Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe
Resource
win10v2004-20240226-en
General
-
Target
096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe
-
Size
4.1MB
-
MD5
ca83d211183ef814aec4870006d579b6
-
SHA1
43ba657450d69d8670f43f2627d331882faa2772
-
SHA256
096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4
-
SHA512
ea9e104548069b35051f52bead75af9791993837e69aa6ba5ae263ce3999a93a9053bfa551c89db19784012bdb581e8a9b537d47135e0778550eefb8c284c190
-
SSDEEP
49152:ffnInHQDK0wlO9rfJPTTANkdvq5+Duji334xe6X5+X6+m4ZNLcl7ubrDe/c0eSCw:0RCfJXOkdCGujW3ocq+CWmE2BmkIV7WH
Malware Config
Signatures
-
Glupteba payload 13 IoCs
resource yara_rule behavioral1/memory/3700-2-0x0000000002E70000-0x000000000375B000-memory.dmp family_glupteba behavioral1/memory/3700-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3700-4-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3700-12-0x0000000002E70000-0x000000000375B000-memory.dmp family_glupteba behavioral1/memory/3700-38-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3700-57-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3700-66-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1840-68-0x00000000029B0000-0x0000000002DB7000-memory.dmp family_glupteba behavioral1/memory/1840-93-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1840-121-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1840-147-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/996-176-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/996-216-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1568 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 996 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe File created C:\Windows\rss\csrss.exe 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe -
pid Process 1808 powershell.exe 1624 powershell.exe 5040 powershell.exe 2068 powershell.exe 3232 powershell.exe 3968 powershell.exe 716 powershell.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2384 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3968 powershell.exe 3968 powershell.exe 3968 powershell.exe 3700 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 3700 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 716 powershell.exe 716 powershell.exe 716 powershell.exe 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 1808 powershell.exe 1808 powershell.exe 1808 powershell.exe 1624 powershell.exe 1624 powershell.exe 1624 powershell.exe 5040 powershell.exe 5040 powershell.exe 2068 powershell.exe 2068 powershell.exe 2068 powershell.exe 3232 powershell.exe 3232 powershell.exe 3232 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3968 powershell.exe Token: SeDebugPrivilege 3700 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Token: SeImpersonatePrivilege 3700 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe Token: SeDebugPrivilege 716 powershell.exe Token: SeDebugPrivilege 1808 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeDebugPrivilege 2068 powershell.exe Token: SeDebugPrivilege 3232 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3700 wrote to memory of 3968 3700 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 93 PID 3700 wrote to memory of 3968 3700 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 93 PID 3700 wrote to memory of 3968 3700 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 93 PID 1840 wrote to memory of 716 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 105 PID 1840 wrote to memory of 716 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 105 PID 1840 wrote to memory of 716 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 105 PID 1840 wrote to memory of 4056 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 107 PID 1840 wrote to memory of 4056 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 107 PID 4056 wrote to memory of 1568 4056 cmd.exe 109 PID 4056 wrote to memory of 1568 4056 cmd.exe 109 PID 1840 wrote to memory of 1808 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 110 PID 1840 wrote to memory of 1808 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 110 PID 1840 wrote to memory of 1808 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 110 PID 1840 wrote to memory of 1624 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 112 PID 1840 wrote to memory of 1624 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 112 PID 1840 wrote to memory of 1624 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 112 PID 1840 wrote to memory of 996 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 114 PID 1840 wrote to memory of 996 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 114 PID 1840 wrote to memory of 996 1840 096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe 114 PID 996 wrote to memory of 5040 996 csrss.exe 115 PID 996 wrote to memory of 5040 996 csrss.exe 115 PID 996 wrote to memory of 5040 996 csrss.exe 115 PID 996 wrote to memory of 2068 996 csrss.exe 121 PID 996 wrote to memory of 2068 996 csrss.exe 121 PID 996 wrote to memory of 2068 996 csrss.exe 121 PID 996 wrote to memory of 3232 996 csrss.exe 123 PID 996 wrote to memory of 3232 996 csrss.exe 123 PID 996 wrote to memory of 3232 996 csrss.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe"C:\Users\Admin\AppData\Local\Temp\096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe"C:\Users\Admin\AppData\Local\Temp\096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1568
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2384
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:536
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:2436
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51e7caa45a51b5075a65f821f06fa48f9
SHA119fb54d99cf87e12abead56582c6b630452ca7eb
SHA256fea910b104328e4f5b06c0b5c20a41dbf61184c4ba15bbe55b7da6fb43145213
SHA5124ef138f99b423d935b3273a0fc446d2fd605feaa8aa9fa88d01634fb636a5e6bfbbadc5077b27f4c7d57a1f7fc208470d8b2226e5e9551b2e0f16dcd810fdb43
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f90bddb8b8ee5b9542b229b365d2e7d3
SHA194198243e0abc26a3cfe9f6f4b999cec9b429920
SHA25684752751f30f2fc02cfa67d63268d2dcabd4314cf9485f9f03da767443031d79
SHA512d5de8d2d252cc3fda5069a3e40753d5179807b6fe840c322f340ef09441fa0036814f6659e8486f79eb5c9aa746dad0f0539ea46b9a2a8d7d3c4047cd1d9b7d0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50b7938dc1478a48a98b0a8bd2709c36d
SHA13b0f77f554580fae256f9a0190b5d4d46b687f04
SHA256fff1e4abbea8fd5a36e64a5bf1121bb9a245fcd9bd134127a9eca1457cc82ae7
SHA512ced1097fd29da7ceb2b020dcff8e892ecbbc1e3515f355c995cc4be602770f4bf7ac3d1a8165e2be55f98edc15698bfc288c957c3d1c7adcada454ae01516588
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58893c8b058eb620acb039a4564c93b63
SHA163380f06b8a822f66af87d0e49d3b1d610d93109
SHA256fde3a7490a53c3967624ce97807b7a572eab5490445b223837666f1f79e815e3
SHA512419844f396f01879f84ea907042799312eaf61ee1f1f502ffbd4bd2d8177599a453d69851303585406dd9863f7564d73c2a2d9fb3b499acc1dca144d2696b29f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f46bfccd93e796c7c29d12e8ca3949e6
SHA16524e7f324c6e19723d0af90de63955873cb4ead
SHA2567721b39643c84ed22a80a08be8e97c5bcbbe2b30117c80bae307992f915052bf
SHA512f7f4a75b4ace047561134be47c24646cb29ffd08097e3b552660feeb1b88aa4a4c5625548295ef112def64afc262010f4a836976b832ae06772a9667e4efc576
-
Filesize
4.1MB
MD5ca83d211183ef814aec4870006d579b6
SHA143ba657450d69d8670f43f2627d331882faa2772
SHA256096a5882217ecf9c4b8edbd4ae28d1035d6ed089b47561ec83ae871565be54b4
SHA512ea9e104548069b35051f52bead75af9791993837e69aa6ba5ae263ce3999a93a9053bfa551c89db19784012bdb581e8a9b537d47135e0778550eefb8c284c190