Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
16-07-2023 22:03
Static task
static1
General
-
Target
c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe
-
Size
4.2MB
-
MD5
9465c4df499aff2d1414f41061942f8c
-
SHA1
06736f267f03b8d3df7623e3656cc3395927b1b8
-
SHA256
c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526
-
SHA512
dddff557c9528669a395001872bc4722e739534327a4c439f433026381e7235df873c7c5359c9ec6a783ae15946cb6b265ff69bc73cdd0d88ad3be6687557697
-
SSDEEP
98304:keTcHN5n+a4fgld7uBNnLU7Kn4s9s/xnQPiZ/Ms7R:4HH2fgzqBVLU7KnRgdIiZd
Malware Config
Signatures
-
Glupteba payload 23 IoCs
resource yara_rule behavioral1/memory/4620-123-0x0000000002EA0000-0x000000000378B000-memory.dmp family_glupteba behavioral1/memory/4620-124-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4620-125-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4620-164-0x0000000002EA0000-0x000000000378B000-memory.dmp family_glupteba behavioral1/memory/4620-198-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4620-331-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4620-428-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3220-430-0x00000000029F0000-0x0000000002DF5000-memory.dmp family_glupteba behavioral1/memory/3220-431-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3220-448-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3220-535-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3220-707-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3220-1171-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4660-1175-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4660-1184-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4660-1671-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4660-1919-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4660-1929-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4660-1931-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4660-1933-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4660-1935-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4660-1937-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4660-1939-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4348 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 4660 csrss.exe 2140 injector.exe 3032 windefender.exe 4988 windefender.exe -
resource yara_rule behavioral1/files/0x000700000001afda-1924.dat upx behavioral1/files/0x000700000001afda-1926.dat upx behavioral1/files/0x000700000001afda-1927.dat upx behavioral1/memory/3032-1928-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4988-1930-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4988-1934-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1148472871-1113856141-1322182616-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\S-1-5-21-1148472871-1113856141-1322182616-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 856 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe 3268 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-435 = "Georgian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3512 powershell.exe 3512 powershell.exe 3512 powershell.exe 4620 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 4620 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 2760 powershell.exe 2760 powershell.exe 2760 powershell.exe 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 5016 powershell.exe 5016 powershell.exe 5016 powershell.exe 4844 powershell.exe 4844 powershell.exe 4844 powershell.exe 5076 powershell.exe 5076 powershell.exe 5076 powershell.exe 4016 powershell.exe 4016 powershell.exe 4016 powershell.exe 1968 powershell.exe 1968 powershell.exe 1968 powershell.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 4660 csrss.exe 4660 csrss.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 4660 csrss.exe 4660 csrss.exe 2140 injector.exe 2140 injector.exe 4660 csrss.exe 4660 csrss.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe 2140 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3512 powershell.exe Token: SeDebugPrivilege 4620 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Token: SeImpersonatePrivilege 4620 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeDebugPrivilege 5076 powershell.exe Token: SeDebugPrivilege 4016 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeSystemEnvironmentPrivilege 4660 csrss.exe Token: SeSecurityPrivilege 856 sc.exe Token: SeSecurityPrivilege 856 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4620 wrote to memory of 3512 4620 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 70 PID 4620 wrote to memory of 3512 4620 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 70 PID 4620 wrote to memory of 3512 4620 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 70 PID 3220 wrote to memory of 2760 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 75 PID 3220 wrote to memory of 2760 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 75 PID 3220 wrote to memory of 2760 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 75 PID 3220 wrote to memory of 3024 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 77 PID 3220 wrote to memory of 3024 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 77 PID 3024 wrote to memory of 4348 3024 cmd.exe 79 PID 3024 wrote to memory of 4348 3024 cmd.exe 79 PID 3220 wrote to memory of 5016 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 80 PID 3220 wrote to memory of 5016 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 80 PID 3220 wrote to memory of 5016 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 80 PID 3220 wrote to memory of 4844 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 82 PID 3220 wrote to memory of 4844 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 82 PID 3220 wrote to memory of 4844 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 82 PID 3220 wrote to memory of 4660 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 84 PID 3220 wrote to memory of 4660 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 84 PID 3220 wrote to memory of 4660 3220 c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe 84 PID 4660 wrote to memory of 5076 4660 csrss.exe 85 PID 4660 wrote to memory of 5076 4660 csrss.exe 85 PID 4660 wrote to memory of 5076 4660 csrss.exe 85 PID 4660 wrote to memory of 4016 4660 csrss.exe 91 PID 4660 wrote to memory of 4016 4660 csrss.exe 91 PID 4660 wrote to memory of 4016 4660 csrss.exe 91 PID 4660 wrote to memory of 1968 4660 csrss.exe 94 PID 4660 wrote to memory of 1968 4660 csrss.exe 94 PID 4660 wrote to memory of 1968 4660 csrss.exe 94 PID 4660 wrote to memory of 2140 4660 csrss.exe 96 PID 4660 wrote to memory of 2140 4660 csrss.exe 96 PID 3032 wrote to memory of 4136 3032 windefender.exe 103 PID 3032 wrote to memory of 4136 3032 windefender.exe 103 PID 3032 wrote to memory of 4136 3032 windefender.exe 103 PID 4136 wrote to memory of 856 4136 cmd.exe 104 PID 4136 wrote to memory of 856 4136 cmd.exe 104 PID 4136 wrote to memory of 856 4136 cmd.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe"C:\Users\Admin\AppData\Local\Temp\c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe"C:\Users\Admin\AppData\Local\Temp\c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4348
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3268
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a063ecc9fffa09b1aa9472d804853818
SHA1f056469cdce5870df62ce0da765680798a970b86
SHA256e9eb8b45f3379d42ea1d35ed9077837c8af374900e43b27cc3b45c3f0a7cfd6a
SHA512703a34a436af69561fe9923b676552a961cad483e298c29dad68644c6f71c58d59b0837d2058b41139b2ed54f22eb0ea1d71e4db3596d7a2cd897aaa9c794964
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5b01f70abe68c108b9471cb2a1e351686
SHA19620868a1d6818e976ba07e7beaee5cdb753cf7f
SHA2563fef0531f02eeb0c9634f61e45929a858eb21ebf1a2810c6d2ebeb7c3985dff1
SHA512c45e45c57c7b46604009418a0efe86d8cb661b16903c6e09cd9e7d12356bc7a1de438117cb8194cd929f3038e420fc84c63cc3a05ca9c0ba26a0741d68d35a07
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD55d800dcdea04da17639be11a9b6e3708
SHA1d730eb5b0d6b90b64444fde51ab1041e9056112a
SHA256178436537fd0e579931f3d05d28498969a0db8b8fb92f1715786e66de13f86ef
SHA512eefae265c5ea5cdab796a1dbcd085a6dbdd1a118eb1a351b1824215df82e87448f9fc7f5f9ed9ea50c9aff97a0740cdc8ce0d64417b498d033cc985e9200425b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5ecfee14c10b0e7d42ea19e5d646aaacf
SHA1eabdbb2f722bb643a90480a2b3c1827cd229232a
SHA256f5da68f778d16c5338aa701450aebd3084dcde5bac388d33a0ef09f255e78eff
SHA512d271db38abc79a309101af8e0060e1177b5cdb95d38807cfa471dd75e05ec8c18b2ede541813da2c955e1c4538bd1d80cac7baaae509b0aada5a288be6878fe0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD553af4c79b1f54416c0a00585e18fabff
SHA153c3aff984763822e9bf26e5fe6ddf6c03d8a0be
SHA25679bc633b8b0b4302d92b2c6125cc8bbd977c444f49dc3b6fcee07b4ed3e2abf7
SHA5125bec7c59f0cbac175e4ef38a09e88e0cce85c943954f6bb06075c31862971d55f66e293b6f534d5190616a0b7a9e79b318ffa42a97da01fe730f86bc351e13e9
-
Filesize
4.2MB
MD59465c4df499aff2d1414f41061942f8c
SHA106736f267f03b8d3df7623e3656cc3395927b1b8
SHA256c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526
SHA512dddff557c9528669a395001872bc4722e739534327a4c439f433026381e7235df873c7c5359c9ec6a783ae15946cb6b265ff69bc73cdd0d88ad3be6687557697
-
Filesize
4.2MB
MD59465c4df499aff2d1414f41061942f8c
SHA106736f267f03b8d3df7623e3656cc3395927b1b8
SHA256c9603b5ab4925e5f2fcdf3f8c77253350467e2228af081b15636c41b57fb8526
SHA512dddff557c9528669a395001872bc4722e739534327a4c439f433026381e7235df873c7c5359c9ec6a783ae15946cb6b265ff69bc73cdd0d88ad3be6687557697
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec