Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe
Resource
win10v2004-20240412-en
General
-
Target
ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe
-
Size
4.2MB
-
MD5
9ec0e4ee92883afff17b5f56c23265b0
-
SHA1
91af366244059ac09b0b34b94166c6a56fdd18a3
-
SHA256
ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63
-
SHA512
2f4212d31342108904519d4bba2087f498fbe63c97c147f2f4ed5d052c495be629450c3244e3b46a416f9c3d5f0dde427070fce6e6347546c7c40be11e48f9ed
-
SSDEEP
98304:EwoxqRNHtYTbrnnqfLVkrWMdzx639PKF8Qx9:fXR9tYTb7qxEbNx6NSx9
Malware Config
Signatures
-
Glupteba payload 20 IoCs
resource yara_rule behavioral2/memory/3184-2-0x0000000005390000-0x0000000005C7B000-memory.dmp family_glupteba behavioral2/memory/3184-3-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/3056-54-0x0000000005230000-0x0000000005B1B000-memory.dmp family_glupteba behavioral2/memory/3056-55-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/3184-78-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/3056-126-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/3056-149-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-242-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-252-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-257-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-261-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-265-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-269-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-273-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-277-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-281-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-285-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-288-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-292-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2800-296-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2140 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2800 csrss.exe 4540 injector.exe 2808 windefender.exe 2152 windefender.exe -
resource yara_rule behavioral2/files/0x000200000002a9e0-246.dat upx behavioral2/memory/2808-251-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2152-255-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2152-263-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-801878912-692986033-442676226-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Set value (str) \REGISTRY\USER\S-1-5-21-801878912-692986033-442676226-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe File created C:\Windows\rss\csrss.exe ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe File created C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 936 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3888 schtasks.exe 788 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2871 = "Magallanes Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2591 = "Tocantins Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4988 powershell.exe 4988 powershell.exe 3184 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 3184 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 1044 powershell.exe 1044 powershell.exe 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 4144 powershell.exe 4144 powershell.exe 404 powershell.exe 404 powershell.exe 2356 powershell.exe 2356 powershell.exe 2512 powershell.exe 2512 powershell.exe 828 powershell.exe 828 powershell.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 2800 csrss.exe 2800 csrss.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 2800 csrss.exe 2800 csrss.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 2800 csrss.exe 2800 csrss.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe 4540 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4988 powershell.exe Token: SeDebugPrivilege 3184 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Token: SeImpersonatePrivilege 3184 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe Token: SeDebugPrivilege 1044 powershell.exe Token: SeDebugPrivilege 4144 powershell.exe Token: SeDebugPrivilege 404 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2512 powershell.exe Token: SeDebugPrivilege 828 powershell.exe Token: SeSystemEnvironmentPrivilege 2800 csrss.exe Token: SeSecurityPrivilege 936 sc.exe Token: SeSecurityPrivilege 936 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3184 wrote to memory of 4988 3184 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 81 PID 3184 wrote to memory of 4988 3184 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 81 PID 3184 wrote to memory of 4988 3184 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 81 PID 3056 wrote to memory of 1044 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 86 PID 3056 wrote to memory of 1044 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 86 PID 3056 wrote to memory of 1044 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 86 PID 3056 wrote to memory of 1436 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 88 PID 3056 wrote to memory of 1436 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 88 PID 1436 wrote to memory of 2140 1436 cmd.exe 90 PID 1436 wrote to memory of 2140 1436 cmd.exe 90 PID 3056 wrote to memory of 4144 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 91 PID 3056 wrote to memory of 4144 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 91 PID 3056 wrote to memory of 4144 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 91 PID 3056 wrote to memory of 404 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 93 PID 3056 wrote to memory of 404 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 93 PID 3056 wrote to memory of 404 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 93 PID 3056 wrote to memory of 2800 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 95 PID 3056 wrote to memory of 2800 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 95 PID 3056 wrote to memory of 2800 3056 ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe 95 PID 2800 wrote to memory of 2356 2800 csrss.exe 96 PID 2800 wrote to memory of 2356 2800 csrss.exe 96 PID 2800 wrote to memory of 2356 2800 csrss.exe 96 PID 2800 wrote to memory of 2512 2800 csrss.exe 102 PID 2800 wrote to memory of 2512 2800 csrss.exe 102 PID 2800 wrote to memory of 2512 2800 csrss.exe 102 PID 2800 wrote to memory of 828 2800 csrss.exe 104 PID 2800 wrote to memory of 828 2800 csrss.exe 104 PID 2800 wrote to memory of 828 2800 csrss.exe 104 PID 2800 wrote to memory of 4540 2800 csrss.exe 106 PID 2800 wrote to memory of 4540 2800 csrss.exe 106 PID 2808 wrote to memory of 3180 2808 windefender.exe 112 PID 2808 wrote to memory of 3180 2808 windefender.exe 112 PID 2808 wrote to memory of 3180 2808 windefender.exe 112 PID 3180 wrote to memory of 936 3180 cmd.exe 113 PID 3180 wrote to memory of 936 3180 cmd.exe 113 PID 3180 wrote to memory of 936 3180 cmd.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe"C:\Users\Admin\AppData\Local\Temp\ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe"C:\Users\Admin\AppData\Local\Temp\ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2140
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3888
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1720
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:788
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5805874a0464562033c2260b271094426
SHA132a3945a5046bbdbcc88433fcb6067b4040f4683
SHA2569578060efe1a2276170ca0abeb91377e876195b81a9e5188cc9d3a751d1f8cf7
SHA512e4e2917b17627d07b2f1e9a5b94d22c8a23e9545e95e2c7de4ca9470183d078521fb181a024a6179e07d4343a2aaa3fea62f4c3b360b8ca640d1b13a04aad988
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59ddfb5654e730a52360cfaa0679386c3
SHA1b36944441442bc6fda47abfe2fedc6647d9dfcb9
SHA25647d41d970da6d7f0f6907d5d84125c12e1ef8c8352211d44575dfff0351512ff
SHA512fa7d2fef7420a004df300aaf733784fb1e076c49215fc0623ddb6c63f3a8785666b5375e862ae367333f3fa5dce41684bce0d775f80d68a0e3e17e9bc3ba266d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ba1283768a4f4bedb63fc8df528faeaa
SHA188d4e8daf5de2e16b0e46cde640ecde66cb91232
SHA256233ae30342a33796f12260940a90bb6f23b24a5f8438adb4f84e3a6c40e169c8
SHA5122d0acf20351675577e301dfd29d3e72749dd2575aabee01a054eac090741c3fc8fc2f47d9cdc82186bb9214675ea52ba07f5d6dc0257e0fcbb71cab6357eb721
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52382e61073b63854bb2b3f9bd92774a1
SHA1ae57c2386eb4af58e9fcf74c5e570a52fb153c24
SHA2560642017eb86dc98091298106c2c56f03dd255cc0bf41e71d00962aeef3c9b385
SHA51263018087c10b79806fe4223f8ce87a4865cec39475133b71cb607416b101f597587b7832bfd124e0445040d474f7ab9eb5a5fb86f5a91cdfaf6bd2fe30387400
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b3a2a5216f3c693d5e4480421a143b23
SHA121c8daf619b35b93144ab41f448c04b9713fe488
SHA2562fd00c47df2f5a4f8086dfa2ef9b99864b645916d8a50222f3f183519c71d2c1
SHA5127f0a4f9cd4c927aa4a84b3e231fb9ba92361ddbc74868e16f42f57a7baf6cff1b248543c0614a3c5ecac2f918476e9b24fe668ed52f53bc3aa5de38f97959bb7
-
Filesize
4.2MB
MD59ec0e4ee92883afff17b5f56c23265b0
SHA191af366244059ac09b0b34b94166c6a56fdd18a3
SHA256ebdb1f7c54546f4859e5805be4dbdb3a8785ef41312324e4182b148fe1f70e63
SHA5122f4212d31342108904519d4bba2087f498fbe63c97c147f2f4ed5d052c495be629450c3244e3b46a416f9c3d5f0dde427070fce6e6347546c7c40be11e48f9ed
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec