Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/05/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe
Resource
win10v2004-20240508-en
General
-
Target
5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe
-
Size
4.1MB
-
MD5
cd27478708d52b5906b883ab1808fc9c
-
SHA1
a239293d34b3ca2a82cbe2fd5c9fba306bdd2ff2
-
SHA256
5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36
-
SHA512
ca719f381aa6de9d1f93a7dacbab90f74d65a8b0b344350985eee68b5e3fd8aa5bb1242128d1266fafce228868fb57dc835c76d82f8e73c9f6b822eee25b9bcd
-
SSDEEP
98304:ZfsdILB1z+czP6vFwxOfxByAjC8mnlr38XwlJoC4oLZ+Kx7:l91zBzPaFCoOzr3jJoDoLZ+U7
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/4964-2-0x0000000004AA0000-0x000000000538B000-memory.dmp family_glupteba behavioral2/memory/4964-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4964-62-0x0000000004AA0000-0x000000000538B000-memory.dmp family_glupteba behavioral2/memory/4964-61-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/4964-120-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3600-125-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-201-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-211-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-213-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-218-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-221-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-223-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-225-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-228-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-233-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-235-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-237-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba behavioral2/memory/2604-242-0x0000000000400000-0x0000000002957000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4936 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2604 csrss.exe 3192 injector.exe 3716 windefender.exe 4456 windefender.exe -
resource yara_rule behavioral2/files/0x000200000002aa13-205.dat upx behavioral2/memory/3716-206-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3716-210-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4456-214-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4456-219-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe File created C:\Windows\rss\csrss.exe 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1468 sc.exe -
pid Process 4912 powershell.exe 788 powershell.exe 2028 powershell.exe 4280 powershell.exe 2844 powershell.exe 1556 powershell.exe 1736 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1028 schtasks.exe 2004 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-631 = "Tokyo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1892 = "Russia TZ 3 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 powershell.exe 2028 powershell.exe 4964 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 4964 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 4280 powershell.exe 4280 powershell.exe 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 2844 powershell.exe 2844 powershell.exe 1556 powershell.exe 1556 powershell.exe 1736 powershell.exe 1736 powershell.exe 4912 powershell.exe 4912 powershell.exe 788 powershell.exe 788 powershell.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 2604 csrss.exe 2604 csrss.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 2604 csrss.exe 2604 csrss.exe 3192 injector.exe 3192 injector.exe 2604 csrss.exe 2604 csrss.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe 3192 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 4964 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Token: SeImpersonatePrivilege 4964 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe Token: SeDebugPrivilege 4280 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeDebugPrivilege 1736 powershell.exe Token: SeDebugPrivilege 4912 powershell.exe Token: SeDebugPrivilege 788 powershell.exe Token: SeSystemEnvironmentPrivilege 2604 csrss.exe Token: SeSecurityPrivilege 1468 sc.exe Token: SeSecurityPrivilege 1468 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4964 wrote to memory of 2028 4964 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 82 PID 4964 wrote to memory of 2028 4964 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 82 PID 4964 wrote to memory of 2028 4964 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 82 PID 3600 wrote to memory of 4280 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 87 PID 3600 wrote to memory of 4280 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 87 PID 3600 wrote to memory of 4280 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 87 PID 3600 wrote to memory of 2220 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 89 PID 3600 wrote to memory of 2220 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 89 PID 2220 wrote to memory of 4936 2220 cmd.exe 91 PID 2220 wrote to memory of 4936 2220 cmd.exe 91 PID 3600 wrote to memory of 2844 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 92 PID 3600 wrote to memory of 2844 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 92 PID 3600 wrote to memory of 2844 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 92 PID 3600 wrote to memory of 1556 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 94 PID 3600 wrote to memory of 1556 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 94 PID 3600 wrote to memory of 1556 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 94 PID 3600 wrote to memory of 2604 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 96 PID 3600 wrote to memory of 2604 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 96 PID 3600 wrote to memory of 2604 3600 5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe 96 PID 2604 wrote to memory of 1736 2604 csrss.exe 97 PID 2604 wrote to memory of 1736 2604 csrss.exe 97 PID 2604 wrote to memory of 1736 2604 csrss.exe 97 PID 2604 wrote to memory of 4912 2604 csrss.exe 103 PID 2604 wrote to memory of 4912 2604 csrss.exe 103 PID 2604 wrote to memory of 4912 2604 csrss.exe 103 PID 2604 wrote to memory of 788 2604 csrss.exe 105 PID 2604 wrote to memory of 788 2604 csrss.exe 105 PID 2604 wrote to memory of 788 2604 csrss.exe 105 PID 2604 wrote to memory of 3192 2604 csrss.exe 107 PID 2604 wrote to memory of 3192 2604 csrss.exe 107 PID 3716 wrote to memory of 1040 3716 windefender.exe 113 PID 3716 wrote to memory of 1040 3716 windefender.exe 113 PID 3716 wrote to memory of 1040 3716 windefender.exe 113 PID 1040 wrote to memory of 1468 1040 cmd.exe 114 PID 1040 wrote to memory of 1468 1040 cmd.exe 114 PID 1040 wrote to memory of 1468 1040 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe"C:\Users\Admin\AppData\Local\Temp\5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe"C:\Users\Admin\AppData\Local\Temp\5af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4936
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1028
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3688
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2004
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55c20ee739c9910fb9d456bc2c1634dc0
SHA1ff61f1f84ec4ae7823974338766d6407c1a88ac7
SHA2565d12acb21157c03fdfe3ba01dd3049448b82bd49135a642d62bad28aa29c5139
SHA512bded0d59b7ac5aefe7c32db49e20a92482e6ed430e1e241997a24d107c665e4c5c50c0c0219a277606e0986cd24caadb38f48c4255a93086b818e865d269cd64
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5191a3f055d6dea0c72b08df49ab59d20
SHA13f2cf570b8575806b21b3853935216a23e6529a6
SHA2568627084f37b41420383df3b9ed5ac2122ab82ce9cde586b5b15957a9008ce991
SHA5124ae1dbcd07c2a2565e4eb6619dbbfcc42498370cacc4c473b10abf1e51b6006e4f8f552b57f578e09354159990df70dfb459ef27b87354e6ca7fb8ccb703b307
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d79834737066005fb2cd26c8b1ecc6e8
SHA1b83e9bc1c892202c1e827683a5d7a9d89884fb9d
SHA2569db8a561f5e2b7f84acb5faa0a04963f6b37411e407e2dd17d21862cb839b2ee
SHA512dd5a4b938830fbff3f24bd8b240f78781d4915e86d915dd749f91064e926b045d5cdbe147cd5cbccd055ac7f33c458a434ad45504adef899d073d0b5bf367113
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a44503e8b82ff94a760f50ba9bb542c6
SHA1027558f753e2843d776640ea0370cdb043d77c24
SHA256e395e7cb20ec3340eb10d0b75d7e458f24e82f1aeb436c590dad466bedfe7afc
SHA51252682675370a9571101daa2c274963d8684e22685ed1e8f5e51d5ad7374a95e524301d42b1e3b1b26f943da474ad8dc7d97e31f56c7d37f185da4c6ed37f0263
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56b864d71cabdfd2cda0f040348c2eaf1
SHA10bf045f5741e73b6b6b356cbc828abb6b411f9de
SHA2567c78bf2776822d2c2f9251db1d5df98354718bfa965882ce04984ac1657f1da3
SHA5124208fc31ad54be9f56e06105525bb3468ed8170921e0d5ce23001e08967058f379d067c692ca476c976d0562412630acac5c7db23ae81bd18f01d348f286b940
-
Filesize
4.1MB
MD5cd27478708d52b5906b883ab1808fc9c
SHA1a239293d34b3ca2a82cbe2fd5c9fba306bdd2ff2
SHA2565af3f1c8a250e77274dc40f1096962825cf06117591e399a1996a8a561824e36
SHA512ca719f381aa6de9d1f93a7dacbab90f74d65a8b0b344350985eee68b5e3fd8aa5bb1242128d1266fafce228868fb57dc835c76d82f8e73c9f6b822eee25b9bcd
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec