Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2023 21:36
Static task
static1
General
-
Target
b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe
-
Size
4.1MB
-
MD5
0a244938033d215f8b975738cda01a92
-
SHA1
898fb1461809062d67757cd271315a3afbe95a43
-
SHA256
b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f
-
SHA512
b6cef50d61186a2fb78871cae143b9f23143b7a4f6a00c60a2feb1942eb987203c8741398c061dc268da6a336d5fea5d17093fb4f15664508fe55c0865e5544f
-
SSDEEP
98304:4iYpD7ABWHfjkisjoq01OQsKrLerxYq0oQODwhuTXBLjlqGw:ERAs/jkisjov1sNrxYqJLDwh0X38
Malware Config
Signatures
-
Glupteba payload 22 IoCs
resource yara_rule behavioral1/memory/4164-2-0x0000000002F10000-0x00000000037FB000-memory.dmp family_glupteba behavioral1/memory/4164-3-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4164-25-0x0000000002F10000-0x00000000037FB000-memory.dmp family_glupteba behavioral1/memory/4164-26-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4164-32-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/4164-61-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/644-63-0x0000000002F50000-0x000000000383B000-memory.dmp family_glupteba behavioral1/memory/644-64-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/644-97-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/644-98-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/644-161-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-259-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-267-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-268-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-269-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-270-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-271-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-272-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-273-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-274-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-275-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral1/memory/3264-276-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4076 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3264 csrss.exe 524 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe File created C:\Windows\rss\csrss.exe b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3560 4164 WerFault.exe 83 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4360 schtasks.exe 1012 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4600 powershell.exe 4600 powershell.exe 4164 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 4164 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 516 powershell.exe 516 powershell.exe 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 948 powershell.exe 948 powershell.exe 4528 powershell.exe 4528 powershell.exe 4740 powershell.exe 4740 powershell.exe 4220 powershell.exe 4220 powershell.exe 3140 powershell.exe 3140 powershell.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 3264 csrss.exe 3264 csrss.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 3264 csrss.exe 3264 csrss.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe 524 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4600 powershell.exe Token: SeDebugPrivilege 4164 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Token: SeImpersonatePrivilege 4164 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe Token: SeDebugPrivilege 516 powershell.exe Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 4740 powershell.exe Token: SeDebugPrivilege 4220 powershell.exe Token: SeDebugPrivilege 3140 powershell.exe Token: SeSystemEnvironmentPrivilege 3264 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4164 wrote to memory of 4600 4164 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 86 PID 4164 wrote to memory of 4600 4164 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 86 PID 4164 wrote to memory of 4600 4164 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 86 PID 644 wrote to memory of 516 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 95 PID 644 wrote to memory of 516 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 95 PID 644 wrote to memory of 516 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 95 PID 644 wrote to memory of 1360 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 98 PID 644 wrote to memory of 1360 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 98 PID 1360 wrote to memory of 4076 1360 cmd.exe 99 PID 1360 wrote to memory of 4076 1360 cmd.exe 99 PID 644 wrote to memory of 948 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 100 PID 644 wrote to memory of 948 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 100 PID 644 wrote to memory of 948 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 100 PID 644 wrote to memory of 4528 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 103 PID 644 wrote to memory of 4528 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 103 PID 644 wrote to memory of 4528 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 103 PID 644 wrote to memory of 3264 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 106 PID 644 wrote to memory of 3264 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 106 PID 644 wrote to memory of 3264 644 b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe 106 PID 3264 wrote to memory of 4740 3264 csrss.exe 107 PID 3264 wrote to memory of 4740 3264 csrss.exe 107 PID 3264 wrote to memory of 4740 3264 csrss.exe 107 PID 3264 wrote to memory of 4220 3264 csrss.exe 112 PID 3264 wrote to memory of 4220 3264 csrss.exe 112 PID 3264 wrote to memory of 4220 3264 csrss.exe 112 PID 3264 wrote to memory of 3140 3264 csrss.exe 115 PID 3264 wrote to memory of 3140 3264 csrss.exe 115 PID 3264 wrote to memory of 3140 3264 csrss.exe 115 PID 3264 wrote to memory of 524 3264 csrss.exe 117 PID 3264 wrote to memory of 524 3264 csrss.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe"C:\Users\Admin\AppData\Local\Temp\b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe"C:\Users\Admin\AppData\Local\Temp\b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4076
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4360
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:524
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1012
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 8682⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4164 -ip 41641⤵PID:2308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52e578430e9d0d61dfd1d61cff253f2db
SHA125e5e1b3552e74d3457b0f5e893de78a331aacd6
SHA25674d04172b27a38bd46a36a32bb5b289b33ddc3f58f574493041fa7899ff46a7f
SHA512607002dee381d7a31a8b9c7bfe30337f520b00a937e827beb6e6002545dea7de2368189765ff8e638b9963bdd68989bc2c55589d6792cfb4f164221b39e93d6c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52ad5c9ecc256ee1382889cc6a7496f1f
SHA169cf84fc75fc1617a9d756d39670998302d1a72f
SHA256b4076f6c693e2a57f09e0a773183b01b7662d8357e33b6eeb9baf76b1a1017f2
SHA51218771479fde37d8c1a901ff37684f4b1a23e51858259f760642f8f6c265b1cd22b666951bc6a19480f71c46633d2341d6fd4c65b97f4c158054a14cf0b695e24
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c628b7a176debad87769295069a7cab5
SHA194026e2333b5e1394ffa4fecc05d6815a3582391
SHA25611ad52edc85c4e1a5ec2dd131b68edbc795618ecf9e798649637cb1f197d1ece
SHA5128fd7d9f27476efc9b9bb7c13f3a6ff38e1c5bdb14cc2fa0d7f8fbd3c019b2151e8653333c6d3f2f191dd716a662019c184b512769f76d85e8da1646d1f1cfb82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56d331b6a3c1f3115ea67e94aaefffd70
SHA10fb4c18b00a7cbac0cd997dbc8d0fdc48cd1fdd4
SHA256e694614cf56b01c0b677a583683aacdb4bd5005cda5e76c3990e13be38984537
SHA512800541a4b6f4b055f497d36b004cbea4b52f723e377564624ca0ca507ed1b89ca641364a3a150000548f5785a4bb64c4470da1b77aca3977059817c5c2f4d2f2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58555a1833e0dc0df9e05d52a19ac77d0
SHA10e7af03a89fb772f834812616b2383764114fb31
SHA256a408a3095b9a501eea65387f636f8f633c027aeae256cfb804fd4dfc1ac005bd
SHA512dad1c5d289c4c6cfd354cf3454a3088240ffd3275bf24273f2be3543fc46896d317b9290d5cc6a0dd7258489982cebb2234de411336dbaf50de86804e2ee68b5
-
Filesize
4.1MB
MD50a244938033d215f8b975738cda01a92
SHA1898fb1461809062d67757cd271315a3afbe95a43
SHA256b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f
SHA512b6cef50d61186a2fb78871cae143b9f23143b7a4f6a00c60a2feb1942eb987203c8741398c061dc268da6a336d5fea5d17093fb4f15664508fe55c0865e5544f
-
Filesize
4.1MB
MD50a244938033d215f8b975738cda01a92
SHA1898fb1461809062d67757cd271315a3afbe95a43
SHA256b08dcb88bdfb7e5988b8505faf7f9c58f6dee260e41f25b12702df1ed0e75c4f
SHA512b6cef50d61186a2fb78871cae143b9f23143b7a4f6a00c60a2feb1942eb987203c8741398c061dc268da6a336d5fea5d17093fb4f15664508fe55c0865e5544f