Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20231129-en -
resource tags
arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system -
submitted
12-12-2023 08:00
Static task
static1
General
-
Target
7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe
-
Size
4.2MB
-
MD5
fa2d1fdbac883808e45a30cce7fd9cdb
-
SHA1
0e20074b9748804d726a4b1e4d06ba8741f5dbe8
-
SHA256
7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95
-
SHA512
82fe3d721e3f21c15b46a56d539d846c6b46312b0c7a6c824035a78ff0b4797009dd67787c005f91092b6529980cab8833ec869cb2c3a780df7d9952c0a26d25
-
SSDEEP
98304:P+HPz90i0r5NhFDQ6Nzo46jjSHRUaZfFWAU:PA9ohpToqHRl9zU
Malware Config
Signatures
-
Glupteba payload 21 IoCs
resource yara_rule behavioral1/memory/1072-2-0x0000000002F60000-0x000000000384B000-memory.dmp family_glupteba behavioral1/memory/1072-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1072-300-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1072-301-0x0000000002F60000-0x000000000384B000-memory.dmp family_glupteba behavioral1/memory/1080-304-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1080-820-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1080-1044-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1048-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1293-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1790-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1791-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1792-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1793-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1794-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1795-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1796-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1797-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1798-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1799-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1800-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4200-1801-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4440 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 4200 csrss.exe 2492 injector.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3426238547-133202173-2522127025-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\S-1-5-21-3426238547-133202173-2522127025-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe File created C:\Windows\rss\csrss.exe 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4524 schtasks.exe 2816 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4688 powershell.exe 4688 powershell.exe 4688 powershell.exe 1072 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1072 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1400 powershell.exe 1400 powershell.exe 1400 powershell.exe 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 3024 powershell.exe 3024 powershell.exe 3024 powershell.exe 2212 powershell.exe 2212 powershell.exe 2212 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 4300 powershell.exe 4300 powershell.exe 4300 powershell.exe 4280 powershell.exe 4280 powershell.exe 4280 powershell.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 4200 csrss.exe 4200 csrss.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 4200 csrss.exe 4200 csrss.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe 2492 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 1072 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Token: SeImpersonatePrivilege 1072 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe Token: SeDebugPrivilege 1400 powershell.exe Token: SeDebugPrivilege 3024 powershell.exe Token: SeDebugPrivilege 2212 powershell.exe Token: SeDebugPrivilege 1892 powershell.exe Token: SeDebugPrivilege 4300 powershell.exe Token: SeDebugPrivilege 4280 powershell.exe Token: SeSystemEnvironmentPrivilege 4200 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1072 wrote to memory of 4688 1072 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 76 PID 1072 wrote to memory of 4688 1072 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 76 PID 1072 wrote to memory of 4688 1072 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 76 PID 1080 wrote to memory of 1400 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 81 PID 1080 wrote to memory of 1400 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 81 PID 1080 wrote to memory of 1400 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 81 PID 1080 wrote to memory of 4576 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 84 PID 1080 wrote to memory of 4576 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 84 PID 4576 wrote to memory of 4440 4576 cmd.exe 83 PID 4576 wrote to memory of 4440 4576 cmd.exe 83 PID 1080 wrote to memory of 3024 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 86 PID 1080 wrote to memory of 3024 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 86 PID 1080 wrote to memory of 3024 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 86 PID 1080 wrote to memory of 2212 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 87 PID 1080 wrote to memory of 2212 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 87 PID 1080 wrote to memory of 2212 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 87 PID 1080 wrote to memory of 4200 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 89 PID 1080 wrote to memory of 4200 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 89 PID 1080 wrote to memory of 4200 1080 7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe 89 PID 4200 wrote to memory of 1892 4200 csrss.exe 91 PID 4200 wrote to memory of 1892 4200 csrss.exe 91 PID 4200 wrote to memory of 1892 4200 csrss.exe 91 PID 4200 wrote to memory of 4300 4200 csrss.exe 94 PID 4200 wrote to memory of 4300 4200 csrss.exe 94 PID 4200 wrote to memory of 4300 4200 csrss.exe 94 PID 4200 wrote to memory of 4280 4200 csrss.exe 100 PID 4200 wrote to memory of 4280 4200 csrss.exe 100 PID 4200 wrote to memory of 4280 4200 csrss.exe 100 PID 4200 wrote to memory of 2492 4200 csrss.exe 101 PID 4200 wrote to memory of 2492 4200 csrss.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe"C:\Users\Admin\AppData\Local\Temp\7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Users\Admin\AppData\Local\Temp\7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe"C:\Users\Admin\AppData\Local\Temp\7e84701cffdcf15cd6b2d84229ea5385f411e65d6e76792009c8b3483d0e0a95.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4708
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4524
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2816
-
-
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:4440
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD59d2d5f2e1f21a20d2eb112ac546d01c9
SHA15fd9df97d8f6b13627f07a6772db6a65e41542ec
SHA256df84600fdc64b922374805f9348117f37b478497b515669e2b5ce3f48b3766ad
SHA512163209466daad500e7e8e10f0e0f5a0d1940ae029633bcf784d27a432f40d3b2a7ad3f7d4cf0b52c0a6e89401cefc904803a7d5e3e56f28403ff0497a4bca2fa
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD521763992e006e4f0514e729f5b3a41ad
SHA136f5c954b81fdc1f3d8599888cc7671876bb693d
SHA2564d2a83db4501bb92392c281887e88de5052d06de8e5c0ab817a8544c77c7f7c0
SHA5125a49ae4bb668bdc291e21b7657eec6ee4a0e50fb47938b60fc1f7a7b4fb6aad682662981cf4f9db91921efc39ab00a45f64de690cc94b06073ba2973534dbc55
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD53624ce3d7bba0be7aa6c8faedee2bfaf
SHA1463945f93a3843e9b77f8cd82108adecfd1c3fe6
SHA256d6339e24183e3319e26dc76adee6b63814083fc46e03cb5a643790a476619aae
SHA512de1e89fc922f5a54b81468a909e79c2c7f2f4df7205cba47afec4bee391978097b3546ef9749ac240b5acbed4c8f1bf98c0cc6bbaa0c149e82016f3a12bce7b6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5ec5761934368b24492638276aeb8d744
SHA15969ddee13f0b6c7220334ea5a26fdde0325221f
SHA256038ea794a2f3abc2e360be08d0ca8788b6bb491c4d690e34a7b16c42b062681f
SHA512d00734339ed2981567a9347b7f57adf17e929cc87ccfa62f9a66c96d3a17d4c0e33aea41fc81c6c0de42d56c4a0dadcf79118ed2d0f82568dd65190650763344
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5921ba6089a5b12f47f83bd35e39f20aa
SHA1abbe929e2521a267cdc0b44c5b6553819c930253
SHA25646bc9a4524f2a1ddac7a4b154225901c98a71b87a7fa33711c00a473a0b9d381
SHA512504e422a129f23470371429c171bde4ada41ba2721fe3d397e93d4b06075b29054d90f777e1fd40ca91e78462be20980b52b90c66108534e84225e5f221f8e16
-
Filesize
191KB
MD51afc6eba1f4fb6dc8df294ce7bb28f70
SHA18a2b359bc268b5a5620a7ef563600990041b63d6
SHA256b2d20839f41cd125a724b37b1dfb3a191c5300278975ff8433505917e34ac5ac
SHA512e61a4765cf5efa62b4548720a7bfa88b6a0d763c45be83d0ae8ef47391f87a69f4f348957ec89da9b39eaf914aedd7f2229891e2c9ad1b4044fbd237800703bc
-
Filesize
129KB
MD585f82c5e6837878b46fadaf1b965c5dc
SHA15d494a343341195166b6d7ab5514a93d0de0557e
SHA25650f06443ef63bea32579de1d8b8930405aedeecbb72853dcea148539d57b058e
SHA512c8cdb6e51ca0da73066c8a5a89947a17a5fdc6de0b26b5162818095a7829e36d0f3b8e6e9366a45929e4e76828c771b74e5a5232a6f019cb0b31358322dfc149