Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/05/2023, 09:42
Static task
static1
General
-
Target
fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe
-
Size
4.2MB
-
MD5
1b30d4919c98b4d049f9740601220905
-
SHA1
eecc22b5a1fd9d20e29c32ca3ff25794c19ac112
-
SHA256
fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9
-
SHA512
0acbc4b40739020b0a2b6077a9a2f83ea816256ef3a0988a0fde258039ab0d048563822de0ddffa80852ad2e619788f64ef427443213a393b5f4bf430c1babac
-
SSDEEP
98304:k7/r5u7Re4y4OOwwt2wLMnO19y0p17IW77+8k2x5TY:k7/r5gtyHOzckkOBI+75E
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral1/memory/4956-122-0x0000000002F60000-0x000000000384B000-memory.dmp family_glupteba behavioral1/memory/4956-153-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4956-416-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4956-417-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/168-650-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/168-909-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/168-1151-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1556-1407-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1556-1740-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1556-1890-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1556-1899-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1556-1901-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1556-1903-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1556-1905-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1556-1907-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1556-1909-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1556-1911-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5028 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 1556 csrss.exe 3040 injector.exe 4824 windefender.exe 3332 windefender.exe -
resource yara_rule behavioral1/files/0x000800000001af1f-1893.dat upx behavioral1/files/0x000800000001af1f-1894.dat upx behavioral1/memory/4824-1895-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x000800000001af1f-1896.dat upx behavioral1/memory/4824-1897-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3332-1898-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3332-1906-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3332-1910-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe = "0" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe File created C:\Windows\rss\csrss.exe fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2716 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1360 schtasks.exe 4532 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2632 = "Norfolk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2456 powershell.exe 2456 powershell.exe 2456 powershell.exe 4956 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 4956 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 1548 powershell.exe 1548 powershell.exe 1548 powershell.exe 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 4076 powershell.exe 4076 powershell.exe 4076 powershell.exe 3020 powershell.exe 3020 powershell.exe 3020 powershell.exe 1916 powershell.exe 1916 powershell.exe 1916 powershell.exe 4956 powershell.exe 4956 powershell.exe 4956 powershell.exe 3896 powershell.exe 3896 powershell.exe 3896 powershell.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 1556 csrss.exe 1556 csrss.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 1556 csrss.exe 1556 csrss.exe 3040 injector.exe 3040 injector.exe 1556 csrss.exe 1556 csrss.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe 3040 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 4956 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Token: SeImpersonatePrivilege 4956 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 4076 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 1916 powershell.exe Token: SeDebugPrivilege 4956 powershell.exe Token: SeDebugPrivilege 3896 powershell.exe Token: SeSystemEnvironmentPrivilege 1556 csrss.exe Token: SeSecurityPrivilege 2716 sc.exe Token: SeSecurityPrivilege 2716 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4956 wrote to memory of 2456 4956 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 67 PID 4956 wrote to memory of 2456 4956 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 67 PID 4956 wrote to memory of 2456 4956 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 67 PID 168 wrote to memory of 1548 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 72 PID 168 wrote to memory of 1548 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 72 PID 168 wrote to memory of 1548 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 72 PID 168 wrote to memory of 5008 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 74 PID 168 wrote to memory of 5008 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 74 PID 5008 wrote to memory of 5028 5008 cmd.exe 76 PID 5008 wrote to memory of 5028 5008 cmd.exe 76 PID 168 wrote to memory of 4076 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 77 PID 168 wrote to memory of 4076 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 77 PID 168 wrote to memory of 4076 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 77 PID 168 wrote to memory of 3020 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 79 PID 168 wrote to memory of 3020 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 79 PID 168 wrote to memory of 3020 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 79 PID 168 wrote to memory of 1556 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 81 PID 168 wrote to memory of 1556 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 81 PID 168 wrote to memory of 1556 168 fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe 81 PID 1556 wrote to memory of 1916 1556 csrss.exe 82 PID 1556 wrote to memory of 1916 1556 csrss.exe 82 PID 1556 wrote to memory of 1916 1556 csrss.exe 82 PID 1556 wrote to memory of 4956 1556 csrss.exe 89 PID 1556 wrote to memory of 4956 1556 csrss.exe 89 PID 1556 wrote to memory of 4956 1556 csrss.exe 89 PID 1556 wrote to memory of 3896 1556 csrss.exe 91 PID 1556 wrote to memory of 3896 1556 csrss.exe 91 PID 1556 wrote to memory of 3896 1556 csrss.exe 91 PID 1556 wrote to memory of 3040 1556 csrss.exe 93 PID 1556 wrote to memory of 3040 1556 csrss.exe 93 PID 4824 wrote to memory of 5060 4824 windefender.exe 100 PID 4824 wrote to memory of 5060 4824 windefender.exe 100 PID 4824 wrote to memory of 5060 4824 windefender.exe 100 PID 5060 wrote to memory of 2716 5060 cmd.exe 101 PID 5060 wrote to memory of 2716 5060 cmd.exe 101 PID 5060 wrote to memory of 2716 5060 cmd.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe"C:\Users\Admin\AppData\Local\Temp\fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe"C:\Users\Admin\AppData\Local\Temp\fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:5028
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1360
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4532
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5eeba7a14c604c8ee40dcb6a68bf6ba25
SHA1304ce4274c992f2a07514d899a25e3b2320c6714
SHA256e43e7f6e935616fe5197593e0c220c889399e2a60ce0a24cd0f3a90a64940a90
SHA512f738924b5d961f5e00527d38d88dc9d251f32934dfaa85ff987341cff3c6d5bed05464d8b88e9010a10a928ccb54b244d16e49625f352f709905d8bf94f7691a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5952387f839d7a4f417bf0fc413b3bceb
SHA1c9b3215ca5467cf4bab319720897acf670ede90e
SHA256fa81f7dff6f099cd7092dd3ec32c48cc0a40f4b2d330a40dfbbef34afcc6c8c2
SHA512c98622e4028aaa9f6dfa113fae289df787ff823d7645163b4818e634f24228bf4c1f2507123c504c75bd2caf0676d03577b90b394ffd023191c06f322684ddf6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5ab8306b558ca9fdf0f135ca5302df5cc
SHA1818483e9a169178002d0a4a1b6ce3a04f1a1ccb5
SHA2566b5b70f0ae91f730bd76f8873dd115bb85e8ae896fade51aa96aa6172538c57c
SHA512ae7ad70932f039c1757b843656bf1019ef93d7c316ecbe25542a6c2ec0ffbaa6ebbd4583f1eb4602b9d006f74486c3c2cb47ed5f8dc912e1def246adfcf37fb9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD54460bc2328e25c6e92dafc19f2b88924
SHA14c543b4cd39c309f306943df44895931cc80b798
SHA256c38f03ddf640bbfbb9ca9ef9ccff55f324cdda9744ae92ad517c571c76c3b423
SHA512fcc4b61c3d5a412a517c9ce40496d00b909fc5b6e2855b4f19feeb9ae812127f5cdee607e38e476d44badf5f09fd3b6a6b19a17f871ad43b459255411d9a04c4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD52317dab1dc7c8051102e5eda627f8427
SHA197acf13336a358630f87e6fbad08a9d9fa9b7f46
SHA256f834287fa659fbb0aa2702853908d2fb727e6722641c36466abeb9b7c9aab2d5
SHA5128b31af524c6815afd75ad806a58a6d078b7a8946dab4abaefd9104ea08ee89b908ce9061d556b65a87ab0ed2bcfded890cf2fcfd8c88d35c9a2728c1dc23d4ac
-
Filesize
4.2MB
MD51b30d4919c98b4d049f9740601220905
SHA1eecc22b5a1fd9d20e29c32ca3ff25794c19ac112
SHA256fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9
SHA5120acbc4b40739020b0a2b6077a9a2f83ea816256ef3a0988a0fde258039ab0d048563822de0ddffa80852ad2e619788f64ef427443213a393b5f4bf430c1babac
-
Filesize
4.2MB
MD51b30d4919c98b4d049f9740601220905
SHA1eecc22b5a1fd9d20e29c32ca3ff25794c19ac112
SHA256fffdbba06a49691274b26eb372f7967982a28bb3a4c74768f16aa511bc4dd1e9
SHA5120acbc4b40739020b0a2b6077a9a2f83ea816256ef3a0988a0fde258039ab0d048563822de0ddffa80852ad2e619788f64ef427443213a393b5f4bf430c1babac
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec