Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe
Resource
win10v2004-20240412-en
General
-
Target
cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe
-
Size
4.2MB
-
MD5
ced2fa2c029344b943e92722f92b6d14
-
SHA1
1b4e049ad672c15909d2b831e8dfb34624a2a58c
-
SHA256
cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36
-
SHA512
1185676c4e7c34647ebeaef771232b046e5308be77b68d482edac036895dd6d1a63509103fb50d04bf291a15c02061149a9dcbe18ef896f8e84295228fbc96d6
-
SSDEEP
98304:CsszAFEnGNz30SIhwhwKnA0He/l5l69nvxQe8L:UAFEnAzkSSwh1nhb9nv9a
Malware Config
Signatures
-
Glupteba payload 20 IoCs
resource yara_rule behavioral2/memory/4184-2-0x0000000005370000-0x0000000005C5B000-memory.dmp family_glupteba behavioral2/memory/4184-3-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/4184-53-0x0000000005370000-0x0000000005C5B000-memory.dmp family_glupteba behavioral2/memory/2364-62-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/4184-77-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2364-127-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2364-163-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-215-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-227-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-231-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-235-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-239-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-243-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-247-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-251-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-254-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-258-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-262-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-266-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba behavioral2/memory/2220-270-0x0000000000400000-0x000000000310D000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1984 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2220 csrss.exe 3628 injector.exe 1952 windefender.exe 3548 windefender.exe -
resource yara_rule behavioral2/files/0x000200000002a9d5-221.dat upx behavioral2/memory/1952-225-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3548-229-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3548-237-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe File created C:\Windows\rss\csrss.exe cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2324 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2116 schtasks.exe 2460 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-131 = "US Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-451 = "Caucasus Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2891 = "Sudan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3124 powershell.exe 3124 powershell.exe 4184 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 4184 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 2272 powershell.exe 2272 powershell.exe 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 912 powershell.exe 912 powershell.exe 2848 powershell.exe 2848 powershell.exe 1696 powershell.exe 1696 powershell.exe 4060 powershell.exe 4060 powershell.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 2220 csrss.exe 2220 csrss.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 2220 csrss.exe 2220 csrss.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 2220 csrss.exe 2220 csrss.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe 3628 injector.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3124 powershell.exe Token: SeDebugPrivilege 4184 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Token: SeImpersonatePrivilege 4184 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe Token: SeDebugPrivilege 2272 powershell.exe Token: SeDebugPrivilege 912 powershell.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 1696 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeSystemEnvironmentPrivilege 2220 csrss.exe Token: SeSecurityPrivilege 2324 sc.exe Token: SeSecurityPrivilege 2324 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4184 wrote to memory of 3124 4184 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 82 PID 4184 wrote to memory of 3124 4184 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 82 PID 4184 wrote to memory of 3124 4184 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 82 PID 2364 wrote to memory of 2272 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 89 PID 2364 wrote to memory of 2272 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 89 PID 2364 wrote to memory of 2272 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 89 PID 2364 wrote to memory of 2628 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 91 PID 2364 wrote to memory of 2628 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 91 PID 2628 wrote to memory of 1984 2628 cmd.exe 93 PID 2628 wrote to memory of 1984 2628 cmd.exe 93 PID 2364 wrote to memory of 912 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 94 PID 2364 wrote to memory of 912 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 94 PID 2364 wrote to memory of 912 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 94 PID 2364 wrote to memory of 2848 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 96 PID 2364 wrote to memory of 2848 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 96 PID 2364 wrote to memory of 2848 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 96 PID 2364 wrote to memory of 2220 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 99 PID 2364 wrote to memory of 2220 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 99 PID 2364 wrote to memory of 2220 2364 cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe 99 PID 2220 wrote to memory of 1696 2220 csrss.exe 102 PID 2220 wrote to memory of 1696 2220 csrss.exe 102 PID 2220 wrote to memory of 1696 2220 csrss.exe 102 PID 2220 wrote to memory of 5036 2220 csrss.exe 108 PID 2220 wrote to memory of 5036 2220 csrss.exe 108 PID 2220 wrote to memory of 5036 2220 csrss.exe 108 PID 2220 wrote to memory of 4060 2220 csrss.exe 110 PID 2220 wrote to memory of 4060 2220 csrss.exe 110 PID 2220 wrote to memory of 4060 2220 csrss.exe 110 PID 2220 wrote to memory of 3628 2220 csrss.exe 112 PID 2220 wrote to memory of 3628 2220 csrss.exe 112 PID 1952 wrote to memory of 616 1952 windefender.exe 118 PID 1952 wrote to memory of 616 1952 windefender.exe 118 PID 1952 wrote to memory of 616 1952 windefender.exe 118 PID 616 wrote to memory of 2324 616 cmd.exe 119 PID 616 wrote to memory of 2324 616 cmd.exe 119 PID 616 wrote to memory of 2324 616 cmd.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe"C:\Users\Admin\AppData\Local\Temp\cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe"C:\Users\Admin\AppData\Local\Temp\cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1984
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2116
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
PID:5036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2460
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51041be95a086bf0d37483738215b2952
SHA1ffe2a30a24bf9eba6b1b8f3c3d525d15a0800077
SHA2560788bbc077d68fa288324a8b45c6cb18e2615ffbae02b91637040f4e6528a58e
SHA51231f6ba791b3d2cef2ed974bd1bc3b3ec04aad2aeeba76f4e2b171d7ffc8cfb158c1822be5429c8e1490075948965bfc6f2f006ee6f1047d69ff17061eef008dc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bb2254df8a2d3ef6f3d374cd50391694
SHA1d21f31c66dcdbff5f8b19aa26570a8d7a9ee158b
SHA25689fcfa3e8a41801b39ec881f06eba8c1e63e4162b9bfc4dd3c1e508fed918b22
SHA5129dd07146c6c9c5560b43a60ba86bd3b83d6cd7ffbb3588b5c4f52b44f4df168a9cd13d019ced49781fc5bd6a3c500ff5784f7ba3ec1a87469684c882428ae897
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55aa5a2c904ee41c26424ac8674bd210c
SHA1e04145dcb5ef7a2a4bfb232f98d6749f0b919367
SHA256e306f615e342cb0449e26a65f645c2d5c2ef0854dcec5124c532b7b7804f7b8d
SHA51225f9a436da5c7a54c4c9caa5cf7b487ba8e28df7c65c7b3b07e683511b018604c2f48b9c8ec7c3d9d63369ed37804f1b731c50ad313c3f38296569c9b010dd91
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50c3819814fcbdcd26be535824f49d8d0
SHA1bff4a7be51b3235adb8eff2198afe37497ec8576
SHA25608afc27ad1faefb441f11e23048aaeaa7b58a7ccdbe4f3d611f885d53779a2c9
SHA512530d730a6e66810b3c80fdf8a9508a02b5da46cce915d2eac5bcbfc0178f6b8b1934aecb903b1fdd4e04bb11c1bd17a536d79eb0e9ddf1ac09a203229cc07a2c
-
Filesize
4.2MB
MD5ced2fa2c029344b943e92722f92b6d14
SHA11b4e049ad672c15909d2b831e8dfb34624a2a58c
SHA256cafaa489fb7966bcaeb55e654144ec5d794dfd9f9198c2f0ff4a477669cd9a36
SHA5121185676c4e7c34647ebeaef771232b046e5308be77b68d482edac036895dd6d1a63509103fb50d04bf291a15c02061149a9dcbe18ef896f8e84295228fbc96d6
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec