Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/04/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe
Resource
win10v2004-20240412-en
General
-
Target
41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe
-
Size
4.2MB
-
MD5
5a116703581878f4e298551a62cae904
-
SHA1
2dff27302ed1b1996f5722f7d56655ed44350982
-
SHA256
41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3
-
SHA512
193199fb70f5ba8ca47c14da1406dfbc6f20fc74708a2c0220a40c2955491051d6b90d7639ddeff670538757ef1000c24595f1c0eb533cafbe8ee1f559414a1c
-
SSDEEP
98304:m3vZTnjS5GCKvA/oSgOrUma7UiV1QsRLti3SkD:2ZTnjSw8A2VCUio4LxS
Malware Config
Signatures
-
Glupteba payload 20 IoCs
resource yara_rule behavioral2/memory/2740-2-0x0000000005370000-0x0000000005C5B000-memory.dmp family_glupteba behavioral2/memory/2740-3-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/2740-47-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/3448-55-0x0000000005240000-0x0000000005B2B000-memory.dmp family_glupteba behavioral2/memory/3448-56-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/2740-67-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/3448-71-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/3448-116-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/3448-120-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/3448-152-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/4772-196-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/4772-250-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/4772-253-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/4772-256-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/4772-259-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/4772-262-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/4772-265-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/4772-268-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/4772-271-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba behavioral2/memory/4772-274-0x0000000000400000-0x000000000310F000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3984 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 4772 csrss.exe 2268 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-825860316-2493133627-3905166409-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-825860316-2493133627-3905166409-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe File created C:\Windows\rss\csrss.exe 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1624 schtasks.exe 1264 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 808 powershell.exe 808 powershell.exe 2740 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 2740 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 4044 powershell.exe 4044 powershell.exe 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 4540 powershell.exe 4540 powershell.exe 1772 powershell.exe 1772 powershell.exe 2012 powershell.exe 2012 powershell.exe 5056 powershell.exe 5056 powershell.exe 1576 powershell.exe 1576 powershell.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 4772 csrss.exe 4772 csrss.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 4772 csrss.exe 4772 csrss.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe 2268 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 808 powershell.exe Token: SeDebugPrivilege 2740 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Token: SeImpersonatePrivilege 2740 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe Token: SeDebugPrivilege 4044 powershell.exe Token: SeDebugPrivilege 4540 powershell.exe Token: SeDebugPrivilege 1772 powershell.exe Token: SeDebugPrivilege 2012 powershell.exe Token: SeDebugPrivilege 5056 powershell.exe Token: SeDebugPrivilege 1576 powershell.exe Token: SeSystemEnvironmentPrivilege 4772 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2740 wrote to memory of 808 2740 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 82 PID 2740 wrote to memory of 808 2740 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 82 PID 2740 wrote to memory of 808 2740 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 82 PID 3448 wrote to memory of 4044 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 87 PID 3448 wrote to memory of 4044 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 87 PID 3448 wrote to memory of 4044 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 87 PID 3448 wrote to memory of 4708 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 89 PID 3448 wrote to memory of 4708 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 89 PID 4708 wrote to memory of 3984 4708 cmd.exe 91 PID 4708 wrote to memory of 3984 4708 cmd.exe 91 PID 3448 wrote to memory of 4540 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 92 PID 3448 wrote to memory of 4540 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 92 PID 3448 wrote to memory of 4540 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 92 PID 3448 wrote to memory of 1772 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 94 PID 3448 wrote to memory of 1772 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 94 PID 3448 wrote to memory of 1772 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 94 PID 3448 wrote to memory of 4772 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 96 PID 3448 wrote to memory of 4772 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 96 PID 3448 wrote to memory of 4772 3448 41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe 96 PID 4772 wrote to memory of 2012 4772 csrss.exe 97 PID 4772 wrote to memory of 2012 4772 csrss.exe 97 PID 4772 wrote to memory of 2012 4772 csrss.exe 97 PID 4772 wrote to memory of 5056 4772 csrss.exe 103 PID 4772 wrote to memory of 5056 4772 csrss.exe 103 PID 4772 wrote to memory of 5056 4772 csrss.exe 103 PID 4772 wrote to memory of 1576 4772 csrss.exe 105 PID 4772 wrote to memory of 1576 4772 csrss.exe 105 PID 4772 wrote to memory of 1576 4772 csrss.exe 105 PID 4772 wrote to memory of 2268 4772 csrss.exe 107 PID 4772 wrote to memory of 2268 4772 csrss.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe"C:\Users\Admin\AppData\Local\Temp\41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Users\Admin\AppData\Local\Temp\41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe"C:\Users\Admin\AppData\Local\Temp\41d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3984
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1624
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4524
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59b3129e39eb84e591183c3d89f98f7e5
SHA1647e793a9dafbfc0dd864ed550005f9065cf803f
SHA2561be8a8ce4efe5810233627cf27ea30836a128d897de3085f1cf061535fe5e833
SHA512c00800fbc6d73ade0380fbe4d69d39b62792f727f3b11201f2ff180d6ef9b21d99d993aa7801656f02b2865396a580bee8075cd1fa21d0d655d0d20f92961c13
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a696d1d32d136aa3a8b714080a5bc193
SHA13cc15bbff04a1cec301169e6603f776518560795
SHA256c80380b0081affc8bff01f8a0ddb1b1b9693613a5b1b39f9c1fa8b9ce8edb2fa
SHA5128721751358b86f52b635924ba08f053e314e8cc8ead9975b604800d5960bab8da85835d81b4849d93ed48ced3cc79462cb97492acb700efa6d2b2407c3f85d4b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50a09a757c1ee5fe016608a65f187e61f
SHA1409dc5c13918f806d62aaad96ed2b5e1c3c1b36a
SHA256a58c411fd88510eac0aa2fb90bcf12b80768b5981130be59e11eae6525cabf11
SHA5123a67cf74579f9c107d13930fa8e4e3b8b21e2e67c4252ee1ebc6e5f8df9b32b2d438479e48ec04fa933f25a8c0bc21d5aa1c11fe5d751a4519d692f10c009fe5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD591fa91ad73fc1976229328b3c3500961
SHA1c8d4a71452ce03e87fe5689d305c16dd9bb8e9c5
SHA256bc640434c0225d917eb4ecde9affb49cba35e635dff524b9fc11ae3b8f89ef4a
SHA512e353ca0c4ab2803c024e5f9fd326363322412f360c5caeaf7a4244dc2a7fbc2e2414d575f33c7945ac77f083b94b165aa4a394f00c2c88eaf70447f6b005638f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5780523c6aebcff2826e8707418899462
SHA19e1e240519ea141e6113c261ada1a875c3bad84a
SHA2566974a88589cf64d9f74befc310a6affdba6fda8a58d6d8f53698b904a2cea3b6
SHA512d4ec79967e297649dbdfef2c4dc8a137ecc41329f22303f7bc6975fa418e2f222a77cb329b549b570fed35268238f8a24dc536947965da262072af9ba80796b7
-
Filesize
4.2MB
MD55a116703581878f4e298551a62cae904
SHA12dff27302ed1b1996f5722f7d56655ed44350982
SHA25641d99ac84eb2e08ab1d39e25ca1e89f363f8e8817be40e21073b99ca254b57f3
SHA512193199fb70f5ba8ca47c14da1406dfbc6f20fc74708a2c0220a40c2955491051d6b90d7639ddeff670538757ef1000c24595f1c0eb533cafbe8ee1f559414a1c