Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
90c2c0a3850e702555c86672dfccf87e.exe
Resource
win7-20240221-en
General
-
Target
90c2c0a3850e702555c86672dfccf87e.exe
-
Size
4.2MB
-
MD5
90c2c0a3850e702555c86672dfccf87e
-
SHA1
547237f6c49839d5b52c21541e3ef97e70c09e14
-
SHA256
5d60502a5cb4d285aa1292f7d1fd6297e07e310babf6fc52bcdc86ef0c9e06bb
-
SHA512
bef33bcfe5c99260d7e3d4a1f874606b166a8ee6307780140ce3350df0e1c7804695596fdcd252a9ce5445439afc2bb6a8b33d99bf175fb722f89213197367f9
-
SSDEEP
98304:teW8UzsHIbLf9dWRHWVRhdNR5S1sJRNc/DhpLv/dFcsAkZ5X:q0L1dWRH6Rb9w/n3rVAk3
Malware Config
Signatures
-
Glupteba payload 20 IoCs
resource yara_rule behavioral2/memory/1564-2-0x0000000003E30000-0x000000000471B000-memory.dmp family_glupteba behavioral2/memory/1564-3-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/1564-54-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/1564-56-0x0000000003E30000-0x000000000471B000-memory.dmp family_glupteba behavioral2/memory/1664-57-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/1664-135-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/1664-156-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-258-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-267-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-269-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-271-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-273-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-275-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-277-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-279-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-281-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-283-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-285-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-287-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba behavioral2/memory/2784-289-0x0000000000400000-0x0000000001E17000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 752 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2784 csrss.exe 1592 injector.exe 2120 windefender.exe 1944 windefender.exe -
resource yara_rule behavioral2/files/0x0008000000023206-261.dat upx behavioral2/files/0x0008000000023206-263.dat upx behavioral2/memory/2120-266-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1944-268-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1944-272-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 90c2c0a3850e702555c86672dfccf87e.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 90c2c0a3850e702555c86672dfccf87e.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 90c2c0a3850e702555c86672dfccf87e.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4608 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3232 1564 WerFault.exe 87 3092 1664 WerFault.exe 102 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1092 schtasks.exe 3352 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2591 = "Tocantins Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 90c2c0a3850e702555c86672dfccf87e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2942 = "Sao Tome Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 90c2c0a3850e702555c86672dfccf87e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3368 powershell.exe 3368 powershell.exe 1564 90c2c0a3850e702555c86672dfccf87e.exe 1564 90c2c0a3850e702555c86672dfccf87e.exe 2016 powershell.exe 2016 powershell.exe 2016 powershell.exe 1664 90c2c0a3850e702555c86672dfccf87e.exe 1664 90c2c0a3850e702555c86672dfccf87e.exe 1664 90c2c0a3850e702555c86672dfccf87e.exe 1664 90c2c0a3850e702555c86672dfccf87e.exe 1664 90c2c0a3850e702555c86672dfccf87e.exe 1664 90c2c0a3850e702555c86672dfccf87e.exe 1664 90c2c0a3850e702555c86672dfccf87e.exe 1664 90c2c0a3850e702555c86672dfccf87e.exe 1664 90c2c0a3850e702555c86672dfccf87e.exe 1664 90c2c0a3850e702555c86672dfccf87e.exe 4944 powershell.exe 4944 powershell.exe 4944 powershell.exe 4000 powershell.exe 4000 powershell.exe 4000 powershell.exe 1008 powershell.exe 1008 powershell.exe 1008 powershell.exe 3216 powershell.exe 3216 powershell.exe 3216 powershell.exe 1156 powershell.exe 1156 powershell.exe 1156 powershell.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 2784 csrss.exe 2784 csrss.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 2784 csrss.exe 2784 csrss.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 2784 csrss.exe 2784 csrss.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe 1592 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3368 powershell.exe Token: SeDebugPrivilege 1564 90c2c0a3850e702555c86672dfccf87e.exe Token: SeImpersonatePrivilege 1564 90c2c0a3850e702555c86672dfccf87e.exe Token: SeDebugPrivilege 2016 powershell.exe Token: SeDebugPrivilege 4944 powershell.exe Token: SeDebugPrivilege 4000 powershell.exe Token: SeDebugPrivilege 1008 powershell.exe Token: SeDebugPrivilege 3216 powershell.exe Token: SeDebugPrivilege 1156 powershell.exe Token: SeSystemEnvironmentPrivilege 2784 csrss.exe Token: SeSecurityPrivilege 4608 sc.exe Token: SeSecurityPrivilege 4608 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1564 wrote to memory of 3368 1564 90c2c0a3850e702555c86672dfccf87e.exe 128 PID 1564 wrote to memory of 3368 1564 90c2c0a3850e702555c86672dfccf87e.exe 128 PID 1564 wrote to memory of 3368 1564 90c2c0a3850e702555c86672dfccf87e.exe 128 PID 1664 wrote to memory of 2016 1664 90c2c0a3850e702555c86672dfccf87e.exe 105 PID 1664 wrote to memory of 2016 1664 90c2c0a3850e702555c86672dfccf87e.exe 105 PID 1664 wrote to memory of 2016 1664 90c2c0a3850e702555c86672dfccf87e.exe 105 PID 1664 wrote to memory of 1592 1664 90c2c0a3850e702555c86672dfccf87e.exe 129 PID 1664 wrote to memory of 1592 1664 90c2c0a3850e702555c86672dfccf87e.exe 129 PID 1592 wrote to memory of 752 1592 cmd.exe 110 PID 1592 wrote to memory of 752 1592 cmd.exe 110 PID 1664 wrote to memory of 4944 1664 90c2c0a3850e702555c86672dfccf87e.exe 111 PID 1664 wrote to memory of 4944 1664 90c2c0a3850e702555c86672dfccf87e.exe 111 PID 1664 wrote to memory of 4944 1664 90c2c0a3850e702555c86672dfccf87e.exe 111 PID 1664 wrote to memory of 4000 1664 90c2c0a3850e702555c86672dfccf87e.exe 113 PID 1664 wrote to memory of 4000 1664 90c2c0a3850e702555c86672dfccf87e.exe 113 PID 1664 wrote to memory of 4000 1664 90c2c0a3850e702555c86672dfccf87e.exe 113 PID 1664 wrote to memory of 2784 1664 90c2c0a3850e702555c86672dfccf87e.exe 116 PID 1664 wrote to memory of 2784 1664 90c2c0a3850e702555c86672dfccf87e.exe 116 PID 1664 wrote to memory of 2784 1664 90c2c0a3850e702555c86672dfccf87e.exe 116 PID 2784 wrote to memory of 1008 2784 csrss.exe 119 PID 2784 wrote to memory of 1008 2784 csrss.exe 119 PID 2784 wrote to memory of 1008 2784 csrss.exe 119 PID 2784 wrote to memory of 3216 2784 csrss.exe 125 PID 2784 wrote to memory of 3216 2784 csrss.exe 125 PID 2784 wrote to memory of 3216 2784 csrss.exe 125 PID 2784 wrote to memory of 1156 2784 csrss.exe 127 PID 2784 wrote to memory of 1156 2784 csrss.exe 127 PID 2784 wrote to memory of 1156 2784 csrss.exe 127 PID 2784 wrote to memory of 1592 2784 csrss.exe 129 PID 2784 wrote to memory of 1592 2784 csrss.exe 129 PID 2120 wrote to memory of 4512 2120 windefender.exe 135 PID 2120 wrote to memory of 4512 2120 windefender.exe 135 PID 2120 wrote to memory of 4512 2120 windefender.exe 135 PID 4512 wrote to memory of 4608 4512 cmd.exe 136 PID 4512 wrote to memory of 4608 4512 cmd.exe 136 PID 4512 wrote to memory of 4608 4512 cmd.exe 136 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\90c2c0a3850e702555c86672dfccf87e.exe"C:\Users\Admin\AppData\Local\Temp\90c2c0a3850e702555c86672dfccf87e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\90c2c0a3850e702555c86672dfccf87e.exe"C:\Users\Admin\AppData\Local\Temp\90c2c0a3850e702555c86672dfccf87e.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:752
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3352
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3368
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1092
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 6523⤵
- Program crash
PID:3092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 9562⤵
- Program crash
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1564 -ip 15641⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1664 -ip 16641⤵PID:4816
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD532cba14f8dfea31e24728ae8ea60f958
SHA19213ebcb50193ca768319e8cabcc6cd512c53ee1
SHA256a63a3fdc796c341bcf290601277313cc6e61928436bad51f94e995ec83fcd05a
SHA51238dd596f1c2780b1232b08ef8806644890ddff0739b2f6711f98971732c966061887e7ba8f0ed89dd7c476eb617cf13cf68db4c8b851016b7216d7ae181a2cd2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b5eba14f5cbd3d61bfd970e946d3f917
SHA16217cae0ef86a12b7d7e4ded3715fe214f5e0ade
SHA256943ae6d736663fae008320443d6a16a1e35a0194a2531615e3f73bec3af56ae2
SHA512cb176b7476ea7822454ab866965831dc522791ff8a073a39469fa35087be3013a02f586c4c0b409b4a8624cfa699d7521432fa28798a3a8c0a25169a5ecaab47
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a66fb3f4fe5849ce2d4dd65d1e4b7edd
SHA1a53c898641373943d55873f1f898a15677edad8e
SHA256a7f47a7dc42a478c46df93b0edb84eb65eb761d90cf2706aa15784d79b0f487a
SHA5122ae96f8ce1f006e04e4a42e244137038c07795a14e9d1ef7710e8245edfbe46e2d1b4011d7b68fc5bc1ed1dda1ac86b7ce14c333eb304cf5b19fa97994b88ec6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5928e8af1bf05c347e2476454c02fb285
SHA135972d3375a31b75422976e14e0f904bb31aace0
SHA256ad1e4fd051445daccb7106f91f3e8a898dd7872fb0835cc6bd7bb7ae66a183ce
SHA512a832bd75509d4dfbc3289f218863bfd1a8dca66cace47250e08de2eba6e14a7c1b5bc99ef9904b724cfaea804551cc7593f74760cfc33cbda47c3d643b97993b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52cd427c63fae53f8205764031a922d23
SHA1180288bc957dbb2edc14ff1112ae5767fbc3bf91
SHA256e9e9c5948a814cb253673f885217a5ad7e38160e2e4fce0a58509ee3c7986427
SHA5120c9f4df40cc98f5563c2e9d1f9cd397926210a32638adb22d47faa151fcc302bc31561d7728aca788860696cf694662c21c2f5a5f51a2bbf6216a6666fb47e7a
-
Filesize
788KB
MD57da0af2e494232be8324f58fb2ee589d
SHA10efaa421402ab63b189ebb201b27b8cd04670ea5
SHA2565239fc678d51f076d2917404feba3a3feab88040dfdc9c9aecb57ac346724e75
SHA51275294935310425c5a3862c83456720d3c4117685319c6d04c58aa13c57ad6f97876d3dd3b8fc251134821e28eecf1cce23d83bd82031ada2c580325c00462b81
-
Filesize
1.1MB
MD515c7f048471eafe8ea4e2d05b585359c
SHA1389d1c2748817dfb9bf8c41e78641c1dfd077386
SHA256e04977d1578f7ddc69ac488671a62b33f9797d2bf301e0f802df831812629c87
SHA512c16783cfe1d9cab59b0dc5cc8645955fcdf935e8bea807ebaa3c1bc30c4bd55b851be2d39f86f47a5047c2d818cd4ab6d7c376a4868c992c44950b90910254c4
-
Filesize
1.1MB
MD5de7305b93feafcd5c3e9ae8102afa19e
SHA1002b6c585762ce3bff5374f0473092495893aff2
SHA256a2f0679b1c04150bc6e4601e3a869da0bfb69e9205ed5ea1fd19a2173f89b7aa
SHA512d6a32cb36d17b7e8186182cc041aafc68585456320ab9cd4aa9b6c35eddae475dbbb9784dbfa6cc1d13188c9ca60c0eca7cff1484a0f2f6a6e0b52b6a1fd4f58
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec