Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 23:16
Static task
static1
Behavioral task
behavioral1
Sample
2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe
Resource
win10v2004-20230915-en
General
-
Target
2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe
-
Size
4.1MB
-
MD5
031b4d2659fa92a04249a4513ffc1d1b
-
SHA1
ba5ccb1864470a9573aca1f533c728efcbb5bb87
-
SHA256
2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62
-
SHA512
b3a4176112bf03cd1b65f0ddef303e6e57f41ac7eb60c8a3c52bfb4b776b3426f876cd330755b4471c92cc064dc72aa4d6822730e0b43dee264f49ef4b0d4bd2
-
SSDEEP
98304:U5qyAnXOoBR//m7epn51mD1K7jeQT824GhH948aWJv3yoUKrey9:q6nbRG7e55oDM3eQT8mhd4qvCO
Malware Config
Signatures
-
Glupteba payload 15 IoCs
resource yara_rule behavioral2/memory/3216-1-0x0000000003050000-0x000000000393B000-memory.dmp family_glupteba behavioral2/memory/3216-2-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3216-3-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3216-8-0x0000000003050000-0x000000000393B000-memory.dmp family_glupteba behavioral2/memory/3216-9-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3216-37-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3216-40-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3216-68-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4848-71-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3216-72-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4848-100-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4848-110-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4848-142-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4848-175-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3188-205-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4364 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 3188 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe File created C:\Windows\rss\csrss.exe 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1852 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1052 powershell.exe 1052 powershell.exe 3216 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 3216 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 5008 powershell.exe 5008 powershell.exe 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 4640 powershell.exe 4640 powershell.exe 4820 powershell.exe 4820 powershell.exe 3456 powershell.exe 3456 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1052 powershell.exe Token: SeDebugPrivilege 3216 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Token: SeImpersonatePrivilege 3216 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe Token: SeDebugPrivilege 5008 powershell.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeDebugPrivilege 4820 powershell.exe Token: SeDebugPrivilege 3456 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3216 wrote to memory of 1052 3216 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 89 PID 3216 wrote to memory of 1052 3216 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 89 PID 3216 wrote to memory of 1052 3216 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 89 PID 4848 wrote to memory of 5008 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 102 PID 4848 wrote to memory of 5008 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 102 PID 4848 wrote to memory of 5008 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 102 PID 4848 wrote to memory of 3272 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 105 PID 4848 wrote to memory of 3272 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 105 PID 3272 wrote to memory of 4364 3272 cmd.exe 107 PID 3272 wrote to memory of 4364 3272 cmd.exe 107 PID 4848 wrote to memory of 4640 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 108 PID 4848 wrote to memory of 4640 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 108 PID 4848 wrote to memory of 4640 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 108 PID 4848 wrote to memory of 4820 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 111 PID 4848 wrote to memory of 4820 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 111 PID 4848 wrote to memory of 4820 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 111 PID 4848 wrote to memory of 3188 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 113 PID 4848 wrote to memory of 3188 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 113 PID 4848 wrote to memory of 3188 4848 2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe 113 PID 3188 wrote to memory of 3456 3188 csrss.exe 115 PID 3188 wrote to memory of 3456 3188 csrss.exe 115 PID 3188 wrote to memory of 3456 3188 csrss.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe"C:\Users\Admin\AppData\Local\Temp\2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe"C:\Users\Admin\AppData\Local\Temp\2b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4364
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1852
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:2144
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54df106a38d77cd233bd2bdb123979bd8
SHA11c606203b3e62ae8addc1a756839ef9ad382e9aa
SHA2562081c3da9a759d997869bbbbd65d224675c3f4d68e9b4355c90ad9c0587a2a40
SHA51287749ebc6d02a6b80d336561dfbd223f18114e7819d8c63c5749700621700ad1847c4b74ad570bd15848529ae3975da4c59a96c0b4b05933fb8c1b70fedfd48a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5644d022983888ca9ac178e87f93baf58
SHA1c683f1cc0dc7adf3129e4b6aae6f44d3a1b9b2f9
SHA256bf6aad1fcf735670249c7c1bb6eda2f7cb0f2c624e9ab5f43926f4401ce1dbce
SHA51232c6fabd2b1b6db82f6d40152948f3dfbfa4cf6c561c926037c06a6eadcfdb464eb9e63a4e08ac8b97967ebf90e896486dd32ab77ea45a5d2b0847b859e75fd8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e5126cc7f4f1016c69d9c21494186d23
SHA1ae9ff5063491a10e3be642cab2ae45bfd58979c4
SHA2568a68fcd09e104e8f605230c3cf7b30224146d5fbd7d21b884b1a344d8e45cff2
SHA512b67681c5e6b27d8d83e9cfe1016e9310ad04c8573abf2900760fbcc0c24f247185d7b164fcae7cbbb14ab11704acd5a5ae349fb90c8f571b686d3890128cdd69
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a379f0ae94dae532b0350daf6e177544
SHA1396ae9c854773f400f0cab41d83eb9e9f3054299
SHA256cdd8dcc10964a002b60db39be4a24a57674a5bbfc132768b535d8d7934bd97e8
SHA512502e4539d7959db29812515fb5b79baadf3d8ca47574970404870011b4bb48f405ac86af0d1c71ed25074da3ce424bd4725a3505bb2584fe1ba9c9783eee0eed
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52387d5e88cdd4595b981031159959830
SHA1203c61637a1ebec6a0e1bf5aedcea493cc0e9a40
SHA256d8e74d26b002456aa2c0b753c4676535bdcb61f1386fbe0123a587411648c045
SHA5121875c3a97de5c6a2c6f954e8824c6aa19ab379b2bbc012edf8cfd8365b9ee3ff394f13b0703f43ad317b7421a95fd1d5f363932d0e603c3cefc9f132d44eb8f9
-
Filesize
4.1MB
MD5031b4d2659fa92a04249a4513ffc1d1b
SHA1ba5ccb1864470a9573aca1f533c728efcbb5bb87
SHA2562b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62
SHA512b3a4176112bf03cd1b65f0ddef303e6e57f41ac7eb60c8a3c52bfb4b776b3426f876cd330755b4471c92cc064dc72aa4d6822730e0b43dee264f49ef4b0d4bd2
-
Filesize
4.1MB
MD5031b4d2659fa92a04249a4513ffc1d1b
SHA1ba5ccb1864470a9573aca1f533c728efcbb5bb87
SHA2562b883c5407da9b939f75229670783435122d59d60260d515401a6398fbe72f62
SHA512b3a4176112bf03cd1b65f0ddef303e6e57f41ac7eb60c8a3c52bfb4b776b3426f876cd330755b4471c92cc064dc72aa4d6822730e0b43dee264f49ef4b0d4bd2