Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
11/12/2023, 06:05
Static task
static1
General
-
Target
33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe
-
Size
4.1MB
-
MD5
753076862fe5c7c6562d8d05294ffa38
-
SHA1
be7912a98369f5112673c7d4483bb4076bf98672
-
SHA256
33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1
-
SHA512
3d7aadfd1174b61f8036c9e8850dd02f9abdc62a4ab1c30146c7b180bd08e6a3669524cd0af9894787b0784588b65115415cd7fd35fc367fb63df0f5e59110cc
-
SSDEEP
98304:ll9nNIgoPgwqwGR3K4wL60PYRYeR8RDSIl0cGZhh/HAYob:7jfp3vyPY+eR8hxl6/gYk
Malware Config
Signatures
-
Glupteba payload 22 IoCs
resource yara_rule behavioral1/memory/624-2-0x0000000002EB0000-0x000000000379B000-memory.dmp family_glupteba behavioral1/memory/624-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/624-73-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/624-301-0x0000000002EB0000-0x000000000379B000-memory.dmp family_glupteba behavioral1/memory/624-304-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4516-307-0x0000000002D70000-0x000000000365B000-memory.dmp family_glupteba behavioral1/memory/4516-308-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4516-546-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4516-585-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4516-695-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4516-1043-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4516-1054-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-1058-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-1306-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-1582-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-1808-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-1817-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-1819-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-1821-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-1823-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-1825-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-1827-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3384 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2160 csrss.exe 4460 injector.exe 4696 windefender.exe 2064 windefender.exe -
resource yara_rule behavioral1/files/0x000700000001abb3-1811.dat upx behavioral1/memory/4696-1816-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2064-1818-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2064-1822-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe = "0" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2184424523-918736138-622003966-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2184424523-918736138-622003966-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe File created C:\Windows\rss\csrss.exe 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4244 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4712 schtasks.exe 1316 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-51 = "Greenland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 200 powershell.exe 200 powershell.exe 200 powershell.exe 624 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 624 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 628 powershell.exe 628 powershell.exe 628 powershell.exe 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 3052 powershell.exe 3052 powershell.exe 3052 powershell.exe 1380 powershell.exe 1380 powershell.exe 1380 powershell.exe 452 powershell.exe 452 powershell.exe 452 powershell.exe 4436 powershell.exe 4436 powershell.exe 4436 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 2160 csrss.exe 2160 csrss.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 2160 csrss.exe 2160 csrss.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 2160 csrss.exe 2160 csrss.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe 4460 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 200 powershell.exe Token: SeDebugPrivilege 624 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Token: SeImpersonatePrivilege 624 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe Token: SeDebugPrivilege 628 powershell.exe Token: SeDebugPrivilege 3052 powershell.exe Token: SeDebugPrivilege 1380 powershell.exe Token: SeDebugPrivilege 452 powershell.exe Token: SeDebugPrivilege 4436 powershell.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeSystemEnvironmentPrivilege 2160 csrss.exe Token: SeSecurityPrivilege 4244 sc.exe Token: SeSecurityPrivilege 4244 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 624 wrote to memory of 200 624 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 72 PID 624 wrote to memory of 200 624 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 72 PID 624 wrote to memory of 200 624 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 72 PID 4516 wrote to memory of 628 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 77 PID 4516 wrote to memory of 628 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 77 PID 4516 wrote to memory of 628 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 77 PID 4516 wrote to memory of 4596 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 79 PID 4516 wrote to memory of 4596 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 79 PID 4596 wrote to memory of 3384 4596 cmd.exe 81 PID 4596 wrote to memory of 3384 4596 cmd.exe 81 PID 4516 wrote to memory of 3052 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 82 PID 4516 wrote to memory of 3052 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 82 PID 4516 wrote to memory of 3052 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 82 PID 4516 wrote to memory of 1380 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 84 PID 4516 wrote to memory of 1380 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 84 PID 4516 wrote to memory of 1380 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 84 PID 4516 wrote to memory of 2160 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 86 PID 4516 wrote to memory of 2160 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 86 PID 4516 wrote to memory of 2160 4516 33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe 86 PID 2160 wrote to memory of 452 2160 csrss.exe 87 PID 2160 wrote to memory of 452 2160 csrss.exe 87 PID 2160 wrote to memory of 452 2160 csrss.exe 87 PID 2160 wrote to memory of 4436 2160 csrss.exe 94 PID 2160 wrote to memory of 4436 2160 csrss.exe 94 PID 2160 wrote to memory of 4436 2160 csrss.exe 94 PID 2160 wrote to memory of 4640 2160 csrss.exe 96 PID 2160 wrote to memory of 4640 2160 csrss.exe 96 PID 2160 wrote to memory of 4640 2160 csrss.exe 96 PID 2160 wrote to memory of 4460 2160 csrss.exe 98 PID 2160 wrote to memory of 4460 2160 csrss.exe 98 PID 4696 wrote to memory of 4972 4696 windefender.exe 105 PID 4696 wrote to memory of 4972 4696 windefender.exe 105 PID 4696 wrote to memory of 4972 4696 windefender.exe 105 PID 4972 wrote to memory of 4244 4972 cmd.exe 106 PID 4972 wrote to memory of 4244 4972 cmd.exe 106 PID 4972 wrote to memory of 4244 4972 cmd.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe"C:\Users\Admin\AppData\Local\Temp\33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:200
-
-
C:\Users\Admin\AppData\Local\Temp\33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe"C:\Users\Admin\AppData\Local\Temp\33391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:3384
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4712
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1316
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2064
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5f5ca250703eb6e1cf4432e821ab5d47e
SHA13b94c6fd96f836c2b42e3a68be056f26f11f9291
SHA256dcf2407f8ba051cb0b7c0df16ba88901a234008a5fbe94efd0b51136da5dfaad
SHA5121411bd207fb4d7fabe31e6a9568780fd1ccb1f41a851351b7032a3001eeca7e34e8b4e70a98b2803d46581e39b93a4f100dab353dfd22a19d648d7feaed88a0b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD512e9b18d2f675d7bad94fba9545d6205
SHA140260777d9fa5d92de57ca8cc621a5cb3062fc28
SHA256a806bcbc6a5e36716249e62402f0c8a7cce819394996aeca3d321ddb679f50c9
SHA5129bfa1420390a87de8a97a3268ccfee2eb5c99cc91aaf770518ebdbfb54233aedb520fc3db11f486e631aa77f9261f6620115f2a5a0a49545e3ee3dd2404c2a48
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a21bc1cf327ffde6f456dc62f78765bb
SHA1825af481fa87811a7bcd260c9a3c80aafcb1e13e
SHA256cc1bd1372ba53a796b2412f786a222f7932767cd72be2854d2caa37d9235639c
SHA5125171c7cf44d27c7d23e5f27446182e61f0106acdad4539e60197cc251fed612882fbf3b2f31024136e60ea39bc9de47bfb7200112c383b0e0b108475769037a6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5ddcb57011f89673d46a0cf0c863e97c5
SHA12c788dcf8bba16725d5267b04947422769206f19
SHA25622c60ed7162377ea008ab60abcbb05f88b9245da70fb0e5e7a19835c621c56a3
SHA512f532235cf8f11bfb731335a68c6690e6d079b796dd69fc5c3c326e888d6ac2d75319b46fd2355e628ceb80aca4b9846c62ee8b697d76876db1620416886f3b40
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5c5025319530f3de8d920256980c911f2
SHA170c2046f5ef652b8485e550a3c1f9be1c2e4ef09
SHA25693ac3a219bfbee776e8b8e04cb2e71622df73ad6ee75f6506cf80dd89b0b7106
SHA51218dff4c6359686a4a5a1f2ee2fb108a8d7dba9562d829ef344376a57f6f1c41fa7ecb597b24fb835e9d0b33fc8c3a346da94b12f95e8ab3396d9a1df74dc5232
-
Filesize
4.1MB
MD5753076862fe5c7c6562d8d05294ffa38
SHA1be7912a98369f5112673c7d4483bb4076bf98672
SHA25633391dad088c21fb3643d836f070c26a3db1088c309fec4a6745bdc8f8c996e1
SHA5123d7aadfd1174b61f8036c9e8850dd02f9abdc62a4ab1c30146c7b180bd08e6a3669524cd0af9894787b0784588b65115415cd7fd35fc367fb63df0f5e59110cc
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec