Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-06-2023 03:45
Static task
static1
General
-
Target
0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe
-
Size
4.1MB
-
MD5
e6d46d0960fd2a89fc0c8eb59176d971
-
SHA1
4721c7f1972e417b736663079c2b0d8ee7d41d5c
-
SHA256
0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e
-
SHA512
1fbdc43b4799b2573915f1be8e6a117570bc0a82966a84bbba1c2b2731d21b5bc4dbcf97e823aac41dd3b6b5873592f971acd2d62e879900238fa064ad35ccb6
-
SSDEEP
98304:o5R0k0WqNScEqtCInM3ia95mxNIZSc834zpVspDZ:TzScEq5da94Mgr0nkF
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral1/memory/4212-120-0x0000000004BE0000-0x00000000054CB000-memory.dmp family_glupteba behavioral1/memory/4212-269-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/4212-417-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/216-663-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/216-910-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/216-1151-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/220-1419-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/220-1740-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/220-1890-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/220-1898-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/220-1900-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/220-1902-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/220-1904-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/220-1906-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/220-1908-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba behavioral1/memory/220-1910-0x0000000000400000-0x000000000294E000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1140 netsh.exe -
Executes dropped EXE 5 IoCs
pid Process 220 csrss.exe 4288 injector.exe 4444 windefender.exe 3832 windefender.exe 656 f801950a962ddba14caaa44bf084b55c.exe -
resource yara_rule behavioral1/files/0x000700000001aec1-1893.dat upx behavioral1/files/0x000700000001aec1-1894.dat upx behavioral1/files/0x000700000001aec1-1895.dat upx behavioral1/memory/4444-1896-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3832-1897-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3832-1903-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3832-1905-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x000700000001aec2-1914.dat upx behavioral1/files/0x000700000001aec2-1915.dat upx behavioral1/memory/656-1916-0x0000000000400000-0x0000000000C25000-memory.dmp upx behavioral1/memory/3832-1917-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe File created C:\Windows\rss\csrss.exe 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1208 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3544 schtasks.exe 5028 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1912 = "Russia TZ 10 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2076 powershell.exe 2076 powershell.exe 2076 powershell.exe 4212 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 4212 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 320 powershell.exe 320 powershell.exe 320 powershell.exe 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 800 powershell.exe 800 powershell.exe 800 powershell.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 1664 powershell.exe 1664 powershell.exe 1664 powershell.exe 368 powershell.exe 368 powershell.exe 368 powershell.exe 2720 powershell.exe 2720 powershell.exe 2720 powershell.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 220 csrss.exe 220 csrss.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 220 csrss.exe 220 csrss.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 220 csrss.exe 220 csrss.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe 4288 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2076 powershell.exe Token: SeDebugPrivilege 4212 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Token: SeImpersonatePrivilege 4212 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe Token: SeDebugPrivilege 320 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 1664 powershell.exe Token: SeDebugPrivilege 368 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeSystemEnvironmentPrivilege 220 csrss.exe Token: SeSecurityPrivilege 1208 sc.exe Token: SeSecurityPrivilege 1208 sc.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4212 wrote to memory of 2076 4212 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 67 PID 4212 wrote to memory of 2076 4212 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 67 PID 4212 wrote to memory of 2076 4212 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 67 PID 216 wrote to memory of 320 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 72 PID 216 wrote to memory of 320 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 72 PID 216 wrote to memory of 320 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 72 PID 216 wrote to memory of 4132 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 74 PID 216 wrote to memory of 4132 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 74 PID 4132 wrote to memory of 1140 4132 cmd.exe 76 PID 4132 wrote to memory of 1140 4132 cmd.exe 76 PID 216 wrote to memory of 800 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 77 PID 216 wrote to memory of 800 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 77 PID 216 wrote to memory of 800 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 77 PID 216 wrote to memory of 4952 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 79 PID 216 wrote to memory of 4952 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 79 PID 216 wrote to memory of 4952 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 79 PID 216 wrote to memory of 220 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 81 PID 216 wrote to memory of 220 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 81 PID 216 wrote to memory of 220 216 0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe 81 PID 220 wrote to memory of 1664 220 csrss.exe 82 PID 220 wrote to memory of 1664 220 csrss.exe 82 PID 220 wrote to memory of 1664 220 csrss.exe 82 PID 220 wrote to memory of 368 220 csrss.exe 89 PID 220 wrote to memory of 368 220 csrss.exe 89 PID 220 wrote to memory of 368 220 csrss.exe 89 PID 220 wrote to memory of 2720 220 csrss.exe 91 PID 220 wrote to memory of 2720 220 csrss.exe 91 PID 220 wrote to memory of 2720 220 csrss.exe 91 PID 220 wrote to memory of 4288 220 csrss.exe 93 PID 220 wrote to memory of 4288 220 csrss.exe 93 PID 4444 wrote to memory of 1360 4444 windefender.exe 100 PID 4444 wrote to memory of 1360 4444 windefender.exe 100 PID 4444 wrote to memory of 1360 4444 windefender.exe 100 PID 1360 wrote to memory of 1208 1360 cmd.exe 101 PID 1360 wrote to memory of 1208 1360 cmd.exe 101 PID 1360 wrote to memory of 1208 1360 cmd.exe 101 PID 220 wrote to memory of 656 220 csrss.exe 103 PID 220 wrote to memory of 656 220 csrss.exe 103 PID 220 wrote to memory of 656 220 csrss.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe"C:\Users\Admin\AppData\Local\Temp\0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe"C:\Users\Admin\AppData\Local\Temp\0152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:1140
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:5028
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3544
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe4⤵
- Executes dropped EXE
PID:656
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5cc86e017e20d657b4dfff625f618ab93
SHA13c47415c106590abfc40003177520a3460dc83e1
SHA256802493ee0aeb2ca2042f21dec425685f43af96fc573a4ea3209ee43bb5799ac3
SHA5123669570c72bbaed245fbaf94feb08b5ffb872a27c14380a223154ba367558c98d5ef52f795239ce280bf1795e99fd9ad174c7bec9a27254a12ea6402df171a52
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5219fccdddf33595d4650f61d432bd912
SHA14eeb35ce51a7c618fc8c25be33424cb54badccf8
SHA256f04c54ae3a3e986d951252c2e5075c005eaf7dc69e0a91a1f6b967296008c91b
SHA51276440635becdc40b1c049e083c5e7999b2780e098dfcc3d348b7ae3d7ca0adf85e341769551e403691638c89a1c82025026e9ae21265cfc86a376f31825e25cf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5142dc55449ee1784547aba8e1ead1ab4
SHA1cdec0470e1a56499417220ebfe14b671d2be7bc6
SHA25688f80b29ea8130e7e7f6cd9d9609c4a2e8ac55b84aa093a5ded8a4644fee72ab
SHA512d48b78bfafc333100fb658a5d211395ff8618b459beae377fc4bd3a1314ab851135fe2a31518b453a636948143d6a7d70c00bb11851955240975f31c11989beb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD55678b072e7cbe5f13d65b4633d4ed85f
SHA17075022ddd83dd67204bc7b4935d7a5de9e22017
SHA256f8f73c280656fe7053d35e67d1d6313205c208729451598711bf20b2d1569478
SHA512e8339b8fef9637252f2ce1f4690b8d6744c1c9cf287b090b7f4fae8c586acf925d64c09ce20fa463819a4450b10c7bd579effa77868caa5fc8af6fb6b9d67ea0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD57b19b365f0c9128063a379918d96bda0
SHA1ee4de81cd078a7e4249f6d92a5a6526e38ccdab9
SHA2564fa23dad4e257ac986ae1718e6ccd0048025facbd2905adb10860d7346ff4979
SHA5121dc46f32c07b5e0964f895952f2f43a10942fa6bcfa46b6a17203da685b8f57e11282687494f39bcf84035bf5885ae15093566a8ba6bcd99ac72c9a5da0e1a98
-
Filesize
4.1MB
MD5e6d46d0960fd2a89fc0c8eb59176d971
SHA14721c7f1972e417b736663079c2b0d8ee7d41d5c
SHA2560152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e
SHA5121fbdc43b4799b2573915f1be8e6a117570bc0a82966a84bbba1c2b2731d21b5bc4dbcf97e823aac41dd3b6b5873592f971acd2d62e879900238fa064ad35ccb6
-
Filesize
4.1MB
MD5e6d46d0960fd2a89fc0c8eb59176d971
SHA14721c7f1972e417b736663079c2b0d8ee7d41d5c
SHA2560152c3bd2a95d65a40ac23491042a8a9e8f59b9958f23c107ffbec51f2f5e13e
SHA5121fbdc43b4799b2573915f1be8e6a117570bc0a82966a84bbba1c2b2731d21b5bc4dbcf97e823aac41dd3b6b5873592f971acd2d62e879900238fa064ad35ccb6
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec