Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2023, 07:40
Static task
static1
General
-
Target
22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe
-
Size
4.2MB
-
MD5
44b7636d61531c114417405f90268a45
-
SHA1
8d3c2ff47c4e8ab61da308cfe5bd3867949a9879
-
SHA256
22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b
-
SHA512
f2cca4082a013a26ccf344dba35e29015d19c4c76898a0bd898d1fab86dbc78f324ac7895a6a1a047cdd9a4ea5b0905c9df1a2a47a218a1cd950475af47f4695
-
SSDEEP
98304:wmpX8O9HedpDBHdWTegeTnadviKpY0fMqD+731uK:TFHGpNjTadv4cIwK
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral1/memory/5064-134-0x0000000002FD0000-0x00000000038BB000-memory.dmp family_glupteba behavioral1/memory/5064-171-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/5064-206-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4908-231-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4908-264-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-318-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-351-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-353-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-355-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-357-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-359-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-361-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-363-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-365-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-367-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-369-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/2996-371-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3832 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2996 csrss.exe 3304 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe File opened for modification C:\Windows\rss 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 876 schtasks.exe 2580 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1392 powershell.exe 1392 powershell.exe 5064 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 5064 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 2700 powershell.exe 2700 powershell.exe 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 3524 powershell.exe 3524 powershell.exe 1604 powershell.exe 1604 powershell.exe 1476 powershell.exe 1476 powershell.exe 4048 powershell.exe 4048 powershell.exe 4532 powershell.exe 4532 powershell.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 2996 csrss.exe 2996 csrss.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 2996 csrss.exe 2996 csrss.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe 3304 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1392 powershell.exe Token: SeDebugPrivilege 5064 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Token: SeImpersonatePrivilege 5064 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 3524 powershell.exe Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 1476 powershell.exe Token: SeDebugPrivilege 4048 powershell.exe Token: SeDebugPrivilege 4532 powershell.exe Token: SeSystemEnvironmentPrivilege 2996 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1392 5064 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 84 PID 5064 wrote to memory of 1392 5064 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 84 PID 5064 wrote to memory of 1392 5064 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 84 PID 4908 wrote to memory of 2700 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 92 PID 4908 wrote to memory of 2700 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 92 PID 4908 wrote to memory of 2700 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 92 PID 4908 wrote to memory of 2292 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 96 PID 4908 wrote to memory of 2292 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 96 PID 2292 wrote to memory of 3832 2292 cmd.exe 98 PID 2292 wrote to memory of 3832 2292 cmd.exe 98 PID 4908 wrote to memory of 3524 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 99 PID 4908 wrote to memory of 3524 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 99 PID 4908 wrote to memory of 3524 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 99 PID 4908 wrote to memory of 1604 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 101 PID 4908 wrote to memory of 1604 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 101 PID 4908 wrote to memory of 1604 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 101 PID 4908 wrote to memory of 2996 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 103 PID 4908 wrote to memory of 2996 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 103 PID 4908 wrote to memory of 2996 4908 22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe 103 PID 2996 wrote to memory of 1476 2996 csrss.exe 105 PID 2996 wrote to memory of 1476 2996 csrss.exe 105 PID 2996 wrote to memory of 1476 2996 csrss.exe 105 PID 2996 wrote to memory of 4048 2996 csrss.exe 110 PID 2996 wrote to memory of 4048 2996 csrss.exe 110 PID 2996 wrote to memory of 4048 2996 csrss.exe 110 PID 2996 wrote to memory of 4532 2996 csrss.exe 113 PID 2996 wrote to memory of 4532 2996 csrss.exe 113 PID 2996 wrote to memory of 4532 2996 csrss.exe 113 PID 2996 wrote to memory of 3304 2996 csrss.exe 115 PID 2996 wrote to memory of 3304 2996 csrss.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe"C:\Users\Admin\AppData\Local\Temp\22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe"C:\Users\Admin\AppData\Local\Temp\22212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3832
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:876
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4592
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2580
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5aeb868425402f8e710bf3dba4414772f
SHA1a8a75c5eb6c52d3f03860985caee525758e6e1ac
SHA256fafc0021ecdceab3130dad84757c5f0d1548f708eb16c742a697484dbf078256
SHA512773c64ef0dbb9317b251cfc81f6b109c879e33cedd16572ccad951783220d2951e168291bf4d4509bab68f2f4f16384f079a576fe4da8af9c157dcdb57f57e45
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f759f49f95d6fa14f8d447fbf3c63630
SHA1979c104048e1f493db627782860f772076db898f
SHA256b828da52bbbd14c03bdda34256bb3de798f65c21d8d631e88fdfb97bc01d9d71
SHA512c1be0a8a6e23c5a69133d5e0a5f091bb9c6d1268a3494f719b2ba5c6d902cddadcd174042025121f78c26ec92798eb647fe9de3f0a5864c04b955315c0db74db
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54de76c60a4698554d69320eba49d0c42
SHA1c3b685fa2233733fcf799ae887115fa02aa69e72
SHA2566a5fedb02999e0715cf8d976a3dd19d1f7bc1e9fdaba2288bb0b9232e291eee5
SHA512bb764f3f09338d891575f993dd4224031f03e8eb5448bf8f533de058fdeaa5ac45b1a0a28f50ce6206e9ee5c4265d7b62bbb37e0c839244b714601c4e5d52d27
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5694c25bab584b37b014e497b0a5ecc15
SHA114ce50d4ac56e8351b2d4160534c555fb28b0fb8
SHA25603ca897ce774889eef4105d8792043df7b352c13d327deabf2a6170fc50624b3
SHA51218be1c1d802a286e52af30723cce498020aa45665ce8c51402779ece0d6672a51d540da1a85949b9dd21f6709fd813be50ed82c7c932cbaec40fda91c3ad2c8c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59b6460c803cb3b0584c78c913c70ac37
SHA1a9976ce32267ee1b51b4dd0d6d0e3c6157a71f7c
SHA25681761e95aa64d9b583e82b66076fb4e312279ffa5f8eccb6ff5b88444e67d52c
SHA512a921d58d9c15e64e48f34de4c9ec6f39e6126f36319fc920eae657483eff52b50730ab09ebed92cf3264f222a18e47925fc25efed5f23e44f8de63762d9295fb
-
Filesize
4.2MB
MD544b7636d61531c114417405f90268a45
SHA18d3c2ff47c4e8ab61da308cfe5bd3867949a9879
SHA25622212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b
SHA512f2cca4082a013a26ccf344dba35e29015d19c4c76898a0bd898d1fab86dbc78f324ac7895a6a1a047cdd9a4ea5b0905c9df1a2a47a218a1cd950475af47f4695
-
Filesize
4.2MB
MD544b7636d61531c114417405f90268a45
SHA18d3c2ff47c4e8ab61da308cfe5bd3867949a9879
SHA25622212563c82d627560b8a141299031992fde210f22c6be2471d3497bf8cff13b
SHA512f2cca4082a013a26ccf344dba35e29015d19c4c76898a0bd898d1fab86dbc78f324ac7895a6a1a047cdd9a4ea5b0905c9df1a2a47a218a1cd950475af47f4695