Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 11:35 UTC
Static task
static1
Behavioral task
behavioral1
Sample
81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe
Resource
win10v2004-20240426-en
General
-
Target
81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe
-
Size
4.1MB
-
MD5
cb6a29e08314289f9331972b48abf960
-
SHA1
44fab7c4febffeed8f0a677fbfed75f0fa941db2
-
SHA256
81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e
-
SHA512
06ccc47678e0a177ef0a395113327420c8f9638a07682913d9d9835ab1acccd3c4e2d51515d3441e3bf4d75f6f38e2a8f2435026ebb7dd53cc929998fca8a7c2
-
SSDEEP
98304:Wk/C6baF9NNXYvR+SQPyohxfWe3/GY9pAEj6j:Wn6bazjovoyoHfX3/GYHk
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/3584-2-0x0000000004500000-0x0000000004DEB000-memory.dmp family_glupteba behavioral1/memory/3584-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3584-47-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3584-48-0x0000000004500000-0x0000000004DEB000-memory.dmp family_glupteba behavioral1/memory/3584-46-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3352-131-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-214-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-223-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-225-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-227-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-229-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-231-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-233-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-235-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-237-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-239-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-241-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-243-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-245-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3592 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 3036 csrss.exe 3920 injector.exe 1360 windefender.exe 404 windefender.exe -
resource yara_rule behavioral1/files/0x000800000002342b-217.dat upx behavioral1/memory/1360-218-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/404-222-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1360-221-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/404-224-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/404-228-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1880 sc.exe -
pid Process 3252 powershell.exe 4844 powershell.exe 4300 powershell.exe 400 powershell.exe 2680 powershell.exe 2468 powershell.exe 516 powershell.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3116 516 WerFault.exe 85 1836 3584 WerFault.exe 81 1284 3352 WerFault.exe 93 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4340 schtasks.exe 3536 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 powershell.exe 516 powershell.exe 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3252 powershell.exe 3252 powershell.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 4844 powershell.exe 4844 powershell.exe 4300 powershell.exe 4300 powershell.exe 400 powershell.exe 400 powershell.exe 2680 powershell.exe 2680 powershell.exe 2468 powershell.exe 2468 powershell.exe 2468 powershell.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3036 csrss.exe 3036 csrss.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3036 csrss.exe 3036 csrss.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3036 csrss.exe 3036 csrss.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 516 powershell.exe Token: SeDebugPrivilege 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Token: SeImpersonatePrivilege 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Token: SeDebugPrivilege 3252 powershell.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeDebugPrivilege 4300 powershell.exe Token: SeDebugPrivilege 400 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2468 powershell.exe Token: SeSystemEnvironmentPrivilege 3036 csrss.exe Token: SeSecurityPrivilege 1880 sc.exe Token: SeSecurityPrivilege 1880 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3584 wrote to memory of 516 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 85 PID 3584 wrote to memory of 516 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 85 PID 3584 wrote to memory of 516 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 85 PID 3352 wrote to memory of 3252 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 96 PID 3352 wrote to memory of 3252 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 96 PID 3352 wrote to memory of 3252 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 96 PID 3352 wrote to memory of 2496 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 98 PID 3352 wrote to memory of 2496 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 98 PID 2496 wrote to memory of 3592 2496 cmd.exe 100 PID 2496 wrote to memory of 3592 2496 cmd.exe 100 PID 3352 wrote to memory of 4844 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 101 PID 3352 wrote to memory of 4844 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 101 PID 3352 wrote to memory of 4844 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 101 PID 3352 wrote to memory of 4300 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 105 PID 3352 wrote to memory of 4300 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 105 PID 3352 wrote to memory of 4300 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 105 PID 3352 wrote to memory of 3036 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 108 PID 3352 wrote to memory of 3036 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 108 PID 3352 wrote to memory of 3036 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 108 PID 3036 wrote to memory of 400 3036 csrss.exe 111 PID 3036 wrote to memory of 400 3036 csrss.exe 111 PID 3036 wrote to memory of 400 3036 csrss.exe 111 PID 3036 wrote to memory of 2680 3036 csrss.exe 117 PID 3036 wrote to memory of 2680 3036 csrss.exe 117 PID 3036 wrote to memory of 2680 3036 csrss.exe 117 PID 3036 wrote to memory of 2468 3036 csrss.exe 121 PID 3036 wrote to memory of 2468 3036 csrss.exe 121 PID 3036 wrote to memory of 2468 3036 csrss.exe 121 PID 3036 wrote to memory of 3920 3036 csrss.exe 123 PID 3036 wrote to memory of 3920 3036 csrss.exe 123 PID 1360 wrote to memory of 4728 1360 windefender.exe 129 PID 1360 wrote to memory of 4728 1360 windefender.exe 129 PID 1360 wrote to memory of 4728 1360 windefender.exe 129 PID 4728 wrote to memory of 1880 4728 cmd.exe 130 PID 4728 wrote to memory of 1880 4728 cmd.exe 130 PID 4728 wrote to memory of 1880 4728 cmd.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe"C:\Users\Admin\AppData\Local\Temp\81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 24923⤵
- Program crash
PID:3116
-
-
-
C:\Users\Admin\AppData\Local\Temp\81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe"C:\Users\Admin\AppData\Local\Temp\81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3592
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4340
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3536
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 7403⤵
- Program crash
PID:1284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 6322⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 516 -ip 5161⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3584 -ip 35841⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3352 -ip 33521⤵PID:4904
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:404
Network
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A204.79.197.237dual-a-0034.a-msedge.netIN A13.107.21.237
-
GEThttps://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8gO4dDztiGiM8aPZizSZ9ZDVUCUyH5PgadmUVv90yHNADrpIQCQvFs707XEQZLaUtIZ0OeLKL-RsgwAd3epnwMmDX0XGHpa4k_diEQJGzBEZCzCPKAPVvzcS-BH7NNe1BaYkPCpFmxyQ_bzj08CzZQfpKBGBakjIeTsJD8Xq6aspi05Th%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D452cfe3d74d11eecd4919816dd637671&TIME=20240426T131914Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038&muid=416143B6C3858B3296EFB62827C91949Remote address:204.79.197.237:443RequestGET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8gO4dDztiGiM8aPZizSZ9ZDVUCUyH5PgadmUVv90yHNADrpIQCQvFs707XEQZLaUtIZ0OeLKL-RsgwAd3epnwMmDX0XGHpa4k_diEQJGzBEZCzCPKAPVvzcS-BH7NNe1BaYkPCpFmxyQ_bzj08CzZQfpKBGBakjIeTsJD8Xq6aspi05Th%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D452cfe3d74d11eecd4919816dd637671&TIME=20240426T131914Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038&muid=416143B6C3858B3296EFB62827C91949 HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=3D518310A6ED628515E69794A70D6371; domain=.bing.com; expires=Fri, 13-Jun-2025 11:35:18 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: E8C6C11CDBDB4EADB4553FC877E48083 Ref B: LON04EDGE1109 Ref C: 2024-05-19T11:35:18Z
date: Sun, 19 May 2024 11:35:18 GMT
-
GEThttps://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8gO4dDztiGiM8aPZizSZ9ZDVUCUyH5PgadmUVv90yHNADrpIQCQvFs707XEQZLaUtIZ0OeLKL-RsgwAd3epnwMmDX0XGHpa4k_diEQJGzBEZCzCPKAPVvzcS-BH7NNe1BaYkPCpFmxyQ_bzj08CzZQfpKBGBakjIeTsJD8Xq6aspi05Th%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D452cfe3d74d11eecd4919816dd637671&TIME=20240426T131914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038&muid=416143B6C3858B3296EFB62827C91949Remote address:204.79.197.237:443RequestGET /neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8gO4dDztiGiM8aPZizSZ9ZDVUCUyH5PgadmUVv90yHNADrpIQCQvFs707XEQZLaUtIZ0OeLKL-RsgwAd3epnwMmDX0XGHpa4k_diEQJGzBEZCzCPKAPVvzcS-BH7NNe1BaYkPCpFmxyQ_bzj08CzZQfpKBGBakjIeTsJD8Xq6aspi05Th%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D452cfe3d74d11eecd4919816dd637671&TIME=20240426T131914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038&muid=416143B6C3858B3296EFB62827C91949 HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=3D518310A6ED628515E69794A70D6371; _EDGE_S=SID=28890C608B2569EA020E18E48A49683D
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=ajYnteCLN6X9WsfRgx6EzKPlyzDz2pqNuqMylpsjb0c; domain=.bing.com; expires=Fri, 13-Jun-2025 11:35:19 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: E14BC06B991A462B859A831EFB569C5C Ref B: LON04EDGE1109 Ref C: 2024-05-19T11:35:19Z
date: Sun, 19 May 2024 11:35:19 GMT
-
Remote address:8.8.8.8:53Request82.90.14.23.in-addr.arpaIN PTRResponse82.90.14.23.in-addr.arpaIN PTRa23-14-90-82deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request237.197.79.204.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
GEThttps://www.bing.com/aes/c.gif?RG=c3c14100360d44aebe46e58efe237d6a&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T131914Z&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038Remote address:23.62.61.129:443RequestGET /aes/c.gif?RG=c3c14100360d44aebe46e58efe237d6a&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T131914Z&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038 HTTP/2.0
host: www.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=3D518310A6ED628515E69794A70D6371
ResponseHTTP/2.0 200
pragma: no-cache
vary: Origin
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 4E29FA07A74847099BA33E7C94ADE700 Ref B: BRU30EDGE0618 Ref C: 2024-05-19T11:35:19Z
content-length: 0
date: Sun, 19 May 2024 11:35:19 GMT
set-cookie: _EDGE_S=SID=28890C608B2569EA020E18E48A49683D; path=/; httponly; domain=bing.com
set-cookie: MUIDB=3D518310A6ED628515E69794A70D6371; path=/; httponly; expires=Fri, 13-Jun-2025 11:35:19 GMT
alt-svc: h3=":443"; ma=93600
x-cdn-traceid: 0.7d3d3e17.1716118519.e7bd0c2
-
Remote address:8.8.8.8:53Request68.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request129.61.62.23.in-addr.arpaIN PTRResponse129.61.62.23.in-addr.arpaIN PTRa23-62-61-129deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestef579e38-871d-4356-a028-15948f9253d2.uuid.myfastupdate.orgIN TXTResponse
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requeststun1.l.google.comIN AResponsestun1.l.google.comIN A74.125.250.129
-
Remote address:8.8.8.8:53Requestserver7.myfastupdate.orgIN AResponseserver7.myfastupdate.orgIN A185.82.216.111
-
Remote address:8.8.8.8:53Requestcdn.discordapp.comIN AResponsecdn.discordapp.comIN A162.159.129.233cdn.discordapp.comIN A162.159.130.233cdn.discordapp.comIN A162.159.133.233cdn.discordapp.comIN A162.159.135.233cdn.discordapp.comIN A162.159.134.233
-
Remote address:8.8.8.8:53Request129.250.125.74.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestcarsalessystem.comIN AResponsecarsalessystem.comIN A104.21.94.82carsalessystem.comIN A172.67.221.71
-
Remote address:8.8.8.8:53Requestcarsalessystem.comIN A
-
Remote address:8.8.8.8:53Request233.129.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request111.216.82.185.in-addr.arpaIN PTRResponse111.216.82.185.in-addr.arpaIN PTRdedic-mariadebommarez-1201693hosted-by-itldccom
-
Remote address:8.8.8.8:53Request82.94.21.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.254.1.23.in-addr.arpaIN PTRResponse200.254.1.23.in-addr.arpaIN PTRa23-1-254-200deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340783939_14IT4JGOWRFC6CMW9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340783939_14IT4JGOWRFC6CMW9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 659775
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F052B7D4DA354CA4B2106ED692259337 Ref B: LON04EDGE1009 Ref C: 2024-05-19T11:37:04Z
date: Sun, 19 May 2024 11:37:03 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360931612_153L2SVWUYAQUME4E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360931612_153L2SVWUYAQUME4E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 792794
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C0BE436957944724ADE5665303AE85F4 Ref B: LON04EDGE1009 Ref C: 2024-05-19T11:37:04Z
date: Sun, 19 May 2024 11:37:03 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360931611_1SOG5TNNJKE1WH1R0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360931611_1SOG5TNNJKE1WH1R0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 621794
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: BE8AAC141666428886649C83360B19BC Ref B: LON04EDGE1009 Ref C: 2024-05-19T11:37:04Z
date: Sun, 19 May 2024 11:37:03 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 627437
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 746D8ACB08A8420584261B36F2798408 Ref B: LON04EDGE1009 Ref C: 2024-05-19T11:37:04Z
date: Sun, 19 May 2024 11:37:03 GMT
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
204.79.197.237:443https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8gO4dDztiGiM8aPZizSZ9ZDVUCUyH5PgadmUVv90yHNADrpIQCQvFs707XEQZLaUtIZ0OeLKL-RsgwAd3epnwMmDX0XGHpa4k_diEQJGzBEZCzCPKAPVvzcS-BH7NNe1BaYkPCpFmxyQ_bzj08CzZQfpKBGBakjIeTsJD8Xq6aspi05Th%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D452cfe3d74d11eecd4919816dd637671&TIME=20240426T131914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038&muid=416143B6C3858B3296EFB62827C91949tls, http22.6kB 9.4kB 20 16
HTTP Request
GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8gO4dDztiGiM8aPZizSZ9ZDVUCUyH5PgadmUVv90yHNADrpIQCQvFs707XEQZLaUtIZ0OeLKL-RsgwAd3epnwMmDX0XGHpa4k_diEQJGzBEZCzCPKAPVvzcS-BH7NNe1BaYkPCpFmxyQ_bzj08CzZQfpKBGBakjIeTsJD8Xq6aspi05Th%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D452cfe3d74d11eecd4919816dd637671&TIME=20240426T131914Z&CID=530628298&EID=530628298&tids=15000&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038&muid=416143B6C3858B3296EFB62827C91949HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=impression&rlink=https%3A%2F%2Fwww.bing.com%2Faclick%3Fld%3De8gO4dDztiGiM8aPZizSZ9ZDVUCUyH5PgadmUVv90yHNADrpIQCQvFs707XEQZLaUtIZ0OeLKL-RsgwAd3epnwMmDX0XGHpa4k_diEQJGzBEZCzCPKAPVvzcS-BH7NNe1BaYkPCpFmxyQ_bzj08CzZQfpKBGBakjIeTsJD8Xq6aspi05Th%26u%3DbXN4Ym94JTNhJTJmJTJmZ2FtZSUyZiUzZnByb2R1Y3RJZCUzZDlOMEg2MktaM0JYViUyNm9jaWQlM2RpbnBfcm1jX3hib19zdGFydF9UUHRpdGxlX2VuZ2FnZQ%26rlid%3D452cfe3d74d11eecd4919816dd637671&TIME=20240426T131914Z&CID=530628298&EID=&tids=15000&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038&muid=416143B6C3858B3296EFB62827C91949HTTP Response
204 -
23.62.61.129:443https://www.bing.com/aes/c.gif?RG=c3c14100360d44aebe46e58efe237d6a&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T131914Z&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038tls, http22.6kB 5.3kB 20 11
HTTP Request
GET https://www.bing.com/aes/c.gif?RG=c3c14100360d44aebe46e58efe237d6a&med=10&pubId=251978541&tids=15000&type=mv&reqver=1.0&TIME=20240426T131914Z&adUnitId=11730597&localId=w:416143B6-C385-8B32-96EF-B62827C91949&deviceId=6825828828137038HTTP Response
200 -
1.4kB 6.2kB 18 21
-
1.4kB 5.1kB 13 14
-
87.3kB 2.2MB 1652 1638
-
1.3kB 4.7kB 11 13
-
1.9kB 4.7kB 11 13
-
1.2kB 8.1kB 16 14
-
1.2kB 8.1kB 16 14
-
1.2kB 8.0kB 16 12
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http296.3kB 2.8MB 2043 2037
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340783939_14IT4JGOWRFC6CMW9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360931612_153L2SVWUYAQUME4E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360931611_1SOG5TNNJKE1WH1R0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200 -
1.9kB 4.7kB 11 13
-
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.23713.107.21.237
-
70 B 133 B 1 1
DNS Request
82.90.14.23.in-addr.arpa
-
73 B 143 B 1 1
DNS Request
237.197.79.204.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
68.159.190.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
129.61.62.23.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
104 B 165 B 1 1
DNS Request
ef579e38-871d-4356-a028-15948f9253d2.uuid.myfastupdate.org
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
64 B 80 B 1 1
DNS Request
stun1.l.google.com
DNS Response
74.125.250.129
-
70 B 86 B 1 1
DNS Request
server7.myfastupdate.org
DNS Response
185.82.216.111
-
64 B 144 B 1 1
DNS Request
cdn.discordapp.com
DNS Response
162.159.129.233162.159.130.233162.159.133.233162.159.135.233162.159.134.233
-
48 B 60 B 1 1
-
73 B 133 B 1 1
DNS Request
129.250.125.74.in-addr.arpa
-
128 B 96 B 2 1
DNS Request
carsalessystem.com
DNS Request
carsalessystem.com
DNS Response
104.21.94.82172.67.221.71
-
74 B 136 B 1 1
DNS Request
233.129.159.162.in-addr.arpa
-
73 B 136 B 1 1
DNS Request
111.216.82.185.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
82.94.21.104.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
200.254.1.23.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD587e6c62647bfe0381498754e60cb02ea
SHA1bb7b98fc66bb73f23b2262c4962fc90a798b9257
SHA256641e0c3b978326b07a56d98f137737f713dddae57bb8b8a433ea553bf6e14053
SHA5129858af1e21d3e3a7cac2d43404bc9a5fa078c002f44ffa44a8a696e8c68ddaac5e144f475a2ed5a1cf16ba0900c0f93c618269e1a5a88a4de05e42b70c79a5c8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e4a892d299f4ef084ebd65eed57ab078
SHA1124e3575928154dca0339daf1f6eafd699a397ad
SHA256ce2119396c1a9577f55b2cffd6e4bb1456b1fe819ec59e71d00c435138c7d295
SHA512518f5e52886dfbbf67eb58009332f633815a73998681f952d257a4624f5201a8343384ae54994ffe9574f26ba4ebd7915f52dca66ea6ba70c9f0781c50e0e41b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b3e54ed320793b1dcbdf870cab196480
SHA1db61794d118f8b5662888488cefd4df90fdb7efe
SHA2567d767eb32248e1b09be726d630c048a93b993314437aa5684282b6cd670f3c82
SHA512a37e58405432345e32cfe59ac17e368dec4c21dd47c19787fbbbc3ef5055ad6789f4b5f37a710fd6c9e575568059f7bf34b97134c5d3d312290c31aac768ab7a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50f4b6302d707fe2c973955b850e5a6e7
SHA1bc00c3966b3ab1f31c03129f6b227692e48ead60
SHA256b56bd5d22732cc2d97d7618cba71f15a9268a473d92bdc2734be7dd3fbc039f0
SHA512b1385b30d1ac89acaea4e5345461426416520a1390f6bf537afbacbfe139517a343fb98f3b717a06d5387c008954d58d3cb0e10ec467c6c6ebc5dbb64a3e4957
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d995aa2f469ad85aef68747aeba04449
SHA131543613b2247dbe4ae59cc69072d5318b8190cc
SHA256d7ab761690bae521fed0ab31043177111c237e4a48c3cb723f7b60b8dede5a35
SHA512b7b90be1e811569acba22218f0e8c31f33fc736ab1eaba43e82a4251f10c4a57f945ca9ee412f50289f7e58abff3a17d5161858d796378cf5b10b7b94027d76d
-
Filesize
4.1MB
MD5cb6a29e08314289f9331972b48abf960
SHA144fab7c4febffeed8f0a677fbfed75f0fa941db2
SHA25681ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e
SHA51206ccc47678e0a177ef0a395113327420c8f9638a07682913d9d9835ab1acccd3c4e2d51515d3441e3bf4d75f6f38e2a8f2435026ebb7dd53cc929998fca8a7c2
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec