Analysis
-
max time kernel
160s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 01:54
Static task
static1
General
-
Target
4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe
-
Size
5.2MB
-
MD5
3bffffda1e470fede020d005d03929da
-
SHA1
42bffdd24aa6e60b3b0807ff2aa5d321c9e3d9c6
-
SHA256
4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427
-
SHA512
efd5e2fcf4c4f1dd07b3e6fde1394259c549dfc62f6530dda61abab40f7f8316604ee6eacea28407c6add8b3e2c8438b4bff38b598961cd425142685dd382d74
-
SSDEEP
98304:CI4SpjHLG9bNutbyeexd2jqLGAXXdAW6eH65r:vpjHLGBibyeuoD/eHgr
Malware Config
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4840-60-0x0000000003770000-0x00000000038A1000-memory.dmp family_fabookie behavioral2/memory/4840-112-0x0000000003770000-0x00000000038A1000-memory.dmp family_fabookie -
Glupteba payload 22 IoCs
resource yara_rule behavioral2/memory/3360-27-0x0000000002DB0000-0x000000000369B000-memory.dmp family_glupteba behavioral2/memory/3360-28-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3360-61-0x0000000002DB0000-0x000000000369B000-memory.dmp family_glupteba behavioral2/memory/3360-67-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3360-98-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4700-113-0x0000000002F60000-0x000000000384B000-memory.dmp family_glupteba behavioral2/memory/4700-114-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/3360-165-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4700-178-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4700-211-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-294-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-315-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-317-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-319-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-321-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-323-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-325-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-327-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-329-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-331-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-333-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/2012-335-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1668 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe -
Executes dropped EXE 7 IoCs
pid Process 4840 aafg31.exe 2440 toolspub2.exe 3360 31839b57a4f11171d6abc8bbc4451ee4.exe 1952 toolspub2.exe 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 2012 csrss.exe 4468 injector.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2440 set thread context of 1952 2440 toolspub2.exe 91 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 648 schtasks.exe 1908 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1812 powershell.exe 1812 powershell.exe 1952 toolspub2.exe 1952 toolspub2.exe 3360 31839b57a4f11171d6abc8bbc4451ee4.exe 3360 31839b57a4f11171d6abc8bbc4451ee4.exe 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 1504 powershell.exe 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 1504 powershell.exe 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found 3168 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3168 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1952 toolspub2.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1812 powershell.exe Token: SeDebugPrivilege 3360 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeImpersonatePrivilege 3360 31839b57a4f11171d6abc8bbc4451ee4.exe Token: SeDebugPrivilege 1504 powershell.exe Token: SeShutdownPrivilege 3168 Process not Found Token: SeCreatePagefilePrivilege 3168 Process not Found Token: SeShutdownPrivilege 3168 Process not Found Token: SeCreatePagefilePrivilege 3168 Process not Found Token: SeDebugPrivilege 4444 powershell.exe Token: SeShutdownPrivilege 3168 Process not Found Token: SeCreatePagefilePrivilege 3168 Process not Found Token: SeDebugPrivilege 3996 powershell.exe Token: SeShutdownPrivilege 3168 Process not Found Token: SeCreatePagefilePrivilege 3168 Process not Found Token: SeDebugPrivilege 672 powershell.exe Token: SeShutdownPrivilege 3168 Process not Found Token: SeCreatePagefilePrivilege 3168 Process not Found Token: SeDebugPrivilege 3608 powershell.exe Token: SeShutdownPrivilege 3168 Process not Found Token: SeCreatePagefilePrivilege 3168 Process not Found Token: SeDebugPrivilege 520 powershell.exe Token: SeShutdownPrivilege 3168 Process not Found Token: SeCreatePagefilePrivilege 3168 Process not Found Token: SeSystemEnvironmentPrivilege 2012 csrss.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3168 Process not Found -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 880 wrote to memory of 4840 880 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe 82 PID 880 wrote to memory of 4840 880 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe 82 PID 880 wrote to memory of 2440 880 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe 83 PID 880 wrote to memory of 2440 880 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe 83 PID 880 wrote to memory of 2440 880 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe 83 PID 880 wrote to memory of 3360 880 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe 84 PID 880 wrote to memory of 3360 880 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe 84 PID 880 wrote to memory of 3360 880 4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe 84 PID 3360 wrote to memory of 1812 3360 31839b57a4f11171d6abc8bbc4451ee4.exe 87 PID 3360 wrote to memory of 1812 3360 31839b57a4f11171d6abc8bbc4451ee4.exe 87 PID 3360 wrote to memory of 1812 3360 31839b57a4f11171d6abc8bbc4451ee4.exe 87 PID 2440 wrote to memory of 1952 2440 toolspub2.exe 91 PID 2440 wrote to memory of 1952 2440 toolspub2.exe 91 PID 2440 wrote to memory of 1952 2440 toolspub2.exe 91 PID 2440 wrote to memory of 1952 2440 toolspub2.exe 91 PID 2440 wrote to memory of 1952 2440 toolspub2.exe 91 PID 2440 wrote to memory of 1952 2440 toolspub2.exe 91 PID 4700 wrote to memory of 1504 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 97 PID 4700 wrote to memory of 1504 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 97 PID 4700 wrote to memory of 1504 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 97 PID 4700 wrote to memory of 3988 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 100 PID 4700 wrote to memory of 3988 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 100 PID 3988 wrote to memory of 1668 3988 cmd.exe 102 PID 3988 wrote to memory of 1668 3988 cmd.exe 102 PID 4700 wrote to memory of 4444 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 104 PID 4700 wrote to memory of 4444 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 104 PID 4700 wrote to memory of 4444 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 104 PID 4700 wrote to memory of 3996 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 106 PID 4700 wrote to memory of 3996 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 106 PID 4700 wrote to memory of 3996 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 106 PID 4700 wrote to memory of 2012 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 108 PID 4700 wrote to memory of 2012 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 108 PID 4700 wrote to memory of 2012 4700 31839b57a4f11171d6abc8bbc4451ee4.exe 108 PID 2012 wrote to memory of 672 2012 csrss.exe 109 PID 2012 wrote to memory of 672 2012 csrss.exe 109 PID 2012 wrote to memory of 672 2012 csrss.exe 109 PID 2012 wrote to memory of 3608 2012 csrss.exe 114 PID 2012 wrote to memory of 3608 2012 csrss.exe 114 PID 2012 wrote to memory of 3608 2012 csrss.exe 114 PID 2012 wrote to memory of 520 2012 csrss.exe 117 PID 2012 wrote to memory of 520 2012 csrss.exe 117 PID 2012 wrote to memory of 520 2012 csrss.exe 117 PID 2012 wrote to memory of 4468 2012 csrss.exe 119 PID 2012 wrote to memory of 4468 2012 csrss.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe"C:\Users\Admin\AppData\Local\Temp\4c4e0c61380662adc756d147f9c51ead1d3a6913f49510eae2766270b778f427.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\aafg31.exe"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"2⤵
- Executes dropped EXE
PID:4840
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1952
-
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:1668
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:4388
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:4468
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1908
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
860KB
MD57d1513a2e30fbdd54baedf5fcb0e143d
SHA1cd455a669076044d8449015387aecd98aff79eb9
SHA25607ec937d9091de355c0b2c788a70e8897ce75ebc162e78d92c94de5147d5022d
SHA5125ef4e7c4581744af686e346342480c8bc9e4e0bb8e5143e66649a514781a91cac6f81d7946d88b8182fcc33c9af01a019b9901cc4610ffeb76ca0d031a3118fa
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
Filesize
190KB
MD5a137245d8bc8109c4bc3df6e2b37d327
SHA1ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA5125d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b33b727699c3b0bf743774202b9772ad
SHA154321eb6608f4bad1d9fd96914d0312530aa5394
SHA25655b3bd429be02a19739177bc62c3916417c99ad831d11d70947d3f701125eb1c
SHA51263810853c6ccb590343ed80abd4bcd2085cf09f6545db231cc07843ba989aff24fee2f4b1592c624f41dce6d531f97c83a86807b078bb60c0c2d2524214964f9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD554dc0f4818fd6812bcbc662771907e16
SHA156a61b601143ad049f5b5c2ece322097ead8f404
SHA256cf5ddb1a50973245060f22b4515f70959d0bf035f5ad1b4607180d0470a9c640
SHA512cf66208bc95544eee85180146518fda67e4ed1431dcfac107940495f128b1705316c78624c8cd4b688b36d8d8c9e9ce17486234f40c8bcd04452a33e74c66ff0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53fd7ad564ec3a75ba465c72389959043
SHA145d3bf380e971e8ac6e3a35b8f40a06453c3d97b
SHA2567a22d00c92fdb901b9d9277fb17af842bda261ae9a98404d1ae44e1c98dea05e
SHA5123004073679ee3924db77aa4fb3271ee4a9ffa117b18f589e591b32f0464435d1e1dfe6590ece2735831ec6d7b9e968adc798bcf9b7e290067484043f051a6777
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e1822d2ff1c79e22944265c735307d86
SHA19ca5720379ba66a0ff237b982e5054a3d641c8b8
SHA256e018fb88010b037818b1e743cdcf93fd38cf07ea84aee079bc459cc44680ca9d
SHA5124a5d42b37c50f1b977670b08b4da3bfefea8d62eaa802037f7b62a0f51ac592d1a41eb73063394b520f109ce6b7e35cbdecc63c7db59dcea15aca542f1a2ac64
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a43eaea617eff6e94c2b7317428612e7
SHA1f14cd95f9a9c6744e3a38aaa1662eb623d3f0908
SHA256a378cf78facb643456d69c74af1dba83edc26056e7d6561d5b52381e0e90f205
SHA512ae137ec9b289553558dc3ceb0e896be60b06aab05dd6a5d943b92c95f0c9b24378a15f31df4fd9b613f80a5b5fb270aaeb1b42f8d146c6c0b21300c5d1058d65
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80
-
Filesize
4.2MB
MD5b481ad9378b2cdaacf6ca532cf681672
SHA17de35d7b0495dbb9f05b142bcd592a8fc84cc8ef
SHA25623dfda2b393522bd4fc0e55476ae221479ce487425aa2eba172ab0aa35c68551
SHA512c8836ba50b9ee7725d207ad81ab140b1491cdc22273b7ff24f2dcf302af690a7285dfff8fde1ba6e37b0d60d05dacbbdd8de357d43f607b5ebd83640a8d79d80