Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 19:59
Static task
static1
General
-
Target
4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe
-
Size
4.2MB
-
MD5
8d3fa12dfd742a2b3e2d7eb4eb75f3ea
-
SHA1
b3a0de78c55dd77dfdf9ee1db06461b8d0d8c2d4
-
SHA256
4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff
-
SHA512
4ba39d6454757ea46f3f34a828f8c291a14aace031a69766979b7970e77e417dc0ca79898b8a34c9c8238bc08fb9f7d55a61af42778fdac6ee6f8cf19f168dae
-
SSDEEP
98304:+Uo9FY7WfUngDNq1VwUR/NPDfiCH7lCBzt8qQ:Dgy7Wf4ZXwUFNrqw4pt8b
Malware Config
Signatures
-
Glupteba payload 14 IoCs
Processes:
resource yara_rule behavioral1/memory/1156-134-0x0000000005320000-0x0000000005C0B000-memory.dmp family_glupteba behavioral1/memory/1156-171-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/1156-179-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/3084-217-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/3084-265-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/2508-302-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/2508-344-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/2508-355-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/2508-364-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/2508-366-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/2508-368-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/2508-370-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/2508-372-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba behavioral1/memory/2508-381-0x0000000000400000-0x00000000030D0000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Executes dropped EXE 6 IoCs
Processes:
csrss.exeinjector.exeinjector.exewindefender.exewindefender.exef801950a962ddba14caaa44bf084b55c.exepid process 2508 csrss.exe 1716 injector.exe 4456 injector.exe 324 windefender.exe 1832 windefender.exe 3060 f801950a962ddba14caaa44bf084b55c.exe -
Processes:
resource yara_rule C:\Windows\windefender.exe upx C:\Windows\windefender.exe upx behavioral1/memory/324-360-0x0000000000400000-0x00000000008DF000-memory.dmp upx C:\Windows\windefender.exe upx behavioral1/memory/1832-362-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/324-363-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1832-365-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1832-371-0x0000000000400000-0x00000000008DF000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe upx behavioral1/memory/3060-378-0x0000000000400000-0x0000000000C25000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe upx behavioral1/memory/1832-380-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3060-382-0x0000000000400000-0x0000000000C25000-memory.dmp upx behavioral1/memory/3060-384-0x0000000000400000-0x0000000000C25000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe -
Drops file in Windows directory 4 IoCs
Processes:
4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.execsrss.exedescription ioc process File opened for modification C:\Windows\rss 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe File created C:\Windows\rss\csrss.exe 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 624 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3892 3084 WerFault.exe 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 4480 2508 WerFault.exe csrss.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4924 schtasks.exe 4064 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exewindefender.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-562 = "SE Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-51 = "Greenland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exepowershell.exe4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.exeinjector.execsrss.exepid process 3236 powershell.exe 3236 powershell.exe 1156 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 1156 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 1616 powershell.exe 1616 powershell.exe 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe 2356 powershell.exe 2356 powershell.exe 1056 powershell.exe 1056 powershell.exe 228 powershell.exe 228 powershell.exe 4260 powershell.exe 4260 powershell.exe 3304 powershell.exe 3304 powershell.exe 1716 injector.exe 1716 injector.exe 4456 injector.exe 4456 injector.exe 1716 injector.exe 1716 injector.exe 4456 injector.exe 4456 injector.exe 1716 injector.exe 1716 injector.exe 4456 injector.exe 4456 injector.exe 2508 csrss.exe 2508 csrss.exe 1716 injector.exe 1716 injector.exe 4456 injector.exe 4456 injector.exe 1716 injector.exe 1716 injector.exe 4456 injector.exe 4456 injector.exe 1716 injector.exe 1716 injector.exe 4456 injector.exe 4456 injector.exe 2508 csrss.exe 2508 csrss.exe 1716 injector.exe 1716 injector.exe 4456 injector.exe 4456 injector.exe 2508 csrss.exe 2508 csrss.exe 1716 injector.exe 1716 injector.exe 4456 injector.exe 4456 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exe4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 3236 powershell.exe Token: SeDebugPrivilege 1156 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Token: SeImpersonatePrivilege 1156 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 1056 powershell.exe Token: SeDebugPrivilege 228 powershell.exe Token: SeDebugPrivilege 4260 powershell.exe Token: SeDebugPrivilege 3304 powershell.exe Token: SeSystemEnvironmentPrivilege 2508 csrss.exe Token: SeSecurityPrivilege 624 sc.exe Token: SeSecurityPrivilege 624 sc.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.execmd.execsrss.exewindefender.execmd.exedescription pid process target process PID 1156 wrote to memory of 3236 1156 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 1156 wrote to memory of 3236 1156 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 1156 wrote to memory of 3236 1156 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 3084 wrote to memory of 1616 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 3084 wrote to memory of 1616 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 3084 wrote to memory of 1616 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 3084 wrote to memory of 4868 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe cmd.exe PID 3084 wrote to memory of 4868 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe cmd.exe PID 4868 wrote to memory of 2212 4868 cmd.exe netsh.exe PID 4868 wrote to memory of 2212 4868 cmd.exe netsh.exe PID 3084 wrote to memory of 2356 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 3084 wrote to memory of 2356 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 3084 wrote to memory of 2356 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 3084 wrote to memory of 1056 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 3084 wrote to memory of 1056 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 3084 wrote to memory of 1056 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe powershell.exe PID 3084 wrote to memory of 2508 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe csrss.exe PID 3084 wrote to memory of 2508 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe csrss.exe PID 3084 wrote to memory of 2508 3084 4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe csrss.exe PID 2508 wrote to memory of 228 2508 csrss.exe powershell.exe PID 2508 wrote to memory of 228 2508 csrss.exe powershell.exe PID 2508 wrote to memory of 228 2508 csrss.exe powershell.exe PID 2508 wrote to memory of 4260 2508 csrss.exe powershell.exe PID 2508 wrote to memory of 4260 2508 csrss.exe powershell.exe PID 2508 wrote to memory of 4260 2508 csrss.exe powershell.exe PID 2508 wrote to memory of 3304 2508 csrss.exe powershell.exe PID 2508 wrote to memory of 3304 2508 csrss.exe powershell.exe PID 2508 wrote to memory of 3304 2508 csrss.exe powershell.exe PID 2508 wrote to memory of 1716 2508 csrss.exe injector.exe PID 2508 wrote to memory of 1716 2508 csrss.exe injector.exe PID 2508 wrote to memory of 4456 2508 csrss.exe injector.exe PID 2508 wrote to memory of 4456 2508 csrss.exe injector.exe PID 324 wrote to memory of 3908 324 windefender.exe cmd.exe PID 324 wrote to memory of 3908 324 windefender.exe cmd.exe PID 324 wrote to memory of 3908 324 windefender.exe cmd.exe PID 3908 wrote to memory of 624 3908 cmd.exe sc.exe PID 3908 wrote to memory of 624 3908 cmd.exe sc.exe PID 3908 wrote to memory of 624 3908 cmd.exe sc.exe PID 2508 wrote to memory of 3060 2508 csrss.exe f801950a962ddba14caaa44bf084b55c.exe PID 2508 wrote to memory of 3060 2508 csrss.exe f801950a962ddba14caaa44bf084b55c.exe PID 2508 wrote to memory of 3060 2508 csrss.exe f801950a962ddba14caaa44bf084b55c.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe"C:\Users\Admin\AppData\Local\Temp\4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe"C:\Users\Admin\AppData\Local\Temp\4505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2212
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4924
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4288
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4064
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe4⤵
- Executes dropped EXE
PID:3060 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f5⤵PID:4088
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f5⤵PID:312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 12364⤵
- Program crash
PID:4480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 6643⤵
- Program crash
PID:3892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3084 -ip 30841⤵PID:4864
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2508 -ip 25081⤵PID:3916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
99KB
MD509031a062610d77d685c9934318b4170
SHA1880f744184e7774f3d14c1bb857e21cc7fe89a6d
SHA256778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd
SHA5129a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5761598e0bab8e4942338b3e388b4fc1e
SHA1845a55c40fa89b7009d84c71e2f0f4f1b837c795
SHA25679f07795ab7aff40965ff4f56995f5cc46e7fd2d9136f1bf346e880050cb3502
SHA512f50daed7b75b25c02e7e91e284e56d5b00c8f08b1646ab0ccaed6785816374eeab41bfad3e52c0ef020146de9c1244a9c79d067a9c38333a1af98c220c5d824c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e024cb76e7dd94392b3f4ee1ed211b79
SHA128b75bb374b59e5651c654e0ff2101b07b9aef27
SHA256ea7e31adbc2183ba9fee5943781bd38a6c90aa943d99125551a84210763dc7fe
SHA512d3bc9e4fe5ab5d6101c4044a4dd917bdc52097b5ca2bb99c5458f148554be83a0e0283b479a2dd8d97b7a852cc7c0241c7456c13c4f2eebb7f0f06500d8f1b65
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51745fb31c21a721d735b141d3c957464
SHA100f19e1d27cef6cd8b7a34ab8c49bf3f04584d37
SHA2561f28d448b3e3ab282631b1b9ff934ae29ecb513d87f1426a69a168a54ca04402
SHA5123e5ce136311ae8b5ce8c5c83178029d7c13247608410c88feaa19376cff0b0048ac7128adc85aa97037720154e8bbd8b003d9779c7b2f27fcfc6b0dae115557c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b77ffeb016e6149590407f5e3dfa2b04
SHA125dcccf2bdf1dc53fa56eccca3bfa268356ddf3d
SHA2566c872c6c3529f04c3216d5b6303416151dcaaa6efe5ea0d5652cd48f8c79d234
SHA512b4beb24a63e6e4b6adfdb489e9f6aef6baea60adf82b3c190a3a49325424c55708d03bd003d83424bb7407ee278270e62ee7b68b02ffee056a04dfd07386708c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57efc7fc16ec73084f334277beccfedee
SHA1f74e6c2ea20609fa71466653cc71b1165b314d64
SHA2566fd6be242a38908a8a0ea5d0ea0bfce6014b7e0dec4335774e0eb19ed5f49676
SHA5122f0100f39ee21ecdcebf3a95cadbff9d5ae26df7ffaf1041ebad5abd8d180fc08f5e59295482566db5f38b2517e38424cab27a814ffb63565d62c73841a6a28e
-
Filesize
4.2MB
MD58d3fa12dfd742a2b3e2d7eb4eb75f3ea
SHA1b3a0de78c55dd77dfdf9ee1db06461b8d0d8c2d4
SHA2564505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff
SHA5124ba39d6454757ea46f3f34a828f8c291a14aace031a69766979b7970e77e417dc0ca79898b8a34c9c8238bc08fb9f7d55a61af42778fdac6ee6f8cf19f168dae
-
Filesize
4.2MB
MD58d3fa12dfd742a2b3e2d7eb4eb75f3ea
SHA1b3a0de78c55dd77dfdf9ee1db06461b8d0d8c2d4
SHA2564505696393abec704f4feab5706e4b08f1526915f40861d072b24855adb065ff
SHA5124ba39d6454757ea46f3f34a828f8c291a14aace031a69766979b7970e77e417dc0ca79898b8a34c9c8238bc08fb9f7d55a61af42778fdac6ee6f8cf19f168dae
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec