Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/05/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe
Resource
win10v2004-20240508-en
General
-
Target
ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe
-
Size
4.1MB
-
MD5
f1731c50d2a84e66e854c7ca9f24be40
-
SHA1
755ae7cf6a7b377e2631f8656cd21ab4abc9fdb5
-
SHA256
ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd
-
SHA512
7380f0796feaff6dbd4be2901290a32f335d1418ea745a61c4786c1b21c6de5fc83f7a859487a332469ddc21cb6dd1ecc57e2ad280ba63cb45c5f2e233795902
-
SSDEEP
98304:0pMzL5+lO9W76PsoCApCyikUKUcOjCi32ayWjPGQw0uKEhKuf:0Cz0Ow78YApCVkUKUXCi327kurTvhKA
Malware Config
Signatures
-
Glupteba payload 8 IoCs
resource yara_rule behavioral2/memory/5044-2-0x0000000004CA0000-0x000000000558B000-memory.dmp family_glupteba behavioral2/memory/5044-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5044-24-0x0000000000400000-0x0000000002B0C000-memory.dmp family_glupteba behavioral2/memory/5044-54-0x0000000004CA0000-0x000000000558B000-memory.dmp family_glupteba behavioral2/memory/5044-55-0x0000000000400000-0x0000000002B0C000-memory.dmp family_glupteba behavioral2/memory/5044-64-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2896-77-0x0000000000400000-0x0000000002B0C000-memory.dmp family_glupteba behavioral2/memory/2896-128-0x0000000000400000-0x0000000002B0C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1572 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 4976 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe File created C:\Windows\rss\csrss.exe ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe -
pid Process 4584 powershell.exe 984 powershell.exe 2932 powershell.exe 1700 powershell.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4584 powershell.exe 4584 powershell.exe 5044 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 5044 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 984 powershell.exe 984 powershell.exe 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 2932 powershell.exe 2932 powershell.exe 1700 powershell.exe 1700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4584 powershell.exe Token: SeDebugPrivilege 5044 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Token: SeImpersonatePrivilege 5044 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe Token: SeDebugPrivilege 984 powershell.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 1700 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4584 5044 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 78 PID 5044 wrote to memory of 4584 5044 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 78 PID 5044 wrote to memory of 4584 5044 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 78 PID 2896 wrote to memory of 984 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 83 PID 2896 wrote to memory of 984 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 83 PID 2896 wrote to memory of 984 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 83 PID 2896 wrote to memory of 4892 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 85 PID 2896 wrote to memory of 4892 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 85 PID 4892 wrote to memory of 1572 4892 cmd.exe 87 PID 4892 wrote to memory of 1572 4892 cmd.exe 87 PID 2896 wrote to memory of 2932 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 88 PID 2896 wrote to memory of 2932 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 88 PID 2896 wrote to memory of 2932 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 88 PID 2896 wrote to memory of 1700 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 90 PID 2896 wrote to memory of 1700 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 90 PID 2896 wrote to memory of 1700 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 90 PID 2896 wrote to memory of 4976 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 92 PID 2896 wrote to memory of 4976 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 92 PID 2896 wrote to memory of 4976 2896 ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe"C:\Users\Admin\AppData\Local\Temp\ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe"C:\Users\Admin\AppData\Local\Temp\ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1572
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
PID:4976
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a8d7522ca6853789d66ead323807bc4f
SHA1bb5c1f4a0f6b7127b8612539f5463c86b46a71f1
SHA2561d667eebba7d8b7647cab5874d63133d3ed0f76a14c73373f6458e75d4ee1ffe
SHA51227fa6729d6221d70d6f787ac9bb0fb2a1475676faf016b7be6311cdbfda3d21b989cc2d8e7e2886863289e9aac756a1f964a4fb5908259f2add50c4425167202
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5447dcfe2db15f722452be3bd5eb42c45
SHA119330e32ef78d0b601fc1cdae834eea8722a8b7c
SHA256e2bc635e545f82fb9d750d1a5e70e2f4424f63ef29f2674534f0f254ab0674df
SHA51236818ccea77828d8f1b8ffe7dccd8be84a05b2ef633b8f36a2068b94c13b817c4a2d89c5757e9e27df262caff76bae52910285cfda59f36d77ce1443803087f3
-
Filesize
4.1MB
MD5f1731c50d2a84e66e854c7ca9f24be40
SHA1755ae7cf6a7b377e2631f8656cd21ab4abc9fdb5
SHA256ec92ecdf746e288fa4f54cd5c118c47fe056bdbdd32934da7d3c438bbf115fcd
SHA5127380f0796feaff6dbd4be2901290a32f335d1418ea745a61c4786c1b21c6de5fc83f7a859487a332469ddc21cb6dd1ecc57e2ad280ba63cb45c5f2e233795902