Analysis
-
max time kernel
107s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 16:04
Static task
static1
Behavioral task
behavioral1
Sample
6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe
Resource
win10v2004-20240226-en
General
-
Target
6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe
-
Size
4.2MB
-
MD5
185725cb6be455e4aa726f40b6811b87
-
SHA1
dbdd4f07a5e1ef3b9e2fb6f44180716dc95cd520
-
SHA256
6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b
-
SHA512
956dbe4adcde579ee7d5136f46e420c43c22da7aea864bd1bce581998b289ac418d8819dcd61795cc1e91a02abb0df145e068aaf9e79081ed9372bea99b770e4
-
SSDEEP
98304:ZJ2TeUH8/uS6eL0aHdH7UGUU20SnsTwVT7LLkBu2t36pnie94+7Zl7mt:Z8yuJSH7X20SnsUR7kBD36pie94OZl7G
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral1/memory/1844-2-0x0000000002F20000-0x000000000380B000-memory.dmp family_glupteba behavioral1/memory/1844-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1844-21-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1844-56-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1844-57-0x0000000002F20000-0x000000000380B000-memory.dmp family_glupteba behavioral1/memory/2160-61-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-75-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-98-0x0000000002C40000-0x000000000303D000-memory.dmp family_glupteba behavioral1/memory/2160-112-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-141-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2160-159-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1828-196-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1828-243-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1828-264-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1828-274-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1828-277-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1828-280-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1360 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1828 csrss.exe -
resource yara_rule behavioral1/files/0x0004000000000741-267.dat upx behavioral1/memory/1360-272-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/5008-275-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/5008-281-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe File created C:\Windows\rss\csrss.exe 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 696 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2492 schtasks.exe 488 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4516 powershell.exe 4516 powershell.exe 4516 powershell.exe 1844 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 1844 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 4728 powershell.exe 4728 powershell.exe 4728 powershell.exe 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 548 powershell.exe 548 powershell.exe 548 powershell.exe 3424 powershell.exe 3424 powershell.exe 3424 powershell.exe 2960 powershell.exe 2960 powershell.exe 2316 powershell.exe 2316 powershell.exe 4628 powershell.exe 4628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4516 powershell.exe Token: SeDebugPrivilege 1844 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Token: SeImpersonatePrivilege 1844 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe Token: SeDebugPrivilege 4728 powershell.exe Token: SeDebugPrivilege 548 powershell.exe Token: SeDebugPrivilege 3424 powershell.exe Token: SeDebugPrivilege 2960 powershell.exe Token: SeDebugPrivilege 2316 powershell.exe Token: SeDebugPrivilege 4628 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1844 wrote to memory of 4516 1844 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 92 PID 1844 wrote to memory of 4516 1844 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 92 PID 1844 wrote to memory of 4516 1844 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 92 PID 2160 wrote to memory of 4728 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 104 PID 2160 wrote to memory of 4728 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 104 PID 2160 wrote to memory of 4728 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 104 PID 2160 wrote to memory of 2028 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 106 PID 2160 wrote to memory of 2028 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 106 PID 2028 wrote to memory of 1360 2028 cmd.exe 128 PID 2028 wrote to memory of 1360 2028 cmd.exe 128 PID 2160 wrote to memory of 548 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 109 PID 2160 wrote to memory of 548 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 109 PID 2160 wrote to memory of 548 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 109 PID 2160 wrote to memory of 3424 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 111 PID 2160 wrote to memory of 3424 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 111 PID 2160 wrote to memory of 3424 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 111 PID 2160 wrote to memory of 1828 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 113 PID 2160 wrote to memory of 1828 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 113 PID 2160 wrote to memory of 1828 2160 6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe 113 PID 1828 wrote to memory of 2960 1828 csrss.exe 114 PID 1828 wrote to memory of 2960 1828 csrss.exe 114 PID 1828 wrote to memory of 2960 1828 csrss.exe 114 PID 1828 wrote to memory of 2316 1828 csrss.exe 120 PID 1828 wrote to memory of 2316 1828 csrss.exe 120 PID 1828 wrote to memory of 2316 1828 csrss.exe 120 PID 1828 wrote to memory of 4628 1828 csrss.exe 122 PID 1828 wrote to memory of 4628 1828 csrss.exe 122 PID 1828 wrote to memory of 4628 1828 csrss.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe"C:\Users\Admin\AppData\Local\Temp\6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe"C:\Users\Admin\AppData\Local\Temp\6164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1360
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2492
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:32
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:4436
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:488
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:1360
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:3708
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:696
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:4436
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:5008
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57349034ffc7e8c6c0b6fc02a1f61ac65
SHA199c6dd5f49d7e9966bc30e5a4c21f53b0aa7bb3e
SHA256e256a87fe965bb426ec14cd216565f025134ceb143434c4f540a03af4a45eff8
SHA512a957d2794e5d1814632ea235915c82425898a13866f7d8acba98fa6fbb783291a351fbb08218310fe577310af45a7d118dfcba7f7dd3043edfd9da9d4c5006be
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54164645de9c79e85c3491527c8e3923f
SHA1a60134c227eaf5c4ae9854057591647b3c26a787
SHA256621521c39d57b331d40a31e938537e45030a51a610b3390a4828bd77e45a0940
SHA5125131d107217a0743ba0ee8546669fa5056b6f15a9705f82f93a1cc16c768fa55bc0ba46eb31a983d3e6b52d370b1f74f64c6f6524fb2ec1927698c4df75716c3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5575788f7d9c32dfefe2c41e86c9f859e
SHA1f3b280eec8b6e84c0ab941336d13b0479d77acb3
SHA256b7ca26a1d9857b2f630b1ce84f97e810b9bf4f97f281a1f73cbf6506b484e417
SHA5127d83ac67a75e1d9a817ede06ec2116de67d150c30e2a363038c7a2e12c2c7b0e631df908b94317cd5fba3aacf88f46901a501c3ac03a1c18d3db7e5d8ef0295d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5772e8e22f05ba5ef0de43372ca6d87f8
SHA15c33fb4992106be67bc1ca41ef3cdf2046d58852
SHA256519ce9ec66109683cbc3b5947b5b64b4ca90eff4987542d312fedf350196d2d4
SHA512a45a65e5cc148c639e45c6012b439b5692e63a58a5230eb879c0cd4b7480c6bab0b1eafa6c0fa2900a3669999a5e3be9d65438cd1e7aa4be306215729d3039f3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD524352dd670fec2f8d5cc03653586ed93
SHA1c8a62291bdec85b3217dda389b3614a8d4c4e3a5
SHA256ab229a1ab663b38a17e3d24ad24a955b3b53dac9f986597220b036504b660232
SHA512ca53de81afbc4271d5df62851cd610de387e235d2ea00c173f57b05cee980db691a27c30b9c1d6c94e60f53962211ac7d4c6fcb2dfe46709a0db32b32e87d6c6
-
Filesize
4.2MB
MD5185725cb6be455e4aa726f40b6811b87
SHA1dbdd4f07a5e1ef3b9e2fb6f44180716dc95cd520
SHA2566164e4aca8ce0c287ecb9c72b7012b9409a7e332049774d80e187bb23901196b
SHA512956dbe4adcde579ee7d5136f46e420c43c22da7aea864bd1bce581998b289ac418d8819dcd61795cc1e91a02abb0df145e068aaf9e79081ed9372bea99b770e4
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec