Analysis
-
max time kernel
301s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2023, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
7a54bdb20779c4359694feaa1398dd25.exe
Resource
win7-20230831-en
General
-
Target
7a54bdb20779c4359694feaa1398dd25.exe
-
Size
4.2MB
-
MD5
4dbb5e44fee04e3b44818b3dcacb9b00
-
SHA1
44ca6ca32bf485287bffa9ce84b47a3a1760845e
-
SHA256
383168e595bb030b9ff0e7217928f5b28ab9546c866180c2c8b49cbc17f0f797
-
SHA512
b4d0880c3794f3a3aa9007d7ae2f3adfd9b31b3e6dee7d0a41056538207e30ebd02e0f8c70ce5d96b44ad3d7c801c6c5a0b461507c62f48bbf29d11f9f42e21d
-
SSDEEP
98304:pF10jpaWsugxMhTbI3iyxger++TzsWgXZ7UN:t0jUIHhTXIge5EjXZE
Malware Config
Signatures
-
Glupteba payload 36 IoCs
resource yara_rule behavioral2/memory/3944-2-0x0000000004870000-0x000000000515B000-memory.dmp family_glupteba behavioral2/memory/3944-3-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/3944-26-0x0000000004870000-0x000000000515B000-memory.dmp family_glupteba behavioral2/memory/3944-31-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/3944-32-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/3944-59-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/2640-62-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/2640-78-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/2640-104-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/2640-154-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/2640-160-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-212-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-264-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-265-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-266-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-267-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-268-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-269-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-270-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-271-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-272-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-273-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-274-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-275-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-276-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-277-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-278-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-279-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-280-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-281-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-282-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-283-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-284-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-285-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-286-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba behavioral2/memory/552-287-0x0000000000400000-0x0000000002675000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4132 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 552 csrss.exe 4788 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 7a54bdb20779c4359694feaa1398dd25.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 7a54bdb20779c4359694feaa1398dd25.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 7a54bdb20779c4359694feaa1398dd25.exe File created C:\Windows\rss\csrss.exe 7a54bdb20779c4359694feaa1398dd25.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2704 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3560 schtasks.exe 5060 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 7a54bdb20779c4359694feaa1398dd25.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 7a54bdb20779c4359694feaa1398dd25.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4864 powershell.exe 4864 powershell.exe 3944 7a54bdb20779c4359694feaa1398dd25.exe 3944 7a54bdb20779c4359694feaa1398dd25.exe 3600 powershell.exe 3600 powershell.exe 2640 7a54bdb20779c4359694feaa1398dd25.exe 2640 7a54bdb20779c4359694feaa1398dd25.exe 2640 7a54bdb20779c4359694feaa1398dd25.exe 2640 7a54bdb20779c4359694feaa1398dd25.exe 2640 7a54bdb20779c4359694feaa1398dd25.exe 2640 7a54bdb20779c4359694feaa1398dd25.exe 2640 7a54bdb20779c4359694feaa1398dd25.exe 2640 7a54bdb20779c4359694feaa1398dd25.exe 2640 7a54bdb20779c4359694feaa1398dd25.exe 2640 7a54bdb20779c4359694feaa1398dd25.exe 4372 powershell.exe 4372 powershell.exe 4372 powershell.exe 2324 powershell.exe 2324 powershell.exe 2324 powershell.exe 4652 powershell.exe 4652 powershell.exe 4652 powershell.exe 2884 powershell.exe 2884 powershell.exe 2884 powershell.exe 4024 powershell.exe 4024 powershell.exe 4024 powershell.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 552 csrss.exe 552 csrss.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 552 csrss.exe 552 csrss.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe 4788 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4864 powershell.exe Token: SeDebugPrivilege 3944 7a54bdb20779c4359694feaa1398dd25.exe Token: SeImpersonatePrivilege 3944 7a54bdb20779c4359694feaa1398dd25.exe Token: SeDebugPrivilege 3600 powershell.exe Token: SeDebugPrivilege 4372 powershell.exe Token: SeDebugPrivilege 2324 powershell.exe Token: SeDebugPrivilege 4652 powershell.exe Token: SeDebugPrivilege 2884 powershell.exe Token: SeDebugPrivilege 4024 powershell.exe Token: SeSystemEnvironmentPrivilege 552 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3944 wrote to memory of 4864 3944 7a54bdb20779c4359694feaa1398dd25.exe 90 PID 3944 wrote to memory of 4864 3944 7a54bdb20779c4359694feaa1398dd25.exe 90 PID 3944 wrote to memory of 4864 3944 7a54bdb20779c4359694feaa1398dd25.exe 90 PID 2640 wrote to memory of 3600 2640 7a54bdb20779c4359694feaa1398dd25.exe 98 PID 2640 wrote to memory of 3600 2640 7a54bdb20779c4359694feaa1398dd25.exe 98 PID 2640 wrote to memory of 3600 2640 7a54bdb20779c4359694feaa1398dd25.exe 98 PID 2640 wrote to memory of 5116 2640 7a54bdb20779c4359694feaa1398dd25.exe 101 PID 2640 wrote to memory of 5116 2640 7a54bdb20779c4359694feaa1398dd25.exe 101 PID 5116 wrote to memory of 4132 5116 cmd.exe 103 PID 5116 wrote to memory of 4132 5116 cmd.exe 103 PID 2640 wrote to memory of 4372 2640 7a54bdb20779c4359694feaa1398dd25.exe 106 PID 2640 wrote to memory of 4372 2640 7a54bdb20779c4359694feaa1398dd25.exe 106 PID 2640 wrote to memory of 4372 2640 7a54bdb20779c4359694feaa1398dd25.exe 106 PID 2640 wrote to memory of 2324 2640 7a54bdb20779c4359694feaa1398dd25.exe 108 PID 2640 wrote to memory of 2324 2640 7a54bdb20779c4359694feaa1398dd25.exe 108 PID 2640 wrote to memory of 2324 2640 7a54bdb20779c4359694feaa1398dd25.exe 108 PID 2640 wrote to memory of 552 2640 7a54bdb20779c4359694feaa1398dd25.exe 110 PID 2640 wrote to memory of 552 2640 7a54bdb20779c4359694feaa1398dd25.exe 110 PID 2640 wrote to memory of 552 2640 7a54bdb20779c4359694feaa1398dd25.exe 110 PID 552 wrote to memory of 4652 552 csrss.exe 111 PID 552 wrote to memory of 4652 552 csrss.exe 111 PID 552 wrote to memory of 4652 552 csrss.exe 111 PID 552 wrote to memory of 2884 552 csrss.exe 116 PID 552 wrote to memory of 2884 552 csrss.exe 116 PID 552 wrote to memory of 2884 552 csrss.exe 116 PID 552 wrote to memory of 4024 552 csrss.exe 119 PID 552 wrote to memory of 4024 552 csrss.exe 119 PID 552 wrote to memory of 4024 552 csrss.exe 119 PID 552 wrote to memory of 4788 552 csrss.exe 121 PID 552 wrote to memory of 4788 552 csrss.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a54bdb20779c4359694feaa1398dd25.exe"C:\Users\Admin\AppData\Local\Temp\7a54bdb20779c4359694feaa1398dd25.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\7a54bdb20779c4359694feaa1398dd25.exe"C:\Users\Admin\AppData\Local\Temp\7a54bdb20779c4359694feaa1398dd25.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4132
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3560
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:5060
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2704
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD514e38434ef6902f4918e368a06218d81
SHA1bb9b677529db9edfd997a0495ff2f11ad519f59f
SHA25667a9056d6b50a60fef9d93ae0151dd4ca8d6dc6f117f2bf4754f6307fa38cd97
SHA512b6e04130334d72c387b0e9a145d303fb22a14070bb6b7dbb114a078f37ddc45c01c8787bcf3529aed2a8f610d847bfbd222d9264cd6e35a052382b8fcb19826a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58e406f11640657a34978fc0b5c3cc09d
SHA1dd46478fcfeb442fad3728f0d1839ac3e6ab5318
SHA256a7e52a65045cc3bb275f6bc8abd0c7c697afdf8702dbc689678548cdacd79ffd
SHA512edd51ca9e9e6aca7bebd5e793105d23078a12e817792e90613f9160e06c906079064b7ffa104ca53079832736a1f9c75642f91ad61d35b58fb2a2c5632bfa11c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5726eb5ddb3c40281089f1a4f432884d0
SHA17f22d92fde4914cf2a2e817867d939a8b7ef312d
SHA256b65e41e4d1fa43f2353de9fdc8e65635d45fe843bdf428c9f09b53fb1529dd44
SHA51209a01f04c59b5df80b42ef778def322ba967905a09660c0b1316fdde66a8db22aefa1c6a966073bccd946e8a7e030542d877bc6e2d1a33220fc71c8dde368ad7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b80bcc4119b0938b489ba3ee9c603b96
SHA12456440236a457a1b9e89856157446758397bd58
SHA256c465415f7be2fc948a8df0cab3b87b38e30d783b3a51fb22cfcb595effde8c19
SHA512490186371f10e08f90f6a89a36463b9f113498026b11e3f2a2b0e398e5d288c5fb78a09c46668a31657147d85c6f2af4df06491270d7244d8d4e17e1bce99070
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bde5b1dbfb25c1bd7214dc5631429299
SHA1ebe79d8bf4aeb17294067355a68dd0703f18ca0f
SHA256755e784de0a5dbbed6a926669db409aedfeb272dfc015cb9ea7eeab73eef90d3
SHA5125f5081ed92c9c1c030c6df37e73427477301ac467e8be4ab88461901fe1bfcfcb27cc10b5671bd25618778bcfc165560a4630f28331cfe4dcc4ec60f66143d19
-
Filesize
4.2MB
MD54dbb5e44fee04e3b44818b3dcacb9b00
SHA144ca6ca32bf485287bffa9ce84b47a3a1760845e
SHA256383168e595bb030b9ff0e7217928f5b28ab9546c866180c2c8b49cbc17f0f797
SHA512b4d0880c3794f3a3aa9007d7ae2f3adfd9b31b3e6dee7d0a41056538207e30ebd02e0f8c70ce5d96b44ad3d7c801c6c5a0b461507c62f48bbf29d11f9f42e21d
-
Filesize
4.2MB
MD54dbb5e44fee04e3b44818b3dcacb9b00
SHA144ca6ca32bf485287bffa9ce84b47a3a1760845e
SHA256383168e595bb030b9ff0e7217928f5b28ab9546c866180c2c8b49cbc17f0f797
SHA512b4d0880c3794f3a3aa9007d7ae2f3adfd9b31b3e6dee7d0a41056538207e30ebd02e0f8c70ce5d96b44ad3d7c801c6c5a0b461507c62f48bbf29d11f9f42e21d