Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/05/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe
Resource
win10v2004-20240226-en
General
-
Target
9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe
-
Size
4.1MB
-
MD5
e59b7db2feafff7bdbc8f43c93aa2656
-
SHA1
c880c19367fe2680be08ffd44fd7337f3a8eb8f8
-
SHA256
9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6
-
SHA512
5e34f5c4dc7f62ef8370f78cb9632f7248fa245cbdec13568b326bb4e4d08c1e4d986da753543e38798fafa478bd1ebafae147f1e9049fca74fcd4d5416f2d85
-
SSDEEP
98304:zmSOHuT7egJLhRTCVEkOCdqjiWtSbuAFmh92S:z0ObLh9WfG/tSdeR
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/1116-2-0x0000000004980000-0x000000000526B000-memory.dmp family_glupteba behavioral2/memory/1116-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1116-73-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/1116-89-0x0000000004980000-0x000000000526B000-memory.dmp family_glupteba behavioral2/memory/760-125-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/1116-136-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3496-202-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-211-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-213-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-216-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-221-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-223-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-225-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-228-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-233-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-236-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-238-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral2/memory/3496-240-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1356 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 3496 csrss.exe 4324 injector.exe 1084 windefender.exe 4200 windefender.exe -
resource yara_rule behavioral2/files/0x000200000002a9c1-205.dat upx behavioral2/memory/1084-206-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1084-210-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4200-209-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4200-214-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4200-219-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4200-229-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe File created C:\Windows\rss\csrss.exe 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4336 sc.exe -
pid Process 3512 powershell.exe 5040 powershell.exe 5076 powershell.exe 2648 powershell.exe 2468 powershell.exe 3004 powershell.exe 4604 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 568 schtasks.exe 3764 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3512 powershell.exe 3512 powershell.exe 1116 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 1116 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 5040 powershell.exe 5040 powershell.exe 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 5076 powershell.exe 5076 powershell.exe 2648 powershell.exe 2648 powershell.exe 2468 powershell.exe 2468 powershell.exe 3004 powershell.exe 3004 powershell.exe 4604 powershell.exe 4604 powershell.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 3496 csrss.exe 3496 csrss.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 3496 csrss.exe 3496 csrss.exe 4324 injector.exe 4324 injector.exe 3496 csrss.exe 3496 csrss.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe 4324 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3512 powershell.exe Token: SeDebugPrivilege 1116 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Token: SeImpersonatePrivilege 1116 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeDebugPrivilege 5076 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 2468 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 4604 powershell.exe Token: SeSystemEnvironmentPrivilege 3496 csrss.exe Token: SeSecurityPrivilege 4336 sc.exe Token: SeSecurityPrivilege 4336 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1116 wrote to memory of 3512 1116 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 82 PID 1116 wrote to memory of 3512 1116 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 82 PID 1116 wrote to memory of 3512 1116 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 82 PID 760 wrote to memory of 5040 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 87 PID 760 wrote to memory of 5040 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 87 PID 760 wrote to memory of 5040 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 87 PID 760 wrote to memory of 2016 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 89 PID 760 wrote to memory of 2016 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 89 PID 2016 wrote to memory of 1356 2016 cmd.exe 91 PID 2016 wrote to memory of 1356 2016 cmd.exe 91 PID 760 wrote to memory of 5076 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 92 PID 760 wrote to memory of 5076 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 92 PID 760 wrote to memory of 5076 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 92 PID 760 wrote to memory of 2648 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 94 PID 760 wrote to memory of 2648 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 94 PID 760 wrote to memory of 2648 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 94 PID 760 wrote to memory of 3496 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 96 PID 760 wrote to memory of 3496 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 96 PID 760 wrote to memory of 3496 760 9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe 96 PID 3496 wrote to memory of 2468 3496 csrss.exe 97 PID 3496 wrote to memory of 2468 3496 csrss.exe 97 PID 3496 wrote to memory of 2468 3496 csrss.exe 97 PID 3496 wrote to memory of 3004 3496 csrss.exe 103 PID 3496 wrote to memory of 3004 3496 csrss.exe 103 PID 3496 wrote to memory of 3004 3496 csrss.exe 103 PID 3496 wrote to memory of 4604 3496 csrss.exe 105 PID 3496 wrote to memory of 4604 3496 csrss.exe 105 PID 3496 wrote to memory of 4604 3496 csrss.exe 105 PID 3496 wrote to memory of 4324 3496 csrss.exe 107 PID 3496 wrote to memory of 4324 3496 csrss.exe 107 PID 1084 wrote to memory of 4252 1084 windefender.exe 113 PID 1084 wrote to memory of 4252 1084 windefender.exe 113 PID 1084 wrote to memory of 4252 1084 windefender.exe 113 PID 4252 wrote to memory of 4336 4252 cmd.exe 114 PID 4252 wrote to memory of 4336 4252 cmd.exe 114 PID 4252 wrote to memory of 4336 4252 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe"C:\Users\Admin\AppData\Local\Temp\9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe"C:\Users\Admin\AppData\Local\Temp\9f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1356
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:568
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3764
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4200
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55e5cdef99e96fc75de8d9f96fece36be
SHA197411564c8bca75e89965537e51b734ed37caa36
SHA2563bcd401d43dba9d85041b2b1ddba6b975902eee90e5aa9eed8da7f0a05ec2964
SHA512542ac2f00a30aa14f10737ca0ffa8c0d5bf606193655c23cdab7b8d6669d87017777691793a44b0ae3df8251a1db198a8d57f1cb312421950cc25d7dfd624101
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD559722c447f13b5db7b0a9e75c8f602d1
SHA194a95ebd4005def94a53d5672cd458cb54e86ea2
SHA2567f6126179ed459a2ed1868011ad4cfbd54c7a32c8a529a444c20cd0038183b28
SHA51223e58f87799009ec040bb76f476ba4cfd96f2242c2c13c5b444f60f45c04f6744460ad79d87d37c52e0f361b218b4e28ae80afbe761d3fbf58e06ce8f3ec9c43
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53827dbcb671d9fea0aaf62d2467a1bd0
SHA1101ccd9d0b9c77f4537f5d68351c9daddeb3e310
SHA256d6ad2ff0a029f3ee5f0c789f8b6c851283fbe634a34378d1f9b85d4edf23ffd1
SHA5126d82ed553c659c22844ba7dee17f71db4f273d2fd9e8dd4d277eadbfa5f024bc1817d78c308e5c54414be45535a945eb9f09507f54eeee67c3a6296b5d4708bf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f9ba9fc0e48dc0df30f229d8e119ce10
SHA1451e284977e00f71575e4d044d017df487bf0763
SHA256b4153ad145d661ee0253ff4d62200f898729c9c708ae4dc480cf3a7940a46e87
SHA512fbbde371677049db90c919556099005e94986db744bfa97d8c681b294a82f5751ddf90e2f6dd7cd9d41b52367ffea83bc74a3bd4bc7f9616e1efa5b2ee3f3950
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53051162322b9adecd128c7d8a564c53e
SHA11173d5d18b2812667f2738abb1a814bbe1c101dc
SHA2563aa07e04554a6cc92e89defef6151ceb79168f53ae945e17f1536b92fb9e3ade
SHA51233747c8be3b00031a290e888c0851a6b3f86a6c7acad8e131ec62709ca98993547c8eda47687418803329ab73b705bbcd5668f96e09998f3a929a853f2f8a9e6
-
Filesize
4.1MB
MD5e59b7db2feafff7bdbc8f43c93aa2656
SHA1c880c19367fe2680be08ffd44fd7337f3a8eb8f8
SHA2569f30f3399edea44909a53bb0761b1d3c68dce9171aab5a3e920a5a7e2899c2c6
SHA5125e34f5c4dc7f62ef8370f78cb9632f7248fa245cbdec13568b326bb4e4d08c1e4d986da753543e38798fafa478bd1ebafae147f1e9049fca74fcd4d5416f2d85
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec