Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04/06/2023, 12:03
Static task
static1
General
-
Target
188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe
-
Size
4.2MB
-
MD5
1358d071ff63fafef98c97ef08cf385d
-
SHA1
8e75803d20d6bac4592bbf0ceb84a197b72adf6d
-
SHA256
188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094
-
SHA512
8e9125601ba534a31f2b063b5c84e0b2fe39f20a648694b5a16c6f30bdffe2e6de7eb4894a71e41f773aa2c22af922d2df6a85e8dcef5161d3ee4fec28951865
-
SSDEEP
98304:Bm/ubn5D5feR/xVUAMDjrjaSY/7Aedly/Fl22:subnL60AMDjnYEAItl22
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral1/memory/3508-118-0x00000000051B0000-0x0000000005A9B000-memory.dmp family_glupteba behavioral1/memory/3508-264-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/3508-415-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/3508-416-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/1820-448-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/1820-693-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/1820-1000-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/1820-1151-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/4188-1307-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/4188-1551-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/4188-1809-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/4188-1892-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/4188-1901-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/4188-1903-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/4188-1905-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/4188-1907-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba behavioral1/memory/4188-1909-0x0000000000400000-0x00000000030CF000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5012 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 4188 csrss.exe 1536 injector.exe 3060 windefender.exe 4540 windefender.exe -
resource yara_rule behavioral1/files/0x000700000001aea9-1895.dat upx behavioral1/files/0x000700000001aea9-1896.dat upx behavioral1/memory/3060-1897-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x000700000001aea9-1898.dat upx behavioral1/memory/3060-1899-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4540-1900-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4540-1908-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe File created C:\Windows\rss\csrss.exe 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2220 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2940 schtasks.exe 4984 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4396 powershell.exe 4396 powershell.exe 4396 powershell.exe 3508 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 3508 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 3604 powershell.exe 3604 powershell.exe 3604 powershell.exe 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 4940 powershell.exe 4940 powershell.exe 4940 powershell.exe 4668 powershell.exe 4668 powershell.exe 4668 powershell.exe 4464 powershell.exe 4464 powershell.exe 4464 powershell.exe 4144 powershell.exe 4144 powershell.exe 4144 powershell.exe 1668 powershell.exe 1668 powershell.exe 1668 powershell.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 4188 csrss.exe 4188 csrss.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 4188 csrss.exe 4188 csrss.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 4188 csrss.exe 4188 csrss.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe 1536 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4396 powershell.exe Token: SeDebugPrivilege 3508 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Token: SeImpersonatePrivilege 3508 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe Token: SeDebugPrivilege 3604 powershell.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeDebugPrivilege 4668 powershell.exe Token: SeDebugPrivilege 4464 powershell.exe Token: SeDebugPrivilege 4144 powershell.exe Token: SeDebugPrivilege 1668 powershell.exe Token: SeSystemEnvironmentPrivilege 4188 csrss.exe Token: SeSecurityPrivilege 2220 sc.exe Token: SeSecurityPrivilege 2220 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3508 wrote to memory of 4396 3508 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 67 PID 3508 wrote to memory of 4396 3508 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 67 PID 3508 wrote to memory of 4396 3508 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 67 PID 1820 wrote to memory of 3604 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 72 PID 1820 wrote to memory of 3604 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 72 PID 1820 wrote to memory of 3604 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 72 PID 1820 wrote to memory of 5060 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 74 PID 1820 wrote to memory of 5060 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 74 PID 5060 wrote to memory of 5012 5060 cmd.exe 76 PID 5060 wrote to memory of 5012 5060 cmd.exe 76 PID 1820 wrote to memory of 4940 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 77 PID 1820 wrote to memory of 4940 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 77 PID 1820 wrote to memory of 4940 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 77 PID 1820 wrote to memory of 4668 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 79 PID 1820 wrote to memory of 4668 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 79 PID 1820 wrote to memory of 4668 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 79 PID 1820 wrote to memory of 4188 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 81 PID 1820 wrote to memory of 4188 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 81 PID 1820 wrote to memory of 4188 1820 188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe 81 PID 4188 wrote to memory of 4464 4188 csrss.exe 82 PID 4188 wrote to memory of 4464 4188 csrss.exe 82 PID 4188 wrote to memory of 4464 4188 csrss.exe 82 PID 4188 wrote to memory of 4144 4188 csrss.exe 89 PID 4188 wrote to memory of 4144 4188 csrss.exe 89 PID 4188 wrote to memory of 4144 4188 csrss.exe 89 PID 4188 wrote to memory of 1668 4188 csrss.exe 91 PID 4188 wrote to memory of 1668 4188 csrss.exe 91 PID 4188 wrote to memory of 1668 4188 csrss.exe 91 PID 4188 wrote to memory of 1536 4188 csrss.exe 93 PID 4188 wrote to memory of 1536 4188 csrss.exe 93 PID 3060 wrote to memory of 4040 3060 windefender.exe 100 PID 3060 wrote to memory of 4040 3060 windefender.exe 100 PID 3060 wrote to memory of 4040 3060 windefender.exe 100 PID 4040 wrote to memory of 2220 4040 cmd.exe 101 PID 4040 wrote to memory of 2220 4040 cmd.exe 101 PID 4040 wrote to memory of 2220 4040 cmd.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe"C:\Users\Admin\AppData\Local\Temp\188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe"C:\Users\Admin\AppData\Local\Temp\188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:5012
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4984
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2940
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD568fee639e53050044f68d22d4d40d027
SHA19a5631a72e37c15ba2beb0fd97dedb7751c147f8
SHA256afbbf0a17dc3998d1c5905dd9314a71c5523e4001a24409baad7561ac203e3e1
SHA512a36c52cc7b1457d959079b0456dfdca333d5b849580c47929bcea466eefa177310da502f17f215fe1e98594fdb95953272c13918c6c839756a9a8ee80d31a8fa
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5c46f987f9620c936b982f1f31cc6ff01
SHA11aed9becc5e3f1d23b25b635fbf3fbcae7601433
SHA256296844d92d64e25d55f7610a54cc3867751df90c5ed881adcba6eb2e90f21fee
SHA512e10d16d5c8fff1199dd6f1b817f6f4c544dc43e2dd8a7950b14e23450f99bedf2a700ecb059f614686ed97e49f39f0f8bf810e96d06cf22d283b83678126da69
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD578188a4841df2f0503e0f313c8fe594b
SHA123fde410205d170699cb7aa53f173fb833a0e6c3
SHA2563dc531c96047d121a5165d9b432b714c9af8b46ae364367658f2013cd4f38712
SHA512cbd30a53487a978fe3a1feee95aee98624e11a65ec7bff106a448f491c3cc0471cc57d8fbdf0fb03de18d0d4e54837b3dfc1085b76ebddf61510560f74474115
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5ed6b7402e3731806534967896fd3a4b0
SHA18b691bb9a588fd653b8134e16f7cb099f14b7bf7
SHA256200c37704dde42751609e84cda72906ff37fd0b22cd794862f01ef03474bfef6
SHA5122c29a11f2152f6c3cf76298408faa09172667fee7263352e3eb93d4d0feb0eb6f2b381db97c0560eb26c0db17453b7b184370d47a6e28c0f1bd1bd0619565c90
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5582a93a359205eb0a75b777f9a9dedad
SHA1c94e5523a595c1860bea8a2a2418298658931ddc
SHA256444d8c31bfcfc31e08536fbfa6a0334f81167ca6e0f0b2a66e6e78a50ca1c37e
SHA51294a1e1223f9512c11f7d193b2f5f2db1ff7c3fa81d523d506ec30e6543a86d6d574c3ffb615f1f6c70bde9e7f323913fc94f0ed6ca0ca45e3a851a70a925a1d0
-
Filesize
4.2MB
MD51358d071ff63fafef98c97ef08cf385d
SHA18e75803d20d6bac4592bbf0ceb84a197b72adf6d
SHA256188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094
SHA5128e9125601ba534a31f2b063b5c84e0b2fe39f20a648694b5a16c6f30bdffe2e6de7eb4894a71e41f773aa2c22af922d2df6a85e8dcef5161d3ee4fec28951865
-
Filesize
4.2MB
MD51358d071ff63fafef98c97ef08cf385d
SHA18e75803d20d6bac4592bbf0ceb84a197b72adf6d
SHA256188aca2fd13fad567c7e0715c4421a73e44397595a8890ad83dbad35de882094
SHA5128e9125601ba534a31f2b063b5c84e0b2fe39f20a648694b5a16c6f30bdffe2e6de7eb4894a71e41f773aa2c22af922d2df6a85e8dcef5161d3ee4fec28951865
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec