Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 07:58
Static task
static1
General
-
Target
0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe
-
Size
4.2MB
-
MD5
8d4803509899ed55b8aa37c0101ed508
-
SHA1
2933a04b525c2a7ba110c97101841a350b021f72
-
SHA256
0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74
-
SHA512
2dd8a1b3d25d0e1bb8418108b772428a713d03bafce4a9067403694ad13f7428580aece750875d151bcb2f6e41d76b8694d39b2ada7ceb3c1934ec74ed2cc79a
-
SSDEEP
98304:dDpOZQJuC/XgnbxpPY15ehxqRDcyHzCkKrqxPLEPecklCySdVS:dDouuEXgnbxu1wiRDvT8rqBsQCySdQ
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral1/memory/3224-134-0x0000000004CC0000-0x00000000055AB000-memory.dmp family_glupteba behavioral1/memory/3224-171-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/3224-204-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/980-218-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/980-289-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-330-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-353-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-364-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-368-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-372-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-376-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-380-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-384-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-388-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-396-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba behavioral1/memory/4496-401-0x0000000000400000-0x000000000295A000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4680 netsh.exe -
Executes dropped EXE 5 IoCs
pid Process 4496 csrss.exe 4840 injector.exe 4428 windefender.exe 2556 windefender.exe 1312 f801950a962ddba14caaa44bf084b55c.exe -
resource yara_rule behavioral1/files/0x000700000002314b-356.dat upx behavioral1/files/0x000700000002314b-358.dat upx behavioral1/memory/4428-359-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x000700000002314b-360.dat upx behavioral1/memory/4428-361-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2556-362-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2556-374-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x0003000000021a94-395.dat upx behavioral1/files/0x0003000000021a94-397.dat upx behavioral1/memory/1312-398-0x0000000000400000-0x0000000000C25000-memory.dmp upx behavioral1/memory/2556-399-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1312-403-0x0000000000400000-0x0000000000C25000-memory.dmp upx behavioral1/memory/1312-406-0x0000000000400000-0x0000000000C25000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe File created C:\Windows\rss\csrss.exe 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4260 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2784 schtasks.exe 3344 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-721 = "Central Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 540 powershell.exe 540 powershell.exe 3224 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 3224 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 956 powershell.exe 956 powershell.exe 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 1576 powershell.exe 1576 powershell.exe 2196 powershell.exe 2196 powershell.exe 1200 powershell.exe 1200 powershell.exe 632 powershell.exe 632 powershell.exe 1396 powershell.exe 1396 powershell.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4496 csrss.exe 4496 csrss.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4496 csrss.exe 4496 csrss.exe 4840 injector.exe 4840 injector.exe 4496 csrss.exe 4496 csrss.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe 4840 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 540 powershell.exe Token: SeDebugPrivilege 3224 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Token: SeImpersonatePrivilege 3224 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeDebugPrivilege 1576 powershell.exe Token: SeDebugPrivilege 2196 powershell.exe Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 632 powershell.exe Token: SeDebugPrivilege 1396 powershell.exe Token: SeSystemEnvironmentPrivilege 4496 csrss.exe Token: SeSecurityPrivilege 4260 sc.exe Token: SeSecurityPrivilege 4260 sc.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3224 wrote to memory of 540 3224 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 82 PID 3224 wrote to memory of 540 3224 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 82 PID 3224 wrote to memory of 540 3224 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 82 PID 980 wrote to memory of 956 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 87 PID 980 wrote to memory of 956 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 87 PID 980 wrote to memory of 956 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 87 PID 980 wrote to memory of 3312 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 89 PID 980 wrote to memory of 3312 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 89 PID 3312 wrote to memory of 4680 3312 cmd.exe 91 PID 3312 wrote to memory of 4680 3312 cmd.exe 91 PID 980 wrote to memory of 1576 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 92 PID 980 wrote to memory of 1576 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 92 PID 980 wrote to memory of 1576 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 92 PID 980 wrote to memory of 2196 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 95 PID 980 wrote to memory of 2196 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 95 PID 980 wrote to memory of 2196 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 95 PID 980 wrote to memory of 4496 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 100 PID 980 wrote to memory of 4496 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 100 PID 980 wrote to memory of 4496 980 0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe 100 PID 4496 wrote to memory of 1200 4496 csrss.exe 101 PID 4496 wrote to memory of 1200 4496 csrss.exe 101 PID 4496 wrote to memory of 1200 4496 csrss.exe 101 PID 4496 wrote to memory of 632 4496 csrss.exe 109 PID 4496 wrote to memory of 632 4496 csrss.exe 109 PID 4496 wrote to memory of 632 4496 csrss.exe 109 PID 4496 wrote to memory of 1396 4496 csrss.exe 111 PID 4496 wrote to memory of 1396 4496 csrss.exe 111 PID 4496 wrote to memory of 1396 4496 csrss.exe 111 PID 4496 wrote to memory of 4840 4496 csrss.exe 113 PID 4496 wrote to memory of 4840 4496 csrss.exe 113 PID 4428 wrote to memory of 3712 4428 windefender.exe 119 PID 4428 wrote to memory of 3712 4428 windefender.exe 119 PID 4428 wrote to memory of 3712 4428 windefender.exe 119 PID 3712 wrote to memory of 4260 3712 cmd.exe 120 PID 3712 wrote to memory of 4260 3712 cmd.exe 120 PID 3712 wrote to memory of 4260 3712 cmd.exe 120 PID 4496 wrote to memory of 1312 4496 csrss.exe 123 PID 4496 wrote to memory of 1312 4496 csrss.exe 123 PID 4496 wrote to memory of 1312 4496 csrss.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe"C:\Users\Admin\AppData\Local\Temp\0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe"C:\Users\Admin\AppData\Local\Temp\0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4680
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2784
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3344
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe4⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f5⤵PID:4684
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f5⤵PID:3924
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
3.2MB
MD5f801950a962ddba14caaa44bf084b55c
SHA17cadc9076121297428442785536ba0df2d4ae996
SHA256c3946ec89e15b24b743c46f9acacb58cff47da63f3ce2799d71ed90496b8891f
SHA5124183bc76bdc84fb779e2e573d9a63d7de47096b63b945f9e335bee95ae28eb208f5ee15f6501ac59623b97c5b77f3455ca313512e7d9803e1704ae22a52459c5
-
Filesize
99KB
MD509031a062610d77d685c9934318b4170
SHA1880f744184e7774f3d14c1bb857e21cc7fe89a6d
SHA256778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd
SHA5129a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5949f210e95deebd2c0567a3c5c71a41c
SHA18c0c9072b35f949bd994d51ff618a836552e11cd
SHA2561e607a208a28ce07fb505fa814f22c099577e1bd3225a1b36c256984a3d414ad
SHA51235228d2cc3103dd4382e2cfb50a787a587a83f569924f1c996342ea5320c219c11b8ef6736696574376ad23fcc11c720be07f89a002e829b8aaa1770f21b4910
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a4c5690307771acb67607b062b325573
SHA173477b89ca4106e6d299343c014a877ac284aa9d
SHA256d690c4798712d15fbcc7d20d71466998e78ddbd262d5fbea1569c9b8ff98d867
SHA51289a56615711f0828958d2f6705b0c8cf4be1643398f6786e8cb717729fd0bf7c569bf503b78b7de98b5948c1c73750bcbb3c970e61f970d90bd80ca835f39488
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57f553639c6f7608ea5c3ea89e59b381e
SHA192a368bb8706f9598efd14706872d49db834169d
SHA2567844384a4e32b3f7372915eaabddbc81c263c2d70af8ad90689829994fb814f5
SHA5126c40b23f65d0a4b82e0644f82abb524954386b2e46a9620690689e16b7b7b423bebe114b82839c43d77963d57e8c75709d7f942a9c76ee0b63520aa3369dac00
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5660b3a28c457c886fe088b89a2064706
SHA1e9da118c8a8edbba392d8c70215caef20121248a
SHA25652db028fb1e08a0523c7ac024af277907708044bfc6508e2e62056320b686b33
SHA512185450dbf9daa80cffb1280ab9ff341fa842d986a26848f84766a77ebb58cbf7f39a7211deeaf41e54ca2ee646db389acbf8793445ddb02ebdfca201ddd15939
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD543c06238db63ac15bbaaefd4ba1c358e
SHA111a4b6a727ac1dbc565a9fba568bef9210a19461
SHA256a73f70b48292504404d2992ba3814cfda4c197ae67c91498cf3c1730edd081cd
SHA512abb35ed5becae6f171e1729dce1f79576fa050ff3627206d9f55f6fe971b60611fa7bf4eca1df2f9433a85da915fa5e7b2a15111ead0391f657ad257be298954
-
Filesize
4.2MB
MD58d4803509899ed55b8aa37c0101ed508
SHA12933a04b525c2a7ba110c97101841a350b021f72
SHA2560f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74
SHA5122dd8a1b3d25d0e1bb8418108b772428a713d03bafce4a9067403694ad13f7428580aece750875d151bcb2f6e41d76b8694d39b2ada7ceb3c1934ec74ed2cc79a
-
Filesize
4.2MB
MD58d4803509899ed55b8aa37c0101ed508
SHA12933a04b525c2a7ba110c97101841a350b021f72
SHA2560f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74
SHA5122dd8a1b3d25d0e1bb8418108b772428a713d03bafce4a9067403694ad13f7428580aece750875d151bcb2f6e41d76b8694d39b2ada7ceb3c1934ec74ed2cc79a
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec