Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 12:16
Behavioral task
behavioral1
Sample
22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe
Resource
win10v2004-20240709-en
General
-
Target
22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe
-
Size
8.9MB
-
MD5
5bfd9f368a71aae200d7f8dc950c562c
-
SHA1
1d122608ef3bf20cd04df6d52ebb6d79b9bad693
-
SHA256
22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db
-
SHA512
5a589983adc1a6cf7ed9a7abb3e2dcffc42e9f2ca76b762d75f85ccc418d0b2de9d4e15c5393deb0fc1b95573c246f4556aec3c98bd831d21394efb1f09a8ae8
-
SSDEEP
98304:gHxMZDJ1TRpxYVX9u2IazANfLhZytTD5iqa:GxEvYjVzANDhwN
Malware Config
Signatures
-
Glupteba payload 7 IoCs
resource yara_rule behavioral2/memory/684-5-0x0000000000B00000-0x0000000001421000-memory.dmp family_glupteba behavioral2/memory/4776-100-0x0000000000B00000-0x0000000001421000-memory.dmp family_glupteba behavioral2/memory/684-97-0x0000000000B00000-0x0000000001421000-memory.dmp family_glupteba behavioral2/files/0x00080000000234c3-183.dat family_glupteba behavioral2/memory/4776-186-0x0000000000B00000-0x0000000001421000-memory.dmp family_glupteba behavioral2/memory/4976-187-0x00000000007F0000-0x0000000001111000-memory.dmp family_glupteba behavioral2/memory/4976-276-0x00000000007F0000-0x0000000001111000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1700 netsh.exe -
resource yara_rule behavioral2/files/0x0009000000023452-2.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation himQhJ.exe -
Executes dropped EXE 5 IoCs
pid Process 1728 himQhJ.exe 4332 himQhJ.exe 4976 csrss.exe 2676 himQhJ.exe 5000 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe himQhJ.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe himQhJ.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe himQhJ.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE himQhJ.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe himQhJ.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\chrome_pwa_launcher.exe himQhJ.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe himQhJ.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe himQhJ.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe himQhJ.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler64.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe himQhJ.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE himQhJ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe himQhJ.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleApp.exe himQhJ.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\notification_helper.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\XLICONS.EXE himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe himQhJ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe himQhJ.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE himQhJ.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe himQhJ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe himQhJ.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe himQhJ.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe himQhJ.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe himQhJ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe himQhJ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE himQhJ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe himQhJ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe himQhJ.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe himQhJ.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe File opened for modification C:\Windows\rss 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe -
pid Process 3620 powershell.exe 4756 powershell.exe 3860 powershell.exe 5036 powershell.exe 3984 powershell.exe 216 powershell.exe 4788 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language himQhJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language himQhJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language himQhJ.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3840 schtasks.exe 216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3984 powershell.exe 3984 powershell.exe 684 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 684 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 216 powershell.exe 216 powershell.exe 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 4788 powershell.exe 4788 powershell.exe 4788 powershell.exe 3620 powershell.exe 3620 powershell.exe 4756 powershell.exe 4756 powershell.exe 3860 powershell.exe 3860 powershell.exe 5036 powershell.exe 5036 powershell.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 4976 csrss.exe 4976 csrss.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 4976 csrss.exe 4976 csrss.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe 5000 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3984 powershell.exe Token: SeDebugPrivilege 684 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Token: SeImpersonatePrivilege 684 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe Token: SeDebugPrivilege 216 powershell.exe Token: SeDebugPrivilege 4788 powershell.exe Token: SeDebugPrivilege 3620 powershell.exe Token: SeDebugPrivilege 4756 powershell.exe Token: SeDebugPrivilege 3860 powershell.exe Token: SeDebugPrivilege 5036 powershell.exe Token: SeSystemEnvironmentPrivilege 4976 csrss.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 684 wrote to memory of 1728 684 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 84 PID 684 wrote to memory of 1728 684 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 84 PID 684 wrote to memory of 1728 684 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 84 PID 684 wrote to memory of 3984 684 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 87 PID 684 wrote to memory of 3984 684 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 87 PID 684 wrote to memory of 3984 684 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 87 PID 1728 wrote to memory of 1132 1728 himQhJ.exe 91 PID 1728 wrote to memory of 1132 1728 himQhJ.exe 91 PID 1728 wrote to memory of 1132 1728 himQhJ.exe 91 PID 4776 wrote to memory of 4332 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 99 PID 4776 wrote to memory of 4332 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 99 PID 4776 wrote to memory of 4332 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 99 PID 4332 wrote to memory of 1492 4332 himQhJ.exe 100 PID 4332 wrote to memory of 1492 4332 himQhJ.exe 100 PID 4332 wrote to memory of 1492 4332 himQhJ.exe 100 PID 4776 wrote to memory of 216 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 102 PID 4776 wrote to memory of 216 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 102 PID 4776 wrote to memory of 216 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 102 PID 4776 wrote to memory of 508 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 105 PID 4776 wrote to memory of 508 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 105 PID 508 wrote to memory of 1700 508 cmd.exe 108 PID 508 wrote to memory of 1700 508 cmd.exe 108 PID 4776 wrote to memory of 4788 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 109 PID 4776 wrote to memory of 4788 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 109 PID 4776 wrote to memory of 4788 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 109 PID 4776 wrote to memory of 3620 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 111 PID 4776 wrote to memory of 3620 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 111 PID 4776 wrote to memory of 3620 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 111 PID 4776 wrote to memory of 4976 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 113 PID 4776 wrote to memory of 4976 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 113 PID 4776 wrote to memory of 4976 4776 22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe 113 PID 4976 wrote to memory of 2676 4976 csrss.exe 114 PID 4976 wrote to memory of 2676 4976 csrss.exe 114 PID 4976 wrote to memory of 2676 4976 csrss.exe 114 PID 2676 wrote to memory of 3224 2676 himQhJ.exe 115 PID 2676 wrote to memory of 3224 2676 himQhJ.exe 115 PID 2676 wrote to memory of 3224 2676 himQhJ.exe 115 PID 4976 wrote to memory of 4756 4976 csrss.exe 117 PID 4976 wrote to memory of 4756 4976 csrss.exe 117 PID 4976 wrote to memory of 4756 4976 csrss.exe 117 PID 4976 wrote to memory of 3860 4976 csrss.exe 122 PID 4976 wrote to memory of 3860 4976 csrss.exe 122 PID 4976 wrote to memory of 3860 4976 csrss.exe 122 PID 4976 wrote to memory of 5036 4976 csrss.exe 125 PID 4976 wrote to memory of 5036 4976 csrss.exe 125 PID 4976 wrote to memory of 5036 4976 csrss.exe 125 PID 4976 wrote to memory of 5000 4976 csrss.exe 127 PID 4976 wrote to memory of 5000 4976 csrss.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe"C:\Users\Admin\AppData\Local\Temp\22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\himQhJ.exeC:\Users\Admin\AppData\Local\Temp\himQhJ.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\789146bd.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1132
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe"C:\Users\Admin\AppData\Local\Temp\22e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\TEMP\himQhJ.exeC:\Windows\TEMP\himQhJ.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\TEMP\1f6109a7.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1700
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\TEMP\himQhJ.exeC:\Windows\TEMP\himQhJ.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\TEMP\386a493e.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:3224
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:216
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4120
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:3840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
187B
MD5e93a873e4541aa11f6bed99f50390386
SHA1bcffec15b44e4861346d4ce214adfc72631378ff
SHA256012733861250cab1e6b40b6be2dc6d0c820b1f1c4750268681be2c345a5ae68d
SHA51222f673d7d0bfed25543567ae404c87b3e1c160befa14b2e3ee48651c10f9316a1de9d4d0fc468d8a5ad17083d72a5b3659706fb2e20852c60364fba7a9d28347
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
15KB
MD5f7d21de5c4e81341eccd280c11ddcc9a
SHA1d4e9ef10d7685d491583c6fa93ae5d9105d815bd
SHA2564485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794
SHA512e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD557609947339b0bd69bb102613e3ac77a
SHA1a0f7ea266c7207860d7a0c74e29980d1fbe5d9d1
SHA256e96cca388e378bfceb19196b93438e386829ea00a2c5a25f793c14de5ba5f2f1
SHA5127425ef74da5a06d63952419dda2a729530a981448de462d3d1486586a5d78d45fcb4effb84626cdb08674c0ee9250a458ede69e970b95edad737b6eb8a39f6f3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52e0b4cec7a0b296a4940a0b5e430e5b9
SHA11f70ed09c4c2a032a73d6ed2ab161efb49e32a29
SHA2569725065abab8b53589786390b4671a95d61e29de0dec3088462691a9ebedaf7a
SHA512d3b514cbe1bb3252dd5188ce784084c2d86f439e6eba6374fe5cb4d3b4ea254883f5f84863ea4ed626c82cf8f8ccf8d91134ce1e9fe2c359ce6935be34b6180d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5280699cfb64d4e75a37133ffafc1bcaa
SHA10718dec31beea5ea6f08fc71f858113e0be318b2
SHA25699becc434cbf575915858067bf658acf9cedc5d679e8c430010c2021beab4ff5
SHA51226d3e4596bf7352d96089b34c1509ebdf4f115db945067f23a789aedfa7135c254cca21dc17b6bc1393977c8f8c2ee0134c4c6b4f233eda32aa1cf543cb0fcb0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54f140b9fb928660408b111eaf5515814
SHA1a7ab2052c83f2d7da1be701475d992a328f9221b
SHA25697d7d2c13057d9926fd522ee5c2771fedd79e169f95e3b3360bf5dacac24648a
SHA51284adddf74960eac2d0485d91482c568aae045e35ac10bcda3a810de9eb54b93f101fec44d4356cc51dbba746c78001baeb6754f84f12ac1a31ef872a3e440433
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD550bf65579656c8b40020594b31222e4d
SHA1187321468d8445ac9a41a2a82e5044f6a709f0ae
SHA2561dd23b62dfcb75b86dc20f1d7adeb82343cee408114dc11d88b580ba4cac6723
SHA512ce579f442fb2bb8e057b0b33c302d0e5f12d495d1828621dba8edcab473f477e91cd6ec8449224a2eb14c686e3431d59f11a91e63deb71793f18fce603a131ca
-
Filesize
133B
MD547bfd1defc98fe875c89a920becbaddf
SHA179cc1668437b8b283bbcfd4bf7d37dfcc4624666
SHA25613bb7283682fe765c4e463b853399b28ae11fec75f8b807366f603188b3519ee
SHA51250e500b2c791ed401f5c26ba649fbb1cacc17ead8e05b97908f0f4d8800ebda74370515b33ff045f12e8065bc0d91af7be70b02114bd72b312073953c96e7b9c
-
Filesize
133B
MD5789a8a16812553c02610de4582e1aa8b
SHA189f4f70d5d7380bfaf7b0ec0202f9c089894dea1
SHA25697b98998865104bb794ac3ed4a722a993f9bcffe1f0e5efeef4b567ae2a3ae0f
SHA5125e67390ecfa11df64b1a24c51f93e8f98c7ef2bb47e5397cf8ccdb8cb3fa4cc36fdb3d9a8e013165f746d83e1d8ad53087c73a5c74a9c20a1ebf589a25d38580
-
Filesize
8.9MB
MD55bfd9f368a71aae200d7f8dc950c562c
SHA11d122608ef3bf20cd04df6d52ebb6d79b9bad693
SHA25622e20fbd8e95ac7b3a77b815e1a438e545354adb5a1bd5a90220a9c17b4008db
SHA5125a589983adc1a6cf7ed9a7abb3e2dcffc42e9f2ca76b762d75f85ccc418d0b2de9d4e15c5393deb0fc1b95573c246f4556aec3c98bd831d21394efb1f09a8ae8