Analysis
-
max time kernel
155s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 21:05
Static task
static1
General
-
Target
8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe
-
Size
4.1MB
-
MD5
40ec068d634041e8b5147b6f53660280
-
SHA1
91bef547550e7c170acfbdc82b3eb697d9edcf6b
-
SHA256
8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9
-
SHA512
1531017f49693138e6973b3561ceae0dfcdfe5ec1f73df96028720fb888eb7ad3133490927f73e5dc772bd488a80001095ee0f41287e4104cad3c282bdb39031
-
SSDEEP
98304:t+y11xVaNS4L/TrpL65fuCbh9zp4wSpOL2zCwTSYgUegPrjqR:tXbVaNSc/pL68Wh9t71C3xbeerg
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral1/memory/2796-2-0x0000000002F60000-0x000000000384B000-memory.dmp family_glupteba behavioral1/memory/2796-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2796-4-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2796-8-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2796-12-0x0000000002F60000-0x000000000384B000-memory.dmp family_glupteba behavioral1/memory/2796-37-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2796-56-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2796-66-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2968-68-0x0000000002AB0000-0x0000000002EB2000-memory.dmp family_glupteba behavioral1/memory/2968-69-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2968-70-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2968-104-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2968-111-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2968-134-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2968-168-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4440-173-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4440-236-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4012 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 4440 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe File created C:\Windows\rss\csrss.exe 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1628 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3896 powershell.exe 3896 powershell.exe 3896 powershell.exe 2796 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2796 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 1180 powershell.exe 1180 powershell.exe 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 2064 powershell.exe 2064 powershell.exe 1132 powershell.exe 1132 powershell.exe 3896 powershell.exe 3896 powershell.exe 3352 powershell.exe 3352 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3896 powershell.exe Token: SeDebugPrivilege 2796 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Token: SeImpersonatePrivilege 2796 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe Token: SeDebugPrivilege 1180 powershell.exe Token: SeDebugPrivilege 2064 powershell.exe Token: SeDebugPrivilege 1132 powershell.exe Token: SeDebugPrivilege 3896 powershell.exe Token: SeDebugPrivilege 3352 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3896 2796 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 94 PID 2796 wrote to memory of 3896 2796 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 94 PID 2796 wrote to memory of 3896 2796 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 94 PID 2968 wrote to memory of 1180 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 109 PID 2968 wrote to memory of 1180 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 109 PID 2968 wrote to memory of 1180 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 109 PID 2968 wrote to memory of 2836 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 111 PID 2968 wrote to memory of 2836 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 111 PID 2836 wrote to memory of 4012 2836 cmd.exe 113 PID 2836 wrote to memory of 4012 2836 cmd.exe 113 PID 2968 wrote to memory of 2064 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 114 PID 2968 wrote to memory of 2064 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 114 PID 2968 wrote to memory of 2064 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 114 PID 2968 wrote to memory of 1132 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 116 PID 2968 wrote to memory of 1132 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 116 PID 2968 wrote to memory of 1132 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 116 PID 2968 wrote to memory of 4440 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 118 PID 2968 wrote to memory of 4440 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 118 PID 2968 wrote to memory of 4440 2968 8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe 118 PID 4440 wrote to memory of 3896 4440 csrss.exe 119 PID 4440 wrote to memory of 3896 4440 csrss.exe 119 PID 4440 wrote to memory of 3896 4440 csrss.exe 119 PID 4440 wrote to memory of 3352 4440 csrss.exe 123 PID 4440 wrote to memory of 3352 4440 csrss.exe 123 PID 4440 wrote to memory of 3352 4440 csrss.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe"C:\Users\Admin\AppData\Local\Temp\8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe"C:\Users\Admin\AppData\Local\Temp\8134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4012
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1628
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3472
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ba954d997a86271070f480faff51adcb
SHA129641fdf3c219a1e2c2bb329c575656ca21a270e
SHA256767c3f58577c9627af32646a8812e5381a4e46906cd2305801e5c1139660d7c5
SHA512634fbcb98e08ef38faf0bae7f711fe4235603d366f45ea9a916915c63efe18c4d97183e7a30d0f63978f0f3f400f2dddd9a1beb17a2483f3a476d0c28ce5b8ae
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57319f864e60ec9d248026dba2f065b42
SHA171984e3593fbc4e68ecea43310568f5fa976b77e
SHA256783d211b0437ac6fe85a7c4f3dc83b7374d55a8e653a1932b8fe79f56125fa30
SHA512a7617432d9fa3c284a30ff463f00c8c606d5258f3363a51d97905baa972a6f17fb801acfd9ae56b93c8613fbdf861dda054d2cf695eff5c071d37fb8c37b92e6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a6b9d97e9d86b2f5864add0b0329e0b0
SHA190586f15129c00dad682475141a85442b59c31f1
SHA256657d06ac109478a8503465802a8fa73e79a70472ff2bdc6462bd091aed7622f1
SHA5128ad8bc4dfa309fe1bfea48af4b85e98ab91de5e4b53a24ba0b826fd2f357a3855c83737873a0e81951c3a1773ffa1c554de86a491985b0b23e70dc55e1cb21e9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a01068f51ef8eb3816264bc92d1c35d7
SHA1d5dfc47dc8efe9b229aa462acb4940b8da6e06df
SHA2565063e1d1a2d02e2d77c64accaf274cdbdb3bab798241b32b98a04a4d970cc24f
SHA5129986256ba65eaf1a81e017afc493fa01221e69f4e2b02b2c01d05dd1662a2eb5cec91eadae5637edf8a98abfeab0db0bf6fa509d8a2051b461b023ef1eafa397
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5df38867390dc654ee79b4a52ab806a9e
SHA14a7bba455ecce4f6e981049b5c6e4277a1619de7
SHA256b675e1d6b33cc58f9963905ba89396510cfedb578af7dc4a24d7da080cab9070
SHA51280745ea1a3e94422aa12c9c8c479f7d761c447976b04801d2222ad1c6d8175814f7f987b03df9a82fccc553dad7bb1ae3c2fb709acb83d2d04c1277f23532b70
-
Filesize
4.1MB
MD540ec068d634041e8b5147b6f53660280
SHA191bef547550e7c170acfbdc82b3eb697d9edcf6b
SHA2568134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9
SHA5121531017f49693138e6973b3561ceae0dfcdfe5ec1f73df96028720fb888eb7ad3133490927f73e5dc772bd488a80001095ee0f41287e4104cad3c282bdb39031
-
Filesize
4.1MB
MD540ec068d634041e8b5147b6f53660280
SHA191bef547550e7c170acfbdc82b3eb697d9edcf6b
SHA2568134b0333c22f064b6110fccc801f45f43e4288a41c5c24d3a8e494f3023f0b9
SHA5121531017f49693138e6973b3561ceae0dfcdfe5ec1f73df96028720fb888eb7ad3133490927f73e5dc772bd488a80001095ee0f41287e4104cad3c282bdb39031