Analysis
-
max time kernel
132s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 13:08
Static task
static1
Behavioral task
behavioral1
Sample
643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe
Resource
win10v2004-20230915-en
General
-
Target
643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe
-
Size
4.1MB
-
MD5
a6379db5b1abbfe8594cca160feceb45
-
SHA1
24d379bb6367f0ed2af47cbf0466c87fa5971955
-
SHA256
643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad
-
SHA512
68e7628412fa0f5f25787d821d343345e05229687dbf01abd9cb8f17fc65b03014acd5b5a45414d54a25094d19c08ebc3da3b8fe0089b2c9639a72f5a5436082
-
SSDEEP
98304:vlhp/+MAY8LSBetbsJnYPJay0ram2uVyHV/vsKO4IVa8TY/jpHwrQ:vlT/+M2+BeVsJYPms9vsd3Va8M/jpZ
Malware Config
Signatures
-
Glupteba payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/5072-2-0x00000000051B0000-0x0000000005A9B000-memory.dmp family_glupteba behavioral1/memory/5072-3-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/5072-4-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/5072-6-0x00000000051B0000-0x0000000005A9B000-memory.dmp family_glupteba behavioral1/memory/5072-7-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/5072-36-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/5072-58-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/4964-70-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/5072-84-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/4964-100-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/4964-109-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/4964-111-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/4964-168-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/4964-176-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/3144-270-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba behavioral1/memory/3144-277-0x0000000000400000-0x0000000002FB8000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Executes dropped EXE 1 IoCs
Processes:
csrss.exepid process 3144 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe -
Drops file in System32 directory 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe -
Drops file in Windows directory 2 IoCs
Processes:
643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exedescription ioc process File opened for modification C:\Windows\rss 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe File created C:\Windows\rss\csrss.exe 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4328 schtasks.exe 2588 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
powershell.exe643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exepowershell.exe643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exepowershell.exepowershell.exepowershell.exepid process 4164 powershell.exe 4164 powershell.exe 5072 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 5072 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 3372 powershell.exe 3372 powershell.exe 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe 3728 powershell.exe 3728 powershell.exe 768 powershell.exe 768 powershell.exe 5036 powershell.exe 5036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exe643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4164 powershell.exe Token: SeDebugPrivilege 5072 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Token: SeImpersonatePrivilege 5072 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe Token: SeDebugPrivilege 3372 powershell.exe Token: SeDebugPrivilege 3728 powershell.exe Token: SeDebugPrivilege 768 powershell.exe Token: SeDebugPrivilege 5036 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.execmd.execsrss.exedescription pid process target process PID 5072 wrote to memory of 4164 5072 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 5072 wrote to memory of 4164 5072 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 5072 wrote to memory of 4164 5072 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 4964 wrote to memory of 3372 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 4964 wrote to memory of 3372 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 4964 wrote to memory of 3372 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 4964 wrote to memory of 3512 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe cmd.exe PID 4964 wrote to memory of 3512 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe cmd.exe PID 3512 wrote to memory of 1896 3512 cmd.exe netsh.exe PID 3512 wrote to memory of 1896 3512 cmd.exe netsh.exe PID 4964 wrote to memory of 3728 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 4964 wrote to memory of 3728 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 4964 wrote to memory of 3728 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 4964 wrote to memory of 768 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 4964 wrote to memory of 768 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 4964 wrote to memory of 768 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe powershell.exe PID 4964 wrote to memory of 3144 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe csrss.exe PID 4964 wrote to memory of 3144 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe csrss.exe PID 4964 wrote to memory of 3144 4964 643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe csrss.exe PID 3144 wrote to memory of 5036 3144 csrss.exe powershell.exe PID 3144 wrote to memory of 5036 3144 csrss.exe powershell.exe PID 3144 wrote to memory of 5036 3144 csrss.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe"C:\Users\Admin\AppData\Local\Temp\643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe"C:\Users\Admin\AppData\Local\Temp\643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1896
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4328
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:760
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1096
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:3148
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b8e26f0ff4c06add5421f38dced7f138
SHA16d32b5ad7a40f27886278cde6f1726c8cce73e33
SHA2568c042e9dd41e1f0c4bf67185e103df8f15f62efa243eed8a36ec883bd6bf0f94
SHA512346c663909bd256c3e8a705e6b2d47795010a21e8fc4da8cc7327d533a4457109e029c35d0fbfb2ecc1f3140e6d9c90379415042244a50a66c16ace656c98d11
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ee1a6745187009e5fc3f7a2f13edb5c3
SHA1a2442c645b99d337074574732e2b2e410ee635c2
SHA2565a443a2024c1ca2159c59e2bf9c544d06015daa1b5ff5e244a94846ae3cad667
SHA51293620f6c95cf2285beb7372c9463eb523a56da76e33317903a10f58f07e1b300d79fd204e219799098b24fd1605dd913a13b7e572a13c88e4bf3654e2d569a7b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54b9f598afea3c11e25c05a93c40d60b3
SHA161199d23ecb10c42c26d92cf0aaca60d75fdbeaa
SHA256c43dab770365ff891930f0263b66429a682f6d53844b78dc8d2e8ac688c03fb1
SHA51202b1c39d8514d83eb8d203e7010d85052a0ed405ffd09f00dd22e089dc2bd15c11bb0829fd1306e9c5a3ad16a109b8995fcc052f2df8330b65770dea6ccf87e1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5dbb658bd11df1a801f03147a23cfdb92
SHA19798dbc93c0eff1d1696fcb3e2865fd8b2a8c9d9
SHA25694deba59133fdd505ea460db07cda830beeefff543ae5c6961247a8f5cd6d154
SHA512a8fec069e5e9549b3aa008ce8cb93caf75cdac7de098590444350bb3e7d824417dcc5a737e47795bee3722f1244f659ef9bb28f118da27593ba8ae0f10422b62
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54637e9f8d54e8e028acf63d7b57bb88a
SHA1d0f20033b42866d86722d9f4c29b71f5727d2584
SHA256cdfd9c2b5a9222ee94684a095ecbb7a666bb6a2ffadf857cfbed6aaff7737ddd
SHA512dd3c7a30c305cea19425e7cdd7f47df3df4dbf94c99495f17efe87b365513bc111f48b88c23166cee43d2c9ea5050a921801a7aa2a23b5b2bc9f02b5be9feba9
-
Filesize
4.1MB
MD5a6379db5b1abbfe8594cca160feceb45
SHA124d379bb6367f0ed2af47cbf0466c87fa5971955
SHA256643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad
SHA51268e7628412fa0f5f25787d821d343345e05229687dbf01abd9cb8f17fc65b03014acd5b5a45414d54a25094d19c08ebc3da3b8fe0089b2c9639a72f5a5436082
-
Filesize
4.1MB
MD5a6379db5b1abbfe8594cca160feceb45
SHA124d379bb6367f0ed2af47cbf0466c87fa5971955
SHA256643b284c28b7f9e8e70bf2a2dd2de872213118b7e027b1fc0d65c401bef227ad
SHA51268e7628412fa0f5f25787d821d343345e05229687dbf01abd9cb8f17fc65b03014acd5b5a45414d54a25094d19c08ebc3da3b8fe0089b2c9639a72f5a5436082