Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe
Resource
win10v2004-20240319-en
General
-
Target
dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe
-
Size
4.1MB
-
MD5
b65b3808d01a8e86cca4b3471ee1423d
-
SHA1
7aca57edeeda3694d3bd275370a0f74f776b7b1d
-
SHA256
dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200
-
SHA512
f4faaa69baea7c62984d0e56219884f3b2446fb828100b1b4c44928453680ba771eb92beaddd863318779f545c06a8bf1eefdbc60554e3fd1c519759478e170e
-
SSDEEP
98304:KtoBwzMEokrjaiv5Yw/pXBeC9oheunTMG9BoZ2SC1bWr70zMNI0Rh:SzMOe5EBB1funT3eZgC8zMzb
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/3212-2-0x0000000002E80000-0x000000000376B000-memory.dmp family_glupteba behavioral1/memory/3212-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3212-51-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3212-55-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3212-56-0x0000000002E80000-0x000000000376B000-memory.dmp family_glupteba behavioral1/memory/3332-59-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3332-108-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3332-174-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-260-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-264-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-271-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-274-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-277-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-280-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-283-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-286-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-289-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-292-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4324-295-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2612 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 4324 csrss.exe 2612 injector.exe 1284 windefender.exe 492 windefender.exe -
resource yara_rule behavioral1/files/0x000d000000023324-263.dat upx behavioral1/files/0x000d000000023324-266.dat upx behavioral1/files/0x000d000000023324-267.dat upx behavioral1/memory/1284-270-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/492-273-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/492-279-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe File created C:\Windows\rss\csrss.exe dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5036 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4464 schtasks.exe 5012 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1892 = "Russia TZ 3 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 640 powershell.exe 640 powershell.exe 640 powershell.exe 3212 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3212 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3996 powershell.exe 3996 powershell.exe 3996 powershell.exe 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 3660 powershell.exe 3660 powershell.exe 3660 powershell.exe 732 powershell.exe 732 powershell.exe 732 powershell.exe 376 powershell.exe 376 powershell.exe 376 powershell.exe 1448 powershell.exe 1448 powershell.exe 1448 powershell.exe 3692 powershell.exe 3692 powershell.exe 3692 powershell.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 4324 csrss.exe 4324 csrss.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 4324 csrss.exe 4324 csrss.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 4324 csrss.exe 4324 csrss.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe 2612 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 640 powershell.exe Token: SeDebugPrivilege 3212 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Token: SeImpersonatePrivilege 3212 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeDebugPrivilege 3660 powershell.exe Token: SeDebugPrivilege 732 powershell.exe Token: SeDebugPrivilege 376 powershell.exe Token: SeDebugPrivilege 1448 powershell.exe Token: SeDebugPrivilege 3692 powershell.exe Token: SeSystemEnvironmentPrivilege 4324 csrss.exe Token: SeSecurityPrivilege 5036 sc.exe Token: SeSecurityPrivilege 5036 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3212 wrote to memory of 640 3212 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 97 PID 3212 wrote to memory of 640 3212 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 97 PID 3212 wrote to memory of 640 3212 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 97 PID 3332 wrote to memory of 3996 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 106 PID 3332 wrote to memory of 3996 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 106 PID 3332 wrote to memory of 3996 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 106 PID 3332 wrote to memory of 4320 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 109 PID 3332 wrote to memory of 4320 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 109 PID 4320 wrote to memory of 2612 4320 cmd.exe 111 PID 4320 wrote to memory of 2612 4320 cmd.exe 111 PID 3332 wrote to memory of 3660 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 112 PID 3332 wrote to memory of 3660 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 112 PID 3332 wrote to memory of 3660 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 112 PID 3332 wrote to memory of 732 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 114 PID 3332 wrote to memory of 732 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 114 PID 3332 wrote to memory of 732 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 114 PID 3332 wrote to memory of 4324 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 117 PID 3332 wrote to memory of 4324 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 117 PID 3332 wrote to memory of 4324 3332 dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe 117 PID 4324 wrote to memory of 376 4324 csrss.exe 118 PID 4324 wrote to memory of 376 4324 csrss.exe 118 PID 4324 wrote to memory of 376 4324 csrss.exe 118 PID 4324 wrote to memory of 1448 4324 csrss.exe 124 PID 4324 wrote to memory of 1448 4324 csrss.exe 124 PID 4324 wrote to memory of 1448 4324 csrss.exe 124 PID 4324 wrote to memory of 3692 4324 csrss.exe 126 PID 4324 wrote to memory of 3692 4324 csrss.exe 126 PID 4324 wrote to memory of 3692 4324 csrss.exe 126 PID 4324 wrote to memory of 2612 4324 csrss.exe 129 PID 4324 wrote to memory of 2612 4324 csrss.exe 129 PID 1284 wrote to memory of 3392 1284 windefender.exe 138 PID 1284 wrote to memory of 3392 1284 windefender.exe 138 PID 1284 wrote to memory of 3392 1284 windefender.exe 138 PID 3392 wrote to memory of 5036 3392 cmd.exe 139 PID 3392 wrote to memory of 5036 3392 cmd.exe 139 PID 3392 wrote to memory of 5036 3392 cmd.exe 139 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe"C:\Users\Admin\AppData\Local\Temp\dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe"C:\Users\Admin\AppData\Local\Temp\dd529fcfd5e17bb7238c9dbcd8a87f8c518ac7d018f37283e70ca51816926200.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2612
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4464
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:5012
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3408,i,16599691418790971742,134777455365707676,262144 --variations-seed-version /prefetch:81⤵PID:2256
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e3f850d6fc09f39d74b09f5e1daee54a
SHA1cef1643c9b5f6aae36a9ed18695e079be55a91c1
SHA256e53455e48a8c070997206d9bbc1e855dd190bdb6a673d63c1acff9c12732f972
SHA512f3ab7df3483a3a421b4a60d4265d650dedba9652ed46fea7ecfd60ca6963b543e5f277d32dc67f442a648553007b463b037c898c78fa64557ee3dc284aabcb63
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54a6816bd468406faf88f44bc38d86ccd
SHA1d412b6ddce8bc59e7f37b51c86bbe457abf17c6b
SHA256d9127c58a24b54ee0a72ad53d46e8784a0d4ac5c74559ad6bb912a319ed86cf3
SHA5128af56783dc7371568f95d2f9075657b775c2a4a465bb0f5c3ed4f06ef2047a7ab94b56e41bd9c3811c2f1a116ae058f7f7d2094727715bb50b386b55a22671f0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52bc04132bdaacf18e23c426c1da04aa5
SHA17fa0f19ee270c9f5acb6ff3570fdcb79b9fa3440
SHA2565e4791f0da8ce802b9c2ef76fae2ecf3ca7591d08a451c1edbd10297bd602203
SHA512d5dc98b02205eaa8de60f0f1273502cc44d709e78941e56cbe4e75838ca3a13289eab9182691cfbb77a7bfe6694b5b598f200d313cb586873565b0c056d90d68
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f2c54f5e0fa58a7e6232d77d8687b530
SHA1a23b9032908c83aeaf8ae3b6f8d01b6cef660d9d
SHA2569a8f16958982f94981c5cb15134468de48cd0cde82c8059073c6585afe3c1351
SHA512a5ff659ebc81d0e923ce5340b3f42619dd1b4388d06b47af2c0278fda9c3e1f50a91e6e62f0477fd20c0e801b7ed9e0b70d4a7df112e3e81977161f171b708b1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD576009768dfbfc582cf5e13cced63dc88
SHA1ba75e105bb0b7f9f63a07806b9a1cb5c6344fec4
SHA2560e0cec50045435ce404197dcf96641158fe5ff832ca91ee2c02f6df9c8afa7e2
SHA512ebd2ac271388e24015e1cdec8222a5c656b177ead525e6d8cecd8136397fa8b175b225933502dff96d6faeace07fd171f7521486586f52b40bc3b46f0245c247
-
Filesize
1.7MB
MD594e3f236fb4ecb616fd5fb5007a8ac89
SHA18f1254dc0b49bd149e9b086e3e7394e30f675923
SHA25625ef07be3fdb0a0384ca76a15ae54fae16d66a799b34613540f49ddbddedfc33
SHA512c5283d36451e5d91a02492407d034b25ad20136b62e7d5ca68c4e0261927e86b3f0383b564aa72bbc9da1f66198e4caa12ae85dfb5eca22cb4a7f47f3600bf08
-
Filesize
1.1MB
MD5b100e031d262c46411ff3ad18fa292ca
SHA1acc290873e07a6e65b7f990e130f0c85922242c5
SHA25655e79e5b653b8b117b6332d4c44dcf528a562bb495d8f1b1cadd1efdc897204d
SHA512aeef50b534ffa182a986a1bfbe2458dec9af25eac7b6b6fbff7009f04fb2a03aee5549deda49c0639f6a5f7b93b44db15d643a1d807cbe1f39fafec8f2d5081f
-
Filesize
1.8MB
MD5e80fd60d39654510f4539081eb1a374c
SHA14607effd3ff1c1b6b0a9a8e5e242115c18f6d8d3
SHA25626b65a72e862691e066ec3cba5de8df8563b2730351a5ea56084686b0cf45e53
SHA512a0cd674a08838a83fd992d57373821c97401548365d1870a30945512709a9dc538cedf666b5d761f0b002addfa84388958e3660835c7847346e4315ea82795c5
-
Filesize
320KB
MD51979856034a3a313f7b93f5fcedafb20
SHA1acf54ed630900816388db93b2a4339cd8f0982b1
SHA25658bf0600ff9c3dd534904ef1173ce2ed822df9846a98fff5e055757e60a1b28d
SHA51276aed4535d8397d02f2ae8677665a8fe3c2876ec0d3ad8d70b2d11a49301041fce14e66fe19d8250c027182b16d5c74409179ab00b08731ffa85a394293fad00
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec