Analysis
-
max time kernel
90s -
max time network
124s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
08/08/2023, 00:01
Static task
static1
General
-
Target
65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe
-
Size
4.1MB
-
MD5
2147a05eb72f47652c06a22e1b12cb54
-
SHA1
b09c2df91af4e6d22f192a4d9895e1415194e41d
-
SHA256
65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b
-
SHA512
444e3452e813f698c2de9632e1806d1323770d500fddbfb3c12517521b38a1c7036d23e98b0ee2d56f94b71b1651f68cd4e61a8c8470d65ce764167ada374a3d
-
SSDEEP
98304:Jxto2fyKyL9/8kqmauRKEUtLtsPWZpiaQETVWb9yX:J02fyi9mnRn+LtIWOIgbA
Malware Config
Signatures
-
Glupteba payload 14 IoCs
resource yara_rule behavioral1/memory/4904-118-0x0000000003E50000-0x000000000473B000-memory.dmp family_glupteba behavioral1/memory/4904-119-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/4904-134-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/4904-135-0x0000000003E50000-0x000000000473B000-memory.dmp family_glupteba behavioral1/memory/4904-418-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/4904-421-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/1972-423-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/1972-445-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/1972-769-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/1972-1159-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/5024-1161-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/5024-1187-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/5024-1509-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba behavioral1/memory/5024-1902-0x0000000000400000-0x0000000001C96000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2912 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 5024 csrss.exe 4376 injector.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe File created C:\Windows\rss\csrss.exe 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3592 schtasks.exe 380 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 2700 powershell.exe 2700 powershell.exe 2700 powershell.exe 4904 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 4904 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 2772 powershell.exe 2772 powershell.exe 2772 powershell.exe 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 4204 powershell.exe 4204 powershell.exe 4204 powershell.exe 4600 powershell.exe 4600 powershell.exe 4600 powershell.exe 3608 powershell.exe 3608 powershell.exe 3608 powershell.exe 1392 powershell.exe 1392 powershell.exe 1392 powershell.exe 4408 powershell.exe 4408 powershell.exe 4408 powershell.exe 4376 injector.exe 4376 injector.exe 4376 injector.exe 4376 injector.exe 4376 injector.exe 4376 injector.exe 5024 csrss.exe 5024 csrss.exe 4376 injector.exe 4376 injector.exe 4376 injector.exe 4376 injector.exe 4376 injector.exe 4376 injector.exe 5024 csrss.exe 5024 csrss.exe 4376 injector.exe 4376 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 4904 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Token: SeImpersonatePrivilege 4904 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 4204 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeDebugPrivilege 3608 powershell.exe Token: SeDebugPrivilege 1392 powershell.exe Token: SeDebugPrivilege 4408 powershell.exe Token: SeSystemEnvironmentPrivilege 5024 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4904 wrote to memory of 2700 4904 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 70 PID 4904 wrote to memory of 2700 4904 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 70 PID 4904 wrote to memory of 2700 4904 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 70 PID 1972 wrote to memory of 2772 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 75 PID 1972 wrote to memory of 2772 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 75 PID 1972 wrote to memory of 2772 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 75 PID 1972 wrote to memory of 5096 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 77 PID 1972 wrote to memory of 5096 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 77 PID 5096 wrote to memory of 2912 5096 cmd.exe 79 PID 5096 wrote to memory of 2912 5096 cmd.exe 79 PID 1972 wrote to memory of 4204 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 80 PID 1972 wrote to memory of 4204 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 80 PID 1972 wrote to memory of 4204 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 80 PID 1972 wrote to memory of 4600 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 82 PID 1972 wrote to memory of 4600 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 82 PID 1972 wrote to memory of 4600 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 82 PID 1972 wrote to memory of 5024 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 84 PID 1972 wrote to memory of 5024 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 84 PID 1972 wrote to memory of 5024 1972 65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe 84 PID 5024 wrote to memory of 3608 5024 csrss.exe 85 PID 5024 wrote to memory of 3608 5024 csrss.exe 85 PID 5024 wrote to memory of 3608 5024 csrss.exe 85 PID 5024 wrote to memory of 1392 5024 csrss.exe 91 PID 5024 wrote to memory of 1392 5024 csrss.exe 91 PID 5024 wrote to memory of 1392 5024 csrss.exe 91 PID 5024 wrote to memory of 4408 5024 csrss.exe 94 PID 5024 wrote to memory of 4408 5024 csrss.exe 94 PID 5024 wrote to memory of 4408 5024 csrss.exe 94 PID 5024 wrote to memory of 4376 5024 csrss.exe 96 PID 5024 wrote to memory of 4376 5024 csrss.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe"C:\Users\Admin\AppData\Local\Temp\65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe"C:\Users\Admin\AppData\Local\Temp\65b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2912
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3592
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3784
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:380
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD57655b243aa500e00e8d863ba366a2c72
SHA174ddb6bb1482172cd9b9dbc98ed6188c315779a3
SHA2561a2bf589899551f4951853558c2767edcd957955d40d696b384691953012ca25
SHA5124ce7e6a6561e8213ff2970d116d4e4e74ed0a2afbbf187e2a6493875e15cd1c07e9b6b2e2a176a2b68be24d1002009a4438e4975a6824a3ccbdaf8c3cd46ab7d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5fafc589bb3a9de659d1ce9be5cf9223f
SHA1dfd44a7118ad03ac14bf35228a807c222df84f1b
SHA256342c0cd2d1502f54fd6b4d65e7c18dd2f8aa751941c7fd986fd12f313afe2c57
SHA5121b1fd2d1647fd4499ce912dc11271c402bcb9ab743fb4882653c7dac3a8348379fac8ba32fbbe3a900754b6c1ed861e1fafcb1815d04b77666731d5b29cd8607
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD57a667789aae4c0e3a85e3bc77df10554
SHA12811e1f60cb8b9e2d48fa96d1e735b013ce0f52b
SHA256e3637c7f876fe94d6aef390e72a308b42bad776c2295393ff7782e5caa24414e
SHA512b8d6c948686063cf9641ed43d91ba64904c027da2395894272723a555b234dcf98d543a0fb19a202e25d56e73423c86f8ee9fff3b4273c699b2d0011d92edef1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD56fc62e7ee198bad9d25127b9be5159c0
SHA153b6cb3cf93fe795572120e1f9718cf0f2c91d2f
SHA256d9e1c427d9efadf56001f6c1fa1e6707095f5a29edfc573536a1e1816aacaeba
SHA5120f723963c6e070c82545fd7d8ec2edfbb5b9808468584b7d6808712a349f99af5817152734e41725acdc0b2c099c16dba23f76be5931922ef5a0bd8189d68342
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD546f1cf17aba7e6e9967ff4ec2c43f3e7
SHA19c6d76bf1e814727506640e839eb34a2dc7128b4
SHA25629197635192f2c1a91553b14b1ed6a24f6a5812d300a18e53a0ed31852656db0
SHA512e7de48fd7e16bc196b90bb153c48f6f47ba82441f4bba1fb54e37212136b439ced61bbc0d9810bb88ed40ff54d91da9df9cc2367284ccaa85b2dc9be419fde2e
-
Filesize
4.1MB
MD52147a05eb72f47652c06a22e1b12cb54
SHA1b09c2df91af4e6d22f192a4d9895e1415194e41d
SHA25665b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b
SHA512444e3452e813f698c2de9632e1806d1323770d500fddbfb3c12517521b38a1c7036d23e98b0ee2d56f94b71b1651f68cd4e61a8c8470d65ce764167ada374a3d
-
Filesize
4.1MB
MD52147a05eb72f47652c06a22e1b12cb54
SHA1b09c2df91af4e6d22f192a4d9895e1415194e41d
SHA25665b3ba3fd5ad38be3bcb4a512fbaa9d359273953cdd92a44363f6fc6ca01605b
SHA512444e3452e813f698c2de9632e1806d1323770d500fddbfb3c12517521b38a1c7036d23e98b0ee2d56f94b71b1651f68cd4e61a8c8470d65ce764167ada374a3d