Analysis
-
max time kernel
103s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe
Resource
win10v2004-20240226-en
General
-
Target
23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe
-
Size
4.2MB
-
MD5
91da42182decd02ae3032b5c22e2df43
-
SHA1
e8036175e7c7a3ae2bb7a3370b6b86abe0dee0a2
-
SHA256
23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489
-
SHA512
ca2cdda2d0608a195557edcdff3c90d7adb2ad10f12bf64eb06adbd816483cfc71f9a76e0907d692cb00347d110a25d34594208ab32d86b030fdcc9ad7a57b40
-
SSDEEP
98304:uZ8PVCLVfwf6r7CwyG/HnVT/ODtpHvs0UYzukfA5p5Wsj:E8tCuG/1bkPUMvw3Wo
Malware Config
Signatures
-
Glupteba payload 11 IoCs
resource yara_rule behavioral1/memory/3700-2-0x0000000003170000-0x0000000003A5B000-memory.dmp family_glupteba behavioral1/memory/3700-3-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/3700-4-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/3700-10-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/3700-12-0x0000000003170000-0x0000000003A5B000-memory.dmp family_glupteba behavioral1/memory/3700-52-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/3700-70-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/3736-72-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/3736-110-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/3736-136-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/3736-168-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3992 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1700 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe File opened for modification C:\Windows\rss 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1356 powershell.exe 1356 powershell.exe 3700 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 3700 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 1784 powershell.exe 1784 powershell.exe 1784 powershell.exe 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 2672 powershell.exe 2672 powershell.exe 2672 powershell.exe 5072 powershell.exe 5072 powershell.exe 5072 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1356 powershell.exe Token: SeDebugPrivilege 3700 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Token: SeImpersonatePrivilege 3700 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe Token: SeDebugPrivilege 1784 powershell.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3700 wrote to memory of 1356 3700 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 93 PID 3700 wrote to memory of 1356 3700 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 93 PID 3700 wrote to memory of 1356 3700 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 93 PID 3736 wrote to memory of 1784 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 109 PID 3736 wrote to memory of 1784 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 109 PID 3736 wrote to memory of 1784 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 109 PID 3736 wrote to memory of 4380 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 112 PID 3736 wrote to memory of 4380 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 112 PID 4380 wrote to memory of 3992 4380 cmd.exe 114 PID 4380 wrote to memory of 3992 4380 cmd.exe 114 PID 3736 wrote to memory of 2672 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 115 PID 3736 wrote to memory of 2672 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 115 PID 3736 wrote to memory of 2672 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 115 PID 3736 wrote to memory of 5072 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 118 PID 3736 wrote to memory of 5072 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 118 PID 3736 wrote to memory of 5072 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 118 PID 3736 wrote to memory of 1700 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 120 PID 3736 wrote to memory of 1700 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 120 PID 3736 wrote to memory of 1700 3736 23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe"C:\Users\Admin\AppData\Local\Temp\23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe"C:\Users\Admin\AppData\Local\Temp\23a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3992
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
PID:1700
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b9e4b939b77622165ef92b477ab835ef
SHA17c615bf8205054b2f7fee5e051ae65b0dfca571a
SHA25633f1629b7565b11289e7c9992dca1334fc19affcf6820724cb8bbdb605a95c15
SHA512376253efe66b927db9543cea03fc3cf6931a3dc98fbcd991dd013faaafb443520f46a2a027eaf85ed5dfa3ae3fa74cd87649f5700ea745c5ef333b893a23f9c7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5959baf1089a5893c18cdcc0b5a807aa2
SHA1aa451f9e80b51d65f87dfa1548c443e513648bca
SHA256d76b15e1731c4b49c3c1340da1ff127438a07fbbf39d6f7b10ff454b73c84d00
SHA5127ffc3ac2ca3550014822d4cc5639140ba750f572847e747e3fd4585bde88f9143187ede4505a7c7ac356fe23785c9fe133f360451b626d90cfb286cdf13c1eb6
-
Filesize
4.2MB
MD591da42182decd02ae3032b5c22e2df43
SHA1e8036175e7c7a3ae2bb7a3370b6b86abe0dee0a2
SHA25623a34008baa7ad1c6687cc4100950e298439b31671f99a61eedf68881e359489
SHA512ca2cdda2d0608a195557edcdff3c90d7adb2ad10f12bf64eb06adbd816483cfc71f9a76e0907d692cb00347d110a25d34594208ab32d86b030fdcc9ad7a57b40