Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe
Resource
win10v2004-20240319-en
General
-
Target
99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe
-
Size
4.1MB
-
MD5
1c4fd3abd16df5769340d2157667cd8a
-
SHA1
af4c2c181b31a6b8497350ab72193b847fa220c1
-
SHA256
99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921
-
SHA512
bf500025652ad4b47f39a0dfaa1174f394e256c3fdb1e01f0dfc24f5bc1f597274fc632449428e28699b6c801d5ac29a357613a21714613f53de73253e433ad3
-
SSDEEP
98304:0aEmfxmJR66TkeGUe4mrO+bILWs+wDYRz+iVBdL4Y:xm66F/cKWs+wDYRzF4Y
Malware Config
Signatures
-
Glupteba payload 20 IoCs
resource yara_rule behavioral1/memory/1108-2-0x0000000002FF0000-0x00000000038DB000-memory.dmp family_glupteba behavioral1/memory/1108-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1108-25-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1108-51-0x0000000002FF0000-0x00000000038DB000-memory.dmp family_glupteba behavioral1/memory/1108-59-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/412-60-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/412-93-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/412-123-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/412-149-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/412-156-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/552-254-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/552-264-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/552-267-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/552-269-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/552-272-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/552-275-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/552-278-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/552-281-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/552-284-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/552-287-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1376 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 552 csrss.exe 3764 injector.exe 3100 windefender.exe 3628 windefender.exe -
resource yara_rule behavioral1/files/0x00050000000167e1-257.dat upx behavioral1/memory/3100-263-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3628-266-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3628-273-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe File created C:\Windows\rss\csrss.exe 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2008 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4696 schtasks.exe 4916 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2941 = "Sao Tome Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2942 = "Sao Tome Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2240 powershell.exe 2240 powershell.exe 2240 powershell.exe 1108 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 1108 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 1812 powershell.exe 1812 powershell.exe 1812 powershell.exe 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 2008 powershell.exe 2008 powershell.exe 2008 powershell.exe 3624 powershell.exe 3624 powershell.exe 3624 powershell.exe 2008 powershell.exe 2008 powershell.exe 2008 powershell.exe 3180 powershell.exe 3180 powershell.exe 3180 powershell.exe 2240 powershell.exe 2240 powershell.exe 2240 powershell.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 552 csrss.exe 552 csrss.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 552 csrss.exe 552 csrss.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 552 csrss.exe 552 csrss.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe 3764 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 1108 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Token: SeImpersonatePrivilege 1108 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe Token: SeDebugPrivilege 1812 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 3624 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 3180 powershell.exe Token: SeDebugPrivilege 2240 powershell.exe Token: SeSystemEnvironmentPrivilege 552 csrss.exe Token: SeSecurityPrivilege 2008 sc.exe Token: SeSecurityPrivilege 2008 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1108 wrote to memory of 2240 1108 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 98 PID 1108 wrote to memory of 2240 1108 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 98 PID 1108 wrote to memory of 2240 1108 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 98 PID 412 wrote to memory of 1812 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 110 PID 412 wrote to memory of 1812 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 110 PID 412 wrote to memory of 1812 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 110 PID 412 wrote to memory of 2376 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 112 PID 412 wrote to memory of 2376 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 112 PID 2376 wrote to memory of 1376 2376 cmd.exe 114 PID 2376 wrote to memory of 1376 2376 cmd.exe 114 PID 412 wrote to memory of 2008 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 115 PID 412 wrote to memory of 2008 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 115 PID 412 wrote to memory of 2008 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 115 PID 412 wrote to memory of 3624 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 118 PID 412 wrote to memory of 3624 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 118 PID 412 wrote to memory of 3624 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 118 PID 412 wrote to memory of 552 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 121 PID 412 wrote to memory of 552 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 121 PID 412 wrote to memory of 552 412 99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe 121 PID 552 wrote to memory of 2008 552 csrss.exe 122 PID 552 wrote to memory of 2008 552 csrss.exe 122 PID 552 wrote to memory of 2008 552 csrss.exe 122 PID 552 wrote to memory of 3180 552 csrss.exe 128 PID 552 wrote to memory of 3180 552 csrss.exe 128 PID 552 wrote to memory of 3180 552 csrss.exe 128 PID 552 wrote to memory of 2240 552 csrss.exe 131 PID 552 wrote to memory of 2240 552 csrss.exe 131 PID 552 wrote to memory of 2240 552 csrss.exe 131 PID 552 wrote to memory of 3764 552 csrss.exe 134 PID 552 wrote to memory of 3764 552 csrss.exe 134 PID 3100 wrote to memory of 452 3100 windefender.exe 140 PID 3100 wrote to memory of 452 3100 windefender.exe 140 PID 3100 wrote to memory of 452 3100 windefender.exe 140 PID 452 wrote to memory of 2008 452 cmd.exe 141 PID 452 wrote to memory of 2008 452 cmd.exe 141 PID 452 wrote to memory of 2008 452 cmd.exe 141 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe"C:\Users\Admin\AppData\Local\Temp\99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe"C:\Users\Admin\AppData\Local\Temp\99b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1376
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4696
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4916
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4192 --field-trial-handle=2320,i,3025503729105798828,9325691672526736153,262144 --variations-seed-version /prefetch:81⤵PID:4148
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD575a5cac8e3ce4932ac7a8525f32539a2
SHA11cc0e6f6f4a24e67a1ef03873e19a1de5cc12510
SHA25659f6bc22325ec61e8aff6af06d9f7251a4d7b082b8f8547151208c4174d7c1a7
SHA5125b08fd0b1e44f0e6f2375ce6c025d56cdbff9e40227b18ff04da85fdcf709b1aae7c0d3d064480a294db9d99504b161a3722f0f313d7c499397efbfb651408a2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52f7e98644b083fd08529d98985079f92
SHA1c3697cb7f08d96f1c2fbd34a35179ad35333342c
SHA256d95d5d038810990f20b9b5df6bbad8691403a9d7d0f92334babf61c708a8c509
SHA512c5bc34bc18d6cd9ee495d3c57997f6921216c2b551b20126fd86105f2bcb2f81abb6883a7fa2179b20c9c6a03d7cc78e84f6c36908e5352386427fc7a8b9c6fd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59486abcff6199fc14bde1036ff2a49f8
SHA1e4610443ee3a74865ab1f4d052f9fcb370cb52e7
SHA2562155c790b288cc62e6025655c06b96c0e681ca0d5335a3ac5512fce727c1e0d0
SHA5127e040d3526bfdc2258232944d6d5d0e0aeb6684b39e9d191e7eedf5aa4c325636f6f98ef5d9d5135640ccad084e14027aefe162f35be9d0ea1f6b7e69749fdfe
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ee46de0201962b1788f87ae812da173e
SHA1c05ed8522a69bea857a2ffb1c05d5801953774cc
SHA256353cdb2a4a561cfd53a8207c43a92f7fb7f0fadba36378826365dfd71c38327f
SHA512aa19aea7ffbdc267b3321009dff1b693df99794b606e500c2f8af9d829e5c34bb51799f6a82bdca76b27aec78a802975e976b90b5460d7e27ac98d9544bf83f4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD505cf6e8c53e52a5dc8d14b3432232b3e
SHA10324be5822c84ebd209749d213b1af46c9a75942
SHA256077b373957cc190e16cb47c6b4a819159a770a165884adf9f25fa38039203f09
SHA512f298549a041f0100e3554dcd4a9930f2a146d79ec9d78e8034bb869e017190edc1c8d27ce9de79d9512749d3153c1eac32492d1bcc38b9911c0ae858422433ad
-
Filesize
4.1MB
MD51c4fd3abd16df5769340d2157667cd8a
SHA1af4c2c181b31a6b8497350ab72193b847fa220c1
SHA25699b38840511cf4456d4b85b588e6643fa423ecb50c0cccfcb8f0e4dec2cd9921
SHA512bf500025652ad4b47f39a0dfaa1174f394e256c3fdb1e01f0dfc24f5bc1f597274fc632449428e28699b6c801d5ac29a357613a21714613f53de73253e433ad3
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec