Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 17:45
Static task
static1
General
-
Target
24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe
-
Size
4.2MB
-
MD5
ce8f031c55a75f11f6c30a9eb0f7d7e1
-
SHA1
16a531dc3aa5a03ee50d672266845cb6aff63163
-
SHA256
24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35
-
SHA512
1577dc9b89fbfc929e2f34a890c2b3d0365f6af0849a8e257c59fa2cb720479f670c948c063d2730de3122c60958699491684ed69005918ef7d6d46c9939ac7d
-
SSDEEP
98304:KUkIuJia5m+at9Z+M88kWM8eIupC5WIkBFnybpad:cI3TZ+3J8ec5WNFngad
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral1/memory/1664-134-0x0000000002EA0000-0x000000000378B000-memory.dmp family_glupteba behavioral1/memory/1664-154-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/1664-204-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/216-231-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/216-279-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-320-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-355-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-358-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-361-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-364-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-367-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-370-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-373-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-376-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-379-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2304-382-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1888 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2304 csrss.exe 4072 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe File opened for modification C:\Windows\rss 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5028 schtasks.exe 848 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3732 powershell.exe 3732 powershell.exe 1664 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 1664 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 3996 powershell.exe 3996 powershell.exe 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 2696 powershell.exe 2696 powershell.exe 2376 powershell.exe 2376 powershell.exe 4924 powershell.exe 4924 powershell.exe 4548 powershell.exe 4548 powershell.exe 5064 powershell.exe 5064 powershell.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 2304 csrss.exe 2304 csrss.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 2304 csrss.exe 2304 csrss.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe 4072 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3732 powershell.exe Token: SeDebugPrivilege 1664 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Token: SeImpersonatePrivilege 1664 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 2376 powershell.exe Token: SeDebugPrivilege 4924 powershell.exe Token: SeDebugPrivilege 4548 powershell.exe Token: SeDebugPrivilege 5064 powershell.exe Token: SeSystemEnvironmentPrivilege 2304 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3732 1664 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 84 PID 1664 wrote to memory of 3732 1664 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 84 PID 1664 wrote to memory of 3732 1664 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 84 PID 216 wrote to memory of 3996 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 90 PID 216 wrote to memory of 3996 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 90 PID 216 wrote to memory of 3996 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 90 PID 216 wrote to memory of 3880 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 92 PID 216 wrote to memory of 3880 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 92 PID 3880 wrote to memory of 1888 3880 cmd.exe 94 PID 3880 wrote to memory of 1888 3880 cmd.exe 94 PID 216 wrote to memory of 2696 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 95 PID 216 wrote to memory of 2696 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 95 PID 216 wrote to memory of 2696 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 95 PID 216 wrote to memory of 2376 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 97 PID 216 wrote to memory of 2376 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 97 PID 216 wrote to memory of 2376 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 97 PID 216 wrote to memory of 2304 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 99 PID 216 wrote to memory of 2304 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 99 PID 216 wrote to memory of 2304 216 24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe 99 PID 2304 wrote to memory of 4924 2304 csrss.exe 100 PID 2304 wrote to memory of 4924 2304 csrss.exe 100 PID 2304 wrote to memory of 4924 2304 csrss.exe 100 PID 2304 wrote to memory of 4548 2304 csrss.exe 106 PID 2304 wrote to memory of 4548 2304 csrss.exe 106 PID 2304 wrote to memory of 4548 2304 csrss.exe 106 PID 2304 wrote to memory of 5064 2304 csrss.exe 108 PID 2304 wrote to memory of 5064 2304 csrss.exe 108 PID 2304 wrote to memory of 5064 2304 csrss.exe 108 PID 2304 wrote to memory of 4072 2304 csrss.exe 110 PID 2304 wrote to memory of 4072 2304 csrss.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe"C:\Users\Admin\AppData\Local\Temp\24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe"C:\Users\Admin\AppData\Local\Temp\24fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1888
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:5028
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:848
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53266efcb806389e4f82c41d375532814
SHA139186fd1d3c6d1c778d0cf816bd585d43e1e4d45
SHA2560506cd2bfae2a5ea29bf55e4e1c28de025c4bec5673312b076ffc75fa1c9c6c5
SHA512dc46360de490f911270960435d675094bd04a2097fc5203b750721b887f3d8f38d45b6a6e5bdf1982e55982553e61dba8b5acf7b41eecacd23876f95fa394422
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e664c62724bbd90c3d9f19e1611267d7
SHA1e69c3b97a7791dc5700ad31de5cd3c7ef961282b
SHA25674129b373a0d698196dcee110c0480acf5018b40500df3fa32115f7dd6f82fe8
SHA5121864d453c6b5f4afaebf35b8bee24beb2ea87bc8138e2d06d3c81703a48a346deb008bb885946087af4309fcf4af016864a7ed4e431afdf54410b28b09b4c3fd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52e87e91c0e54ac4f83836180b2fc749a
SHA10e8d8afc2b0dad4201eb3ca0963f7d04f30d2988
SHA25610210d9ad324cb583d5d6c461854c4432276e9358b4d6fa3fb97cbb0e12b9d5c
SHA5121ca6149fb89a053e48e387a8fd59a851a6542ca22a56282482aa2159d20b7c0b50ade93d5a0a860b1afc295603ace74a4ad5a73d2245444e9b1b6868fcee7309
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56d4cb8bd3696b0df2627e862ca67a19c
SHA129d5c7917f85d362652206378790a1075188bfa0
SHA256f65a96b7fa98884661eaca92dc2ea9417913d4a7819b154dbccc70a8d0895099
SHA51220c9961b6b4abd73e2a95154cc00a7d92676be2c50ad88c932819bbb2804b548ff5375a978023eff010007ffc639429ed2b388d78a2a369715e6a80fdeb8dcb7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e99f443b2469e86aa16100608e4bda2a
SHA1b8f6791a72f742d7cddb2f10586de313c623e5a6
SHA2569fb7f8016fe9cd1c174f6313fb2555f06c073e773317686b13566ec6a2a31965
SHA51244f93fd86723a2ac42615faf95c78fa7f87697eb2138d6946dca386034854475fa8dd0ea75acf191174cfe9a2d4e904e5dd5c39578623e24686ff9446cfc0722
-
Filesize
4.2MB
MD5ce8f031c55a75f11f6c30a9eb0f7d7e1
SHA116a531dc3aa5a03ee50d672266845cb6aff63163
SHA25624fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35
SHA5121577dc9b89fbfc929e2f34a890c2b3d0365f6af0849a8e257c59fa2cb720479f670c948c063d2730de3122c60958699491684ed69005918ef7d6d46c9939ac7d
-
Filesize
4.2MB
MD5ce8f031c55a75f11f6c30a9eb0f7d7e1
SHA116a531dc3aa5a03ee50d672266845cb6aff63163
SHA25624fb6170d2145271af60ce5caf2a04125b20dcd9cd044eb335dfe87a070ffb35
SHA5121577dc9b89fbfc929e2f34a890c2b3d0365f6af0849a8e257c59fa2cb720479f670c948c063d2730de3122c60958699491684ed69005918ef7d6d46c9939ac7d