Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/05/2024, 11:37 UTC
Static task
static1
Behavioral task
behavioral1
Sample
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe
Resource
win10v2004-20240426-en
General
-
Target
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe
-
Size
4.1MB
-
MD5
3fe8a86a21840c87b9b1e2a74100f002
-
SHA1
833bf15d82cd4cf215173ccae45e1e47eeaeefef
-
SHA256
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3
-
SHA512
a89e132b02eec6a99060c3a1a20e26418e6e25f11cc9240d3bda5beb2572fd485129cbda7261f271de3f7bcfa0b0605a7bbaf83f9c06fc91e0a9b0692969995b
-
SSDEEP
98304:Ok/C6baF9NNXYvR+SQPyohxfWe3/GY9pAEj69:On6bazjovoyoHfX3/GYHK
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/1608-2-0x0000000004640000-0x0000000004F2B000-memory.dmp family_glupteba behavioral2/memory/1608-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1608-52-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1608-54-0x0000000004640000-0x0000000004F2B000-memory.dmp family_glupteba behavioral2/memory/1608-51-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/384-125-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-204-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-214-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-216-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-218-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-220-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-222-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-224-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-226-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-228-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-230-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-232-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-234-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-236-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2260 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 1824 csrss.exe 1624 injector.exe 4612 windefender.exe 1788 windefender.exe -
resource yara_rule behavioral2/files/0x000300000002aa31-207.dat upx behavioral2/memory/4612-208-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1788-211-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4612-213-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1788-215-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1788-219-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe File created C:\Windows\rss\csrss.exe 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1560 sc.exe -
pid Process 2852 powershell.exe 792 powershell.exe 2852 powershell.exe 704 powershell.exe 1384 powershell.exe 3528 powershell.exe 3564 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3720 schtasks.exe 3996 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2391 = "Aleutian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-491 = "India Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 792 powershell.exe 792 powershell.exe 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 2852 powershell.exe 2852 powershell.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 704 powershell.exe 704 powershell.exe 1384 powershell.exe 1384 powershell.exe 3528 powershell.exe 3528 powershell.exe 3564 powershell.exe 3564 powershell.exe 2852 powershell.exe 2852 powershell.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1824 csrss.exe 1824 csrss.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1824 csrss.exe 1824 csrss.exe 1624 injector.exe 1624 injector.exe 1824 csrss.exe 1824 csrss.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 792 powershell.exe Token: SeDebugPrivilege 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Token: SeImpersonatePrivilege 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 704 powershell.exe Token: SeDebugPrivilege 1384 powershell.exe Token: SeDebugPrivilege 3528 powershell.exe Token: SeDebugPrivilege 3564 powershell.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeSystemEnvironmentPrivilege 1824 csrss.exe Token: SeSecurityPrivilege 1560 sc.exe Token: SeSecurityPrivilege 1560 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1608 wrote to memory of 792 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 82 PID 1608 wrote to memory of 792 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 82 PID 1608 wrote to memory of 792 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 82 PID 384 wrote to memory of 2852 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 89 PID 384 wrote to memory of 2852 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 89 PID 384 wrote to memory of 2852 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 89 PID 384 wrote to memory of 1908 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 91 PID 384 wrote to memory of 1908 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 91 PID 1908 wrote to memory of 2260 1908 cmd.exe 93 PID 1908 wrote to memory of 2260 1908 cmd.exe 93 PID 384 wrote to memory of 704 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 95 PID 384 wrote to memory of 704 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 95 PID 384 wrote to memory of 704 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 95 PID 384 wrote to memory of 1384 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 98 PID 384 wrote to memory of 1384 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 98 PID 384 wrote to memory of 1384 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 98 PID 384 wrote to memory of 1824 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 101 PID 384 wrote to memory of 1824 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 101 PID 384 wrote to memory of 1824 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 101 PID 1824 wrote to memory of 3528 1824 csrss.exe 102 PID 1824 wrote to memory of 3528 1824 csrss.exe 102 PID 1824 wrote to memory of 3528 1824 csrss.exe 102 PID 1824 wrote to memory of 3564 1824 csrss.exe 107 PID 1824 wrote to memory of 3564 1824 csrss.exe 107 PID 1824 wrote to memory of 3564 1824 csrss.exe 107 PID 1824 wrote to memory of 2852 1824 csrss.exe 110 PID 1824 wrote to memory of 2852 1824 csrss.exe 110 PID 1824 wrote to memory of 2852 1824 csrss.exe 110 PID 1824 wrote to memory of 1624 1824 csrss.exe 112 PID 1824 wrote to memory of 1624 1824 csrss.exe 112 PID 4612 wrote to memory of 944 4612 windefender.exe 118 PID 4612 wrote to memory of 944 4612 windefender.exe 118 PID 4612 wrote to memory of 944 4612 windefender.exe 118 PID 944 wrote to memory of 1560 944 cmd.exe 119 PID 944 wrote to memory of 1560 944 cmd.exe 119 PID 944 wrote to memory of 1560 944 cmd.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe"C:\Users\Admin\AppData\Local\Temp\985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe"C:\Users\Admin\AppData\Local\Temp\985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2260
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3996
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2252
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3720
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1788
Network
-
Remote address:8.8.8.8:53Request68.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request68.159.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requeststun3.l.google.comIN AResponsestun3.l.google.comIN A74.125.250.129
-
Remote address:8.8.8.8:53Requestcarsalessystem.comIN AResponsecarsalessystem.comIN A172.67.221.71carsalessystem.comIN A104.21.94.82
-
Remote address:8.8.8.8:53Request233.129.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request71.221.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEctldl.windowsupdate.com.delivery.microsoft.comctldl.windowsupdate.com.delivery.microsoft.comIN CNAMEwu-b-net.trafficmanager.netwu-b-net.trafficmanager.netIN CNAMEbg.microsoft.map.fastly.netbg.microsoft.map.fastly.netIN A199.232.210.172bg.microsoft.map.fastly.netIN A199.232.214.172
-
Remote address:8.8.8.8:53Request205.47.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestarc.msn.comIN AResponsearc.msn.comIN CNAMEarc.trafficmanager.netarc.trafficmanager.netIN CNAMEiris-de-prod-azsc-v2-neu-b.northeurope.cloudapp.azure.comiris-de-prod-azsc-v2-neu-b.northeurope.cloudapp.azure.comIN A20.223.36.55
-
Remote address:8.8.8.8:53Requestself.events.data.microsoft.comIN AResponseself.events.data.microsoft.comIN CNAMEself-events-data.trafficmanager.netself-events-data.trafficmanager.netIN CNAMEonedscolprdwus08.westus.cloudapp.azure.comonedscolprdwus08.westus.cloudapp.azure.comIN A20.189.173.9
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Requestserver4.dumperstats.orgIN AResponseserver4.dumperstats.orgIN A185.82.216.111
-
Remote address:8.8.8.8:53Request111.216.82.185.in-addr.arpaIN PTRResponse111.216.82.185.in-addr.arpaIN PTRdedic-mariadebommarez-1201693hosted-by-itldccom
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestarc.msn.comIN AResponsearc.msn.comIN CNAMEarc.trafficmanager.netarc.trafficmanager.netIN CNAMEiris-de-prod-azsc-v2-frc-b.francecentral.cloudapp.azure.comiris-de-prod-azsc-v2-frc-b.francecentral.cloudapp.azure.comIN A20.74.47.205
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request54.120.234.20.in-addr.arpaIN PTRResponse
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360931612_153L2SVWUYAQUME4E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360931612_153L2SVWUYAQUME4E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 415458
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 2FFB746F2393403EAACC490BDD3DB79A Ref B: LON04EDGE0619 Ref C: 2024-05-19T11:37:16Z
date: Sun, 19 May 2024 11:37:15 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 659775
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 81F8569EAD814845A44FF1F3F3E8D33E Ref B: LON04EDGE0619 Ref C: 2024-05-19T11:37:16Z
date: Sun, 19 May 2024 11:37:15 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360931609_1JAA48IJSET6WWQHH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360931609_1JAA48IJSET6WWQHH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 627437
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 790C0023C9894829908D6F7DC2D7240F Ref B: LON04EDGE0619 Ref C: 2024-05-19T11:37:16Z
date: Sun, 19 May 2024 11:37:15 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340783939_14IT4JGOWRFC6CMW9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239340783939_14IT4JGOWRFC6CMW9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 792794
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 934151B8C1CF4688BA45234207C75C9C Ref B: LON04EDGE0619 Ref C: 2024-05-19T11:37:16Z
date: Sun, 19 May 2024 11:37:15 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360931611_1SOG5TNNJKE1WH1R0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360931611_1SOG5TNNJKE1WH1R0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 621794
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 2B243761397F4A6E8530BAA9CA748076 Ref B: LON04EDGE0619 Ref C: 2024-05-19T11:37:16Z
date: Sun, 19 May 2024 11:37:15 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360931610_110BPTPDN41GIXK2B&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239360931610_110BPTPDN41GIXK2B&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.22000
ResponseHTTP/2.0 200
content-length: 430689
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 1AD0C089CD7745A3AE5E6F959FA390CA Ref B: LON04EDGE0619 Ref C: 2024-05-19T11:37:17Z
date: Sun, 19 May 2024 11:37:17 GMT
-
1.3kB 8.1kB 16 14
-
1.4kB 8.5kB 17 14
-
1.3kB 8.2kB 17 15
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239360931610_110BPTPDN41GIXK2B&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90tls, http2125.7kB 3.7MB 2673 2662
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360931612_153L2SVWUYAQUME4E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340783938_154JBSOQL12JS43YR&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360931609_1JAA48IJSET6WWQHH&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340783939_14IT4JGOWRFC6CMW9&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360931611_1SOG5TNNJKE1WH1R0&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360931610_110BPTPDN41GIXK2B&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200 -
1.3kB 8.2kB 17 15
-
1.4kB 6.2kB 18 21
-
1.4kB 5.1kB 13 14
-
93.5kB 2.3MB 1700 1750
-
1.3kB 4.7kB 11 12
-
1.9kB 4.7kB 11 14
-
1.9kB 4.7kB 11 13
-
-
144 B 158 B 2 1
DNS Request
68.159.190.20.in-addr.arpa
DNS Request
68.159.190.20.in-addr.arpa
-
682 B 1.5kB 10 10
DNS Request
95.221.229.192.in-addr.arpa
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
DNS Request
stun3.l.google.com
DNS Response
74.125.250.129
DNS Request
carsalessystem.com
DNS Response
172.67.221.71104.21.94.82
DNS Request
233.129.159.162.in-addr.arpa
DNS Request
71.221.67.172.in-addr.arpa
DNS Request
ctldl.windowsupdate.com
DNS Response
199.232.210.172199.232.214.172
DNS Request
205.47.74.20.in-addr.arpa
DNS Request
arc.msn.com
DNS Response
20.223.36.55
DNS Request
self.events.data.microsoft.com
DNS Response
20.189.173.9
-
559 B 1.1kB 8 8
DNS Request
88.156.103.20.in-addr.arpa
DNS Request
200.197.79.204.in-addr.arpa
DNS Request
server4.dumperstats.org
DNS Response
185.82.216.111
DNS Request
111.216.82.185.in-addr.arpa
DNS Request
55.36.223.20.in-addr.arpa
DNS Request
arc.msn.com
DNS Response
20.74.47.205
DNS Request
43.229.111.52.in-addr.arpa
DNS Request
54.120.234.20.in-addr.arpa
-
48 B 60 B 1 1
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5572d42411dfd0710be63b11029f4f5a0
SHA1646b588050eeb4d103840ab938a79a97da2b300e
SHA256803a078689f7f37df0f3085e1d11fe86275916e57305b66d58ba3ed32cd4c3b6
SHA51248f7510bf287f4f7fdf19c4f75e45587492361e68b7f6a8b7d6212b0984d91646fddc69d5a5598ee06314fdacb2252e488092c3e253b26f313c4c9718ebd9404
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD506180aa084f48df9d8cbd0c86428fd6e
SHA1b516a04a0766b70f4892c42dab73714802298d5d
SHA2565ef258e5cd55d3f6a39562ee3467446869b1043533fd71d73971aae37df41bed
SHA512edb20eb70dcb46d2b931da04283ea7621dd63a3dc25b1884886b43bc6da28592f4091119cd523d49f7c1b56cd562ebca5c1ad91f5ee4f7ae112049451e3b1a10
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52d43d4766397ae887c00d23266bf6f97
SHA1669884655c13f874453c2323b4b204554287e1e4
SHA25648709845a69ad79f5ce4807592cf3290516523ae84ca3d97675f38637c3b2458
SHA5121985c7948b379c97432c4cd67c81ea60aeb3bfc946665bc3f090cc2af49befa878b6bb50493be3fdafa54d8de9171b1b21efeca0d588ba1883843023a98f74fc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5821d42db5cd82bc82346962b543fe70f
SHA1154732914f2bd60fad5a0b71dedee18ca44178b7
SHA25669fa6cc5398b7d3facd6779a6f098544b9ca53f22818f7b1721740434130d3e8
SHA512c927fb4fbfbd444103d081aed77bdb13c48bec35efd04757a59c7ad129b65043ec392f12fca6140a0e65dc1ac47dfe189f95727cec0fb1892b75931a44450dfe
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57d1b46c52bc868aa13ee3f8229c33c0b
SHA18fbc819745efc2a5facfcc6f0d667db0c160d7fb
SHA256c8747dd104dc45ed30dbbdf83193d5cc4194c7084dbf7ca8626b1f6f0b838159
SHA512662cb4fb0bcc234357fef78e92a9b4ae0351bbd9f5ea83282a11922081ac5965cb0654bf0fbb261b46ed9dd0ebb66ee8a1f04bb57e896df8ecc94c87060add17
-
Filesize
4.1MB
MD53fe8a86a21840c87b9b1e2a74100f002
SHA1833bf15d82cd4cf215173ccae45e1e47eeaeefef
SHA256985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3
SHA512a89e132b02eec6a99060c3a1a20e26418e6e25f11cc9240d3bda5beb2572fd485129cbda7261f271de3f7bcfa0b0605a7bbaf83f9c06fc91e0a9b0692969995b
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec