Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/03/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe
Resource
win10v2004-20240226-en
General
-
Target
921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe
-
Size
4.1MB
-
MD5
55f33db580e500afc34392315b79a0aa
-
SHA1
295d28ddf2466c3a8f011c72ad01d239052abf7b
-
SHA256
921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104
-
SHA512
bce84358322de185821b5a96af51f453174ad910511514a7b3c0fcf623c61236d6f50fc832d7c17fa82b56bf9facc97591540f8be907ae5dd9715c9723e5f5db
-
SSDEEP
98304:CtoBwzMEokrjaiv5Yw/pXBeC9oheunTMG9BoZ2SC1bWr70zMNI0Ry:qzMOe5EBB1funT3eZgC8zMzw
Malware Config
Signatures
-
Glupteba payload 22 IoCs
resource yara_rule behavioral2/memory/1272-2-0x0000000003050000-0x000000000393B000-memory.dmp family_glupteba behavioral2/memory/1272-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1272-44-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1272-54-0x0000000003050000-0x000000000393B000-memory.dmp family_glupteba behavioral2/memory/1272-55-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5116-57-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1272-70-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5116-89-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5116-93-0x0000000002BA0000-0x0000000002FA0000-memory.dmp family_glupteba behavioral2/memory/5116-104-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5116-131-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5116-148-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2160-211-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2160-244-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2160-246-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2160-256-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2160-259-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2160-262-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2160-265-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2160-268-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2160-271-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2160-274-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2776 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2160 csrss.exe 1896 injector.exe 3148 windefender.exe 1252 windefender.exe -
resource yara_rule behavioral2/files/0x000200000002a7e1-249.dat upx behavioral2/memory/3148-254-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1252-257-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1252-263-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1252-272-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1252-275-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe File created C:\Windows\rss\csrss.exe 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2056 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1576 schtasks.exe 4868 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-242 = "Samoa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3141 = "South Sudan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4336 powershell.exe 4336 powershell.exe 1272 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 1272 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 4672 powershell.exe 4672 powershell.exe 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 3636 powershell.exe 3636 powershell.exe 2052 powershell.exe 2052 powershell.exe 4084 powershell.exe 4084 powershell.exe 4216 powershell.exe 4216 powershell.exe 1380 powershell.exe 1380 powershell.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 2160 csrss.exe 2160 csrss.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 2160 csrss.exe 2160 csrss.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 2160 csrss.exe 2160 csrss.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4336 powershell.exe Token: SeDebugPrivilege 1272 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Token: SeImpersonatePrivilege 1272 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe Token: SeDebugPrivilege 4672 powershell.exe Token: SeDebugPrivilege 3636 powershell.exe Token: SeDebugPrivilege 2052 powershell.exe Token: SeDebugPrivilege 4084 powershell.exe Token: SeDebugPrivilege 4216 powershell.exe Token: SeDebugPrivilege 1380 powershell.exe Token: SeSystemEnvironmentPrivilege 2160 csrss.exe Token: SeSecurityPrivilege 2056 sc.exe Token: SeSecurityPrivilege 2056 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1272 wrote to memory of 4336 1272 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 81 PID 1272 wrote to memory of 4336 1272 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 81 PID 1272 wrote to memory of 4336 1272 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 81 PID 5116 wrote to memory of 4672 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 86 PID 5116 wrote to memory of 4672 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 86 PID 5116 wrote to memory of 4672 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 86 PID 5116 wrote to memory of 5060 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 88 PID 5116 wrote to memory of 5060 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 88 PID 5060 wrote to memory of 2776 5060 cmd.exe 90 PID 5060 wrote to memory of 2776 5060 cmd.exe 90 PID 5116 wrote to memory of 3636 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 91 PID 5116 wrote to memory of 3636 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 91 PID 5116 wrote to memory of 3636 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 91 PID 5116 wrote to memory of 2052 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 93 PID 5116 wrote to memory of 2052 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 93 PID 5116 wrote to memory of 2052 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 93 PID 5116 wrote to memory of 2160 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 95 PID 5116 wrote to memory of 2160 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 95 PID 5116 wrote to memory of 2160 5116 921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe 95 PID 2160 wrote to memory of 4084 2160 csrss.exe 96 PID 2160 wrote to memory of 4084 2160 csrss.exe 96 PID 2160 wrote to memory of 4084 2160 csrss.exe 96 PID 2160 wrote to memory of 4216 2160 csrss.exe 101 PID 2160 wrote to memory of 4216 2160 csrss.exe 101 PID 2160 wrote to memory of 4216 2160 csrss.exe 101 PID 2160 wrote to memory of 1380 2160 csrss.exe 104 PID 2160 wrote to memory of 1380 2160 csrss.exe 104 PID 2160 wrote to memory of 1380 2160 csrss.exe 104 PID 2160 wrote to memory of 1896 2160 csrss.exe 106 PID 2160 wrote to memory of 1896 2160 csrss.exe 106 PID 3148 wrote to memory of 4172 3148 windefender.exe 112 PID 3148 wrote to memory of 4172 3148 windefender.exe 112 PID 3148 wrote to memory of 4172 3148 windefender.exe 112 PID 4172 wrote to memory of 2056 4172 cmd.exe 113 PID 4172 wrote to memory of 2056 4172 cmd.exe 113 PID 4172 wrote to memory of 2056 4172 cmd.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe"C:\Users\Admin\AppData\Local\Temp\921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe"C:\Users\Admin\AppData\Local\Temp\921814ff40655765cd5ccf16fc757905b9d351ce8c1cb5c82572b492a5e07104.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2776
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1576
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4868
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1252
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5043c8f41220ceb43f3185b23bd54fe28
SHA154d3838fa0b5a50b2ee7d1e771b0dd001b33a331
SHA2565fd74098fa3bc72f0a044170b2893cf263a8ecf3e203ac01952b5e467c15d7a7
SHA51272eb967b02c5fd598c421799673686dce30ee74dd6f09a869c1186dab93e874ab056fc5332500f08ed99475d45d0018e9e453ffc352a9f14bc6baf63818b4faa
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57ec0dff353ab9042d1b0d9acb9f77fb0
SHA1c4debb03c0954d7788f0734aa050d8031f32cd1c
SHA256e9b7acda419f6957659b924d45e32756529df3ce780617e78d881108acb5ffda
SHA5127b226b012cf0dc75b8767b9f1c7584789bff942c870fb69a954f4cacee402a4e12ca5cb6048894b2865d3f1082c7de1bf3e3d0cc4ad736903080c0f44fb0701e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5da878da8200fef53f20a04be53923629
SHA13c1b94dbab2abdb85b6fc5048ea7cb92b3bff75c
SHA25631ae23cbef1fe864d3bb5c3d25c4a5bcc32d592314076d8a259243da555dc5c5
SHA512f7fd765c15565e35d3f29ec6b0bccb6516401dd5420907652c6a0f90a7740a676db1574091fc1af1cc79b798ef9cf0d9f94a4b7c2e251f5280b77999fe8aba2a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56616ad71a8141581e4a2211671bebee6
SHA1d95d8e3641234ec184eddee3353131ba0545a85c
SHA25632d2566207033abe8487cb29abea4c914798351b3873e4e50a01feb79b733c12
SHA512fa8e474c77aec9aadecdb9ad56a9db52755a9c589ba1ceb170d7798a96d578afdf576772699e734f2ba45660d001b4d2bd75a0c91784f147567d12e9fdf5271d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5399c5f1d6fba0c77b1ec15e5f68a4bdb
SHA1290c8d85ded36aa329b9b657d5e3ffbfab7fab9c
SHA2569f225fb6e209122d01a0054956ec43df7b91aa7c1f326a2dd39a02d7f749ce2c
SHA5128a2027b921c2bfa8057a20fe959547bf0244e6b3b2b898b6ea62b6a7825d2f2d9d073bcb371389e5cc48e762382b0d094375d6617198d45db9b6e1c66cab00e1
-
Filesize
2.0MB
MD5586ff1ffbae23355e656dfe167124cd4
SHA1a7168d4c1b677c299d104d1962b0276fc79e5124
SHA2560e538765b10454045e2820b3f7d10359b953fb184c84716631da670f3ea5e2cb
SHA512652cdfee33f42517e276e13d7f7de5ffce5f3579d1d23f6a08b0f4fd4f488fd2f7fc2da02094cb696dedc9b79dd5200c19a52ec3205c58c8c654c6ee54e53877
-
Filesize
2.6MB
MD5f40847134ff51a19fd2e0eaa80ccee18
SHA12ecfcb90a02a21d193facf18c3ffea173744285d
SHA2562615e7cdcdc5ac15467fbd35c39f9aefb054e73e520ccbc32c9337fb54abe534
SHA512693b369f6d3f8e692963a784faf3b58350731110f7c415c8b10a4214d2e4967a3b52f1fdb508226d2377edbf24e80c23868c7870b3dcd2caf2bf5097923da38b
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec