Analysis
-
max time kernel
160s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe
Resource
win7-20230831-en
General
-
Target
f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe
-
Size
4.2MB
-
MD5
a4bb95cc61ad5a37da54169ec66f17fb
-
SHA1
227e04c991b1bf3dcd57de103bc915acb895522b
-
SHA256
f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9
-
SHA512
70e391e69d00dbbf858f0a540673a163edf29f481eb3510ee0885fc72e2f1514d5847bf5ad1e88b9a025ba2360dfabe01fbe86aefa4a2ef3271ed2fab027b009
-
SSDEEP
98304:mkaOesepF5FSjipsR+myM8bEN4CCPrefjP//kp5vmCpy:uOenjpSs7jgP/+y
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral2/memory/4384-2-0x0000000002F00000-0x00000000037EB000-memory.dmp family_glupteba behavioral2/memory/4384-3-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4384-4-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4384-6-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4384-7-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4384-25-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4384-33-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4384-56-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4384-69-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2208-71-0x0000000002A30000-0x0000000002E2E000-memory.dmp family_glupteba behavioral2/memory/2208-72-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba behavioral2/memory/2208-73-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2208-105-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2208-127-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2208-172-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3552-240-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3552-276-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2956 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3552 csrss.exe 3152 injector.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe File created C:\Windows\rss\csrss.exe f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2032 4384 WerFault.exe 82 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 712 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 4416 powershell.exe 4416 powershell.exe 4384 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 4384 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2436 powershell.exe 2436 powershell.exe 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 2236 powershell.exe 2236 powershell.exe 4776 powershell.exe 4776 powershell.exe 3184 powershell.exe 3184 powershell.exe 4160 powershell.exe 4160 powershell.exe 2436 powershell.exe 2436 powershell.exe 3152 injector.exe 3152 injector.exe 3152 injector.exe 3152 injector.exe 3152 injector.exe 3152 injector.exe 3152 injector.exe 3152 injector.exe 3552 csrss.exe 3552 csrss.exe 3152 injector.exe 3152 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4416 powershell.exe Token: SeDebugPrivilege 4384 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Token: SeImpersonatePrivilege 4384 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe Token: SeDebugPrivilege 2436 powershell.exe Token: SeDebugPrivilege 2236 powershell.exe Token: SeDebugPrivilege 4776 powershell.exe Token: SeDebugPrivilege 3184 powershell.exe Token: SeDebugPrivilege 4160 powershell.exe Token: SeDebugPrivilege 2436 powershell.exe Token: SeSystemEnvironmentPrivilege 3552 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4384 wrote to memory of 4416 4384 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 89 PID 4384 wrote to memory of 4416 4384 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 89 PID 4384 wrote to memory of 4416 4384 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 89 PID 2208 wrote to memory of 2436 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 104 PID 2208 wrote to memory of 2436 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 104 PID 2208 wrote to memory of 2436 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 104 PID 2208 wrote to memory of 3232 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 105 PID 2208 wrote to memory of 3232 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 105 PID 3232 wrote to memory of 2956 3232 cmd.exe 107 PID 3232 wrote to memory of 2956 3232 cmd.exe 107 PID 2208 wrote to memory of 2236 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 108 PID 2208 wrote to memory of 2236 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 108 PID 2208 wrote to memory of 2236 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 108 PID 2208 wrote to memory of 4776 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 110 PID 2208 wrote to memory of 4776 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 110 PID 2208 wrote to memory of 4776 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 110 PID 2208 wrote to memory of 3552 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 112 PID 2208 wrote to memory of 3552 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 112 PID 2208 wrote to memory of 3552 2208 f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe 112 PID 3552 wrote to memory of 3184 3552 csrss.exe 113 PID 3552 wrote to memory of 3184 3552 csrss.exe 113 PID 3552 wrote to memory of 3184 3552 csrss.exe 113 PID 3552 wrote to memory of 4160 3552 csrss.exe 119 PID 3552 wrote to memory of 4160 3552 csrss.exe 119 PID 3552 wrote to memory of 4160 3552 csrss.exe 119 PID 3552 wrote to memory of 2436 3552 csrss.exe 121 PID 3552 wrote to memory of 2436 3552 csrss.exe 121 PID 3552 wrote to memory of 2436 3552 csrss.exe 121 PID 3552 wrote to memory of 3152 3552 csrss.exe 123 PID 3552 wrote to memory of 3152 3552 csrss.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe"C:\Users\Admin\AppData\Local\Temp\f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe"C:\Users\Admin\AppData\Local\Temp\f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2956
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:712
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3244
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 9322⤵
- Program crash
PID:2032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4384 -ip 43841⤵PID:800
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5666dc646c07ecafe51e46f7a75244fc9
SHA1bdf6a56c47cfa5d768ce594d3603f99a4ae4e15c
SHA256e60cffdb07126df22f10763aa629c5b5439048c0431f730251b14108e43c2da1
SHA512b7db01c6543ec83da6d734cf7bd46fc68d6bc65da0fb5b6f4660b97599b7181cab03ab471d06a2235721a7d139c92f298d66b4714f537d0bfb86c3970d1750d5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50d9978c706f3b811d5b0153092bda3eb
SHA154eacb9114c81e03b743ce0a771aefca4337bf80
SHA2565c4cdc1c8d3da7ddc76caf728381778302f5bdefc9e9798098598f3ad8039909
SHA5127be055d7bccdd93746686b7da68697ae23ae6692e85898b9979532dd503dd05dd0cd642bd8f00e6dcb1530be4f376f670e6c3907302090d018fc7f28233b61ad
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55751edf02d58509458e286c51105e69b
SHA1c133e92be7784a7382a9f63c1482fe3819b79214
SHA256570be4a9b544791978774dd9b30b510b32ae3773ff1ab7ac18bb55f282e5c929
SHA5127221d616e9aa8ce5e86cff6803083998aba1b9704fc46e988bb018d006032269fc6aac97821f13230c5c583cdcf3a3bbb53b2980ad67f6716ba36d64b947431f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a33be40484624310e9780a67f5bdeec9
SHA130237c71b2e3e93b8bcb0e035b73671da7f6d204
SHA256c38ef1e25d8552b6d289967f527bde73171bb04c2bf5b13126a5d319235d09da
SHA5120a11c0bf0ca65ba919098123f20747b9cceb5b7db48e4e496585692a3f7eb800c12e38f60d944fbf72b8cab7d5a3aa61c65b5f07634cbb48a69d8fd9edfd9b66
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54f3f02593b170b34b4f163c638f6f461
SHA1e4828079683702a0601f5cc6be58964899980d02
SHA2568c7d927af5461d08dc4ebd1cfbb0594b50624ce80e7ceba15284a24fd6072746
SHA512443bbbe7762fc0ec9497930ef0e4ac342109ca4c3f25e71fef970325e770ab77988254489399a4fae12074fbb6d7bcbe381bb39802c48b7109b913ba51a32432
-
Filesize
4.2MB
MD5a4bb95cc61ad5a37da54169ec66f17fb
SHA1227e04c991b1bf3dcd57de103bc915acb895522b
SHA256f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9
SHA51270e391e69d00dbbf858f0a540673a163edf29f481eb3510ee0885fc72e2f1514d5847bf5ad1e88b9a025ba2360dfabe01fbe86aefa4a2ef3271ed2fab027b009
-
Filesize
4.2MB
MD5a4bb95cc61ad5a37da54169ec66f17fb
SHA1227e04c991b1bf3dcd57de103bc915acb895522b
SHA256f198a48a9072efdb744470605488f3a51c1adfe7f5518a711417b223b6ce12d9
SHA51270e391e69d00dbbf858f0a540673a163edf29f481eb3510ee0885fc72e2f1514d5847bf5ad1e88b9a025ba2360dfabe01fbe86aefa4a2ef3271ed2fab027b009