Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe
Resource
win10v2004-20240226-en
General
-
Target
c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe
-
Size
4.2MB
-
MD5
e8de534d36938bb16d424001824ba955
-
SHA1
24ba41919aff326fc46d33a2e5a14efb4f443a33
-
SHA256
c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317
-
SHA512
c4d995e3646f93f428e26106d8a10a18d760542f5029c46f7c5ffffa80c3c709eb654315e019c82cba0cafe883808a312565112998eaa5183a47e622913f6f2a
-
SSDEEP
98304:Jv0T1XT8Tbl9EdJLPOp4i7E1Yl4G/M6pSEC/z40cZl:doBQTbl9ETLOp1p4G/lSEMz4L
Malware Config
Signatures
-
Glupteba payload 21 IoCs
resource yara_rule behavioral1/memory/1568-2-0x00000000030F0000-0x00000000039DB000-memory.dmp family_glupteba behavioral1/memory/1568-3-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/4144-57-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/1568-58-0x00000000030F0000-0x00000000039DB000-memory.dmp family_glupteba behavioral1/memory/1568-85-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/4144-132-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-131-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/4144-193-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-230-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-241-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-245-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-249-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-253-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-257-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-261-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-265-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-269-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-273-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-277-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-281-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba behavioral1/memory/5076-285-0x0000000000400000-0x0000000000EDA000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3692 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 5076 csrss.exe 1460 injector.exe 644 windefender.exe 2324 windefender.exe -
resource yara_rule behavioral1/files/0x000a00000002323e-235.dat upx behavioral1/files/0x000a00000002323e-237.dat upx behavioral1/memory/644-238-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x000a00000002323e-234.dat upx behavioral1/memory/2324-243-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2324-251-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe File created C:\Windows\rss\csrss.exe c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5096 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4384 schtasks.exe 1624 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3141 = "South Sudan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3051 = "Qyzylorda Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3256 powershell.exe 3256 powershell.exe 1568 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 1568 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 3280 powershell.exe 3280 powershell.exe 3280 powershell.exe 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 4280 powershell.exe 4280 powershell.exe 4280 powershell.exe 1740 powershell.exe 1740 powershell.exe 1740 powershell.exe 4316 powershell.exe 4316 powershell.exe 4316 powershell.exe 2744 powershell.exe 2744 powershell.exe 2744 powershell.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 5076 csrss.exe 5076 csrss.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 5076 csrss.exe 5076 csrss.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 5076 csrss.exe 5076 csrss.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe 1460 injector.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3256 powershell.exe Token: SeDebugPrivilege 1568 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Token: SeImpersonatePrivilege 1568 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe Token: SeDebugPrivilege 3280 powershell.exe Token: SeDebugPrivilege 4280 powershell.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 4316 powershell.exe Token: SeDebugPrivilege 2744 powershell.exe Token: SeSystemEnvironmentPrivilege 5076 csrss.exe Token: SeSecurityPrivilege 5096 sc.exe Token: SeSecurityPrivilege 5096 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1568 wrote to memory of 3256 1568 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 92 PID 1568 wrote to memory of 3256 1568 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 92 PID 1568 wrote to memory of 3256 1568 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 92 PID 4144 wrote to memory of 3280 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 98 PID 4144 wrote to memory of 3280 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 98 PID 4144 wrote to memory of 3280 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 98 PID 4144 wrote to memory of 2340 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 100 PID 4144 wrote to memory of 2340 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 100 PID 2340 wrote to memory of 3692 2340 cmd.exe 102 PID 2340 wrote to memory of 3692 2340 cmd.exe 102 PID 4144 wrote to memory of 376 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 116 PID 4144 wrote to memory of 376 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 116 PID 4144 wrote to memory of 376 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 116 PID 4144 wrote to memory of 4280 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 107 PID 4144 wrote to memory of 4280 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 107 PID 4144 wrote to memory of 4280 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 107 PID 4144 wrote to memory of 5076 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 110 PID 4144 wrote to memory of 5076 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 110 PID 4144 wrote to memory of 5076 4144 c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe 110 PID 5076 wrote to memory of 1740 5076 csrss.exe 111 PID 5076 wrote to memory of 1740 5076 csrss.exe 111 PID 5076 wrote to memory of 1740 5076 csrss.exe 111 PID 5076 wrote to memory of 4316 5076 csrss.exe 119 PID 5076 wrote to memory of 4316 5076 csrss.exe 119 PID 5076 wrote to memory of 4316 5076 csrss.exe 119 PID 5076 wrote to memory of 2744 5076 csrss.exe 121 PID 5076 wrote to memory of 2744 5076 csrss.exe 121 PID 5076 wrote to memory of 2744 5076 csrss.exe 121 PID 5076 wrote to memory of 1460 5076 csrss.exe 123 PID 5076 wrote to memory of 1460 5076 csrss.exe 123 PID 644 wrote to memory of 2144 644 windefender.exe 130 PID 644 wrote to memory of 2144 644 windefender.exe 130 PID 644 wrote to memory of 2144 644 windefender.exe 130 PID 2144 wrote to memory of 5096 2144 cmd.exe 131 PID 2144 wrote to memory of 5096 2144 cmd.exe 131 PID 2144 wrote to memory of 5096 2144 cmd.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe"C:\Users\Admin\AppData\Local\Temp\c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe"C:\Users\Admin\AppData\Local\Temp\c6d48fd6191fbb63d5406226c4fc1e094ee30875056e7cf5e31828dab3b8b317.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3692
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Modifies data under HKEY_USERS
PID:376
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4384 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:376
-
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1624
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD50e3eec74556edc0638b28a515d9fd67d
SHA12421abe39842e78b39ba15e5dfb7c63a8b58eabb
SHA2565e0ce22c28e9b85c54711fb01a0ac33005ec3e6d185ea1327d15584756cf17f7
SHA5126b5a328a638164999b95cc979a0cff2b9aa14e941672fdd9db72c83552050b1253585b81c6a3bf9c5c713649c1766e03e77280312b08572987df6b49ae3e8b1c
-
Filesize
220KB
MD5aad02a22d14cefd34b9991cd4266ccf4
SHA140c93deaa65f74549e049a2cdf43156acd146a0d
SHA256b742869526e9a076cfc2b7ecb3c886c506b7737df78918d5762ba906363c7e97
SHA5127592837a98384b13e17c3f12a8b0a8b009db735cec75e5e7b48cb64bb7695ba41e768975c3a96cd4cedde8fc5a5a10b314136a8bcda7a3d184ec53bb7f313f08
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5e38cf80ccd733d12acd8ed657fa76a0f
SHA1580e49e1b482dcf0480cefe6d5bf8f0331732296
SHA25647996c1354ee704ef75a94ae2217033da52695ca164573023cda951bdec728be
SHA512ed7056b56d6cd0fd42f9bb716c647ed21f988231aa0817f28be7fceab199a274a479af4e7b77b86ed298b6734b39c2e6714d46bd6bd408d9862a77d97013bc12
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59e316bc7217ad8fe4fc992e29a7c0f4f
SHA18e2e6ced44800cea6d8e9e102b8b7e3bf304cd27
SHA25693531a73da618eb9139c51dc69e59ca913c239b802515ef15c95688d033b1945
SHA5129f4514b3e55ae2d1900b50d062b4924728a2f7d5d8340376af12ff5298acfbc4db61fd433627f9eac71d2ea34a8a84d51650d0fbe1a97d3e2b8897fef6b8232c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b4819d6e722a6c487ec7912f5ff77388
SHA18c17a55780168c3bac3cd58db94b15cd444eaeb6
SHA256ac5bbe74712c4d1ffd014999b2ffc20db829748da934636627c791a2db059078
SHA5125f558441bc10e6bbb68e85d50347f6352468763a80b8d7a9728cc958ad628b4db6619c3a1066d928d1a5ecc41a4a6a58dcaf04d4ba0afdd520ca7ba463836dd8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53ea3b336026f8f4dea2f81f39753d397
SHA1598016b0dd11cb23aa72a178a2685301f1e3164c
SHA2565046c02d6897ba84a01bdd8f15a1009c65dcc745806933ae9295baf21e0ef925
SHA512bfcd96d4a6394208c735c7af9e7c246b60216c6b74b703d763150b855b8f18de2c015667da2f7b3a9f96305bb6212898dbea6a59d330db60470a57ad9f59aa29
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5802b990ae482dd22dcd1c44cac71f08c
SHA1d1f6201c02ac10e64c2cbe32c48643f77750a65f
SHA25624b0c58c98f186e50558275fd0124a33c4be89609cf334afe885cbe52887f5a1
SHA512f7e788d1e06a76cd88364b530fa6ceaf94005b9cd3c8300537181c61a4fc5bb895d2b02d4e705037c43e5d6c507a0855a58284f07b6db9c48ee9e4094bf0bb1e
-
Filesize
189KB
MD51979823654f7b4340018a78221bcae49
SHA1fce03f97b192e48ea6824aeecd880e15bfe4cafb
SHA256c2f5bbc1fcdb6cf3ee44f565c0d1223620626ff17db362ee422f4874605e27d9
SHA512b7f7af93cafc211c8ff801516a08cc9658859b20450e70cb12d3b1c78da30653b735bd1ed16d485c1629472061eb767396132e42b88695c1d93e2a59b9ed745d
-
Filesize
291KB
MD517ef8fdf91e867b0d42e14ddeb3dd0e9
SHA11777a59382365c8c7c9190ddd83cfee7013a2f3c
SHA2563bc922452b386df60fbdaf7362915a75459c83ba119eb1d722686366ef993a6d
SHA512912694add62a2966349f2ec26f6500375d8ba44206e42ed3ddd11f57788f94e430008c1da4c8626395eb1e95e0c47bd2f462cfce5000db37647bc442d37b8ceb
-
Filesize
469KB
MD5f6d28bcb3c34aea6d16d1a4331869e52
SHA187e0699187dc6e52b9b7cc988dd71b7601e003d2
SHA256f86fb1d80c7ff9d096740b5b7fcbbca668a1761bfe158379ba185e5fc308adb0
SHA512da48b4af0519a592896b9b334899facca1f9303296f2afbf4313da16d0224e82792b8ec3d3baa63e784c67131c6b4815c3c84d7649912f7dae4c8561b07a118c
-
Filesize
419KB
MD501db2f6792b216c69ef13611082e0b13
SHA17a2c61dc0a93e3e22d858ebbc14f30bdc8ec705b
SHA2562b1c1120744fa90b18344d445ceb4f264abca116fee54b9ed6a30c12b7b17780
SHA512e7cc0aea0cee743793664d5d188a81b98e08e1995d2c7f995cd2f7fa737d34159b2a6c51581d79a1651df5f6b35a89a2b6643a77b53e030ba3cb156d703bf133
-
Filesize
433KB
MD596a025e7a1fe27a1e36a3cd618d34702
SHA134c655ff3e25415ed0ebc1f0f04706ee306241b8
SHA25655ccf1f572e46889f34afdfec06b85237c238468d0784e47c3decc5ba7ae52d6
SHA5127f2b9588dcf86bf9405616223b2ceca3ce6bed6816f085361b45eb11410f2241946dd4d4fc9f199d86501bb18278e9d4437d05fd389cffe46514209cd3e88f5a