebugPrivilege 3588 powershell.exe Token: SeDebugPrivilege 2192 powershell.exe Token: SeDebugPrivilege 1392 powershell.exe Token: SeDebugPrivilege 4836 powershell.exe Token: SeDebugPrivilege 3516 powershell.exe Token: SeSystemEnvironmentPrivilege 2448 csrss.exe Token: SeSecurityPrivilege 2156 sc.exe Token: SeSecurityPrivilege 2156 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3692 wrote to memory of 3016 3692 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 82 PID 3692 wrote to memory of 3016 3692 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 82 PID 3692 wrote to memory of 3016 3692 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 82 PID 4376 wrote to memory of 3052 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 87 PID 4376 wrote to memory of 3052 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 87 PID 4376 wrote to memory of 3052 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 87 PID 4376 wrote to memory of 3420 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 89 PID 4376 wrote to memory of 3420 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 89 PID 3420 wrote to memory of 2272 3420 cmd.exe 91 PID 3420 wrote to memory of 2272 3420 cmd.exe 91 PID 4376 wrote to memory of 3588 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 92 PID 4376 wrote to memory of 3588 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 92 PID 4376 wrote to memory of 3588 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 92 PID 4376 wrote to memory of 2192 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 94 PID 4376 wrote to memory of 2192 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 94 PID 4376 wrote to memory of 2192 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 94 PID 4376 wrote to memory of 2448 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 96 PID 4376 wrote to memory of 2448 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 96 PID 4376 wrote to memory of 2448 4376 0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe 96 PID 2448 wrote to memory of 1392 2448 csrss.exe 97 PID 2448 wrote to memory of 1392 2448 csrss.exe 97 PID 2448 wrote to memory of 1392 2448 csrss.exe 97 PID 2448 wrote to memory of 4836 2448 csrss.exe 102 PID 2448 wrote to memory of 4836 2448 csrss.exe 102 PID 2448 wrote to memory of 4836 2448 csrss.exe 102 PID 2448 wrote to memory of 3516 2448 csrss.exe 105 PID 2448 wrote to memory of 3516 2448 csrss.exe 105 PID 2448 wrote to memory of 3516 2448 csrss.exe 105 PID 2448 wrote to memory of 4212 2448 csrss.exe 107 PID 2448 wrote to memory of 4212 2448 csrss.exe 107 PID 4568 wrote to memory of 5024 4568 windefender.exe 113 PID 4568 wrote to memory of 5024 4568 windefender.exe 113 PID 4568 wrote to memory of 5024 4568 windefender.exe 113 PID 5024 wrote to memory of 2156 5024 cmd.exe 114 PID 5024 wrote to memory of 2156 5024 cmd.exe 114 PID 5024 wrote to memory of 2156 5024 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe"C:\Users\Admin\AppData\Local\Temp\0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe"C:\Users\Admin\AppData\Local\Temp\0bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2272
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1748
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2664
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4412
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e0b436471c80794980330db56b8dafb6
SHA17bf9dc6f2309e7931a25e86e07111fe7d781f806
SHA256872e712dffa9700a377f1dbe0e5210dfc76d6376c1fd51b946568041ce51e6df
SHA512eb5879cd1271ef52d27f9805f638046bad076f7200e597d0f487a59176633109599040350cd03fc8c0f0412e163ccff1db8ea97f2d27211b5bc6fe354618070a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58c1619887155750627692bfcebb916e7
SHA19cc88031efc956f674c8df2585174a1b64c1d977
SHA256cac916dd5562757b1d61e7e533bfc600848e0810b1ceda63271a0e1e23e0e1ec
SHA512b8d87f0a6efb3d7c7ab914ccc7bcd78d46c8507aebfa1840377d11a54bdd11f8d807a5248c97256a5799bf5799376290019d864851fbed1eff399921d652a8ce
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD560d8f0de37a031df2f591824f631e700
SHA1108876b52a4591219fbc4e2de3632eaca15537f3
SHA256aa6043c4cc3cfd90340eb30f0db524c18fd21caec9d9bfebd9bd8a189a474f8d
SHA5121f2b29d06b5c9a46179b63843e0df79973a3f5c524ac722e31a0c092621ecac298cd234d7161c9a3ccd8774fb5ac40eb41d743efc1840afece9e70ebaefb3dcc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD506a1e2a03a54025013cf2aa6c017b1d8
SHA12cfade8080eacdb4a6a53464b5fef9e1a37e3295
SHA256ab227a950f97a87d89047e9c5407a7628b598ef17ad73317bab7fc81aae2e674
SHA512c83ff166c86e7fe3847af9b423948f868b53716a2e7be8aba3961e5633ef9592c584678442ca00540cc9c049c7fd8067ccec944ab7922909b49522693771f3c7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ea897f04fc60713331c74f542835b7ae
SHA1b9f6c27ba444c082a36062fb5bacefe9e8672b89
SHA256d0f382dedd287621922f0ea90d1b41eff23f8d9c5ea6eb899c02559dd05762ea
SHA51211db1589e21288a4e6c35cd8ac278d0deb77262f66240d24143aebd7f59f6ac917a1bc41676c5497b7c26b7f62c856ea032eb31bb5c5875bae8c5f37892009ae
-
Filesize
4.2MB
MD573375f6b548bfc5264be3f77b4e4acc2
SHA163d1a9f67f531fb100a1f08a4b8c7f68efc085b2
SHA2560bffa8fa858497f541e7ada983717caf77250f7435c42788e0304649da2d782d
SHA5121977da4569660554b36306da56c87243c12162f3281cc881da75de07a0cc578c5d62ac7a204a2c9f061155740a32f449a98dd0e661fd39191836b7803da48a7a
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec