Analysis
-
max time kernel
299s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18-04-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe
Resource
win7-20240221-en
General
-
Target
0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe
-
Size
4.2MB
-
MD5
af60398f0dde0f0b4b42ba0109bc0c11
-
SHA1
7420e865c11906ab5f1bb7365decb3bb9cb2b83b
-
SHA256
0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f
-
SHA512
ee54333d7a97ecc5b18d382c95d6f2d25fa98f184c21cdf58386d18b7c94200d56fab49a4919b4d44fe3a3ead2cdfba099797be3ed13272fd98fd0927f722e3b
-
SSDEEP
98304:quyrGypqI+jQNI2yZdVf1PPEbZeKJfOVA1nr687Hqee:erGyDNIhzK8AxHKp
Malware Config
Signatures
-
Glupteba payload 37 IoCs
Processes:
resource yara_rule behavioral2/memory/2024-2-0x0000000005160000-0x0000000005A4B000-memory.dmp family_glupteba behavioral2/memory/2024-3-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2024-299-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2024-300-0x0000000005160000-0x0000000005A4B000-memory.dmp family_glupteba behavioral2/memory/4268-303-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/4268-800-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/4268-1043-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1047-0x0000000005500000-0x0000000005DEB000-memory.dmp family_glupteba behavioral2/memory/2520-1050-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1785-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1794-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1796-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1798-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1800-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1802-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1804-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1806-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1808-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1810-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1812-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1814-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1816-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1818-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1820-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1822-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1824-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1826-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1828-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1830-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1832-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1834-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1836-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1838-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1840-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1842-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1844-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba behavioral2/memory/2520-1846-0x0000000000400000-0x0000000003118000-memory.dmp family_glupteba -
Processes:
0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2232 netsh.exe -
Executes dropped EXE 4 IoCs
Processes:
csrss.exeinjector.exewindefender.exewindefender.exepid process 2520 csrss.exe 3344 injector.exe 4856 windefender.exe 4648 windefender.exe -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral2/memory/4856-1792-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4648-1795-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4648-1799-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Processes:
0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe -
Drops file in Windows directory 4 IoCs
Processes:
0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.execsrss.exedescription ioc process File opened for modification C:\Windows\rss 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe File created C:\Windows\rss\csrss.exe 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1172 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 988 schtasks.exe 4160 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exewindefender.exepowershell.exe0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-661 = "Cen. Australia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2512 = "Lord Howe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-492 = "India Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exepowershell.exe0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid process 2896 powershell.exe 2896 powershell.exe 2896 powershell.exe 2024 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 2024 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe 980 powershell.exe 980 powershell.exe 980 powershell.exe 4868 powershell.exe 4868 powershell.exe 4868 powershell.exe 4648 powershell.exe 4648 powershell.exe 4648 powershell.exe 360 powershell.exe 360 powershell.exe 360 powershell.exe 4940 powershell.exe 4940 powershell.exe 4940 powershell.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 2520 csrss.exe 2520 csrss.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 2520 csrss.exe 2520 csrss.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 2520 csrss.exe 2520 csrss.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe 3344 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exe0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 2024 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Token: SeImpersonatePrivilege 2024 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe Token: SeDebugPrivilege 816 powershell.exe Token: SeDebugPrivilege 980 powershell.exe Token: SeDebugPrivilege 4868 powershell.exe Token: SeDebugPrivilege 4648 powershell.exe Token: SeDebugPrivilege 360 powershell.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeSystemEnvironmentPrivilege 2520 csrss.exe Token: SeSecurityPrivilege 1172 sc.exe Token: SeSecurityPrivilege 1172 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.execmd.execsrss.exewindefender.execmd.exedescription pid process target process PID 2024 wrote to memory of 2896 2024 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 2024 wrote to memory of 2896 2024 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 2024 wrote to memory of 2896 2024 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 4268 wrote to memory of 816 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 4268 wrote to memory of 816 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 4268 wrote to memory of 816 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 4268 wrote to memory of 356 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe cmd.exe PID 4268 wrote to memory of 356 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe cmd.exe PID 356 wrote to memory of 2232 356 cmd.exe netsh.exe PID 356 wrote to memory of 2232 356 cmd.exe netsh.exe PID 4268 wrote to memory of 980 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 4268 wrote to memory of 980 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 4268 wrote to memory of 980 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 4268 wrote to memory of 4868 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 4268 wrote to memory of 4868 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 4268 wrote to memory of 4868 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe powershell.exe PID 4268 wrote to memory of 2520 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe csrss.exe PID 4268 wrote to memory of 2520 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe csrss.exe PID 4268 wrote to memory of 2520 4268 0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe csrss.exe PID 2520 wrote to memory of 4648 2520 csrss.exe windefender.exe PID 2520 wrote to memory of 4648 2520 csrss.exe windefender.exe PID 2520 wrote to memory of 4648 2520 csrss.exe windefender.exe PID 2520 wrote to memory of 360 2520 csrss.exe powershell.exe PID 2520 wrote to memory of 360 2520 csrss.exe powershell.exe PID 2520 wrote to memory of 360 2520 csrss.exe powershell.exe PID 2520 wrote to memory of 4940 2520 csrss.exe powershell.exe PID 2520 wrote to memory of 4940 2520 csrss.exe powershell.exe PID 2520 wrote to memory of 4940 2520 csrss.exe powershell.exe PID 2520 wrote to memory of 3344 2520 csrss.exe injector.exe PID 2520 wrote to memory of 3344 2520 csrss.exe injector.exe PID 4856 wrote to memory of 3648 4856 windefender.exe cmd.exe PID 4856 wrote to memory of 3648 4856 windefender.exe cmd.exe PID 4856 wrote to memory of 3648 4856 windefender.exe cmd.exe PID 3648 wrote to memory of 1172 3648 cmd.exe sc.exe PID 3648 wrote to memory of 1172 3648 cmd.exe sc.exe PID 3648 wrote to memory of 1172 3648 cmd.exe sc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe"C:\Users\Admin\AppData\Local\Temp\0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe"C:\Users\Admin\AppData\Local\Temp\0e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816 -
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4160 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:776
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3344 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:988 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a56faed2da8bc3977f1e2d08052b5524
SHA147444e600ef68c67ee19f579cc6194776d1cbb37
SHA256c9f206f052933428220133708b6c6a410dc1545cb6315b0aedaee86c35131dfd
SHA512092f67ffdc8b0dbe0ba48ad04fefb758620e606a70a415835bb5210f0d6ea725f11d54763ae5774271ecabbbc0eeee5233d2244ca2d06d88756d526519991796
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD51f342ed08e2d31e5e3f3b00a8b0e422a
SHA112332710064be939b9ce72553bca5ee4097b8f22
SHA256eaaadf97d569bbd8e3de0e236f4d841b5f4653147eb9bb2371adb645e4ca93be
SHA512073cf466d296da688cf085de1841bea19f47f0d87c2fd996a11cc357cd9c6e5900b2da881d608333d1d30c05910d5e53874b572056b191a5182ee330db2c7406
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD594303508e193b54320cf98c88452bf08
SHA11f89773de677ecb7dcc15f3fea2bbb2a2cb5ea04
SHA256b2bc54295f581400b46f2c1c149d5b3a42ec81bc4d96a1f2205ce4755d0cf7dd
SHA512d14c78ac939b7ba65098738b1d16f99659eca50e265d4c1b91d4338acb7e3a9b3a20d4acf18e4a84ac3a0d7c5f7f3dda05147d05502d78117dee97d499dea341
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD509f2ee260718c327f0d1a594fb6acfea
SHA17d6b12a5c412a6f5867a83b1b5027e4b11108981
SHA2566910a8038b7c29921e61f18d8fc229c335a8991cfea1ad262b15bc37d44e6c5b
SHA512cb90349e73af3b43d3665007d0d5123f3d4fc4288f7ab1a1d9cb3cea2584ab1b1e0343b3ff22c805614d8a2129edec0937bbbd9911ea50efdbcd4cc2d9d4572e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD52c43f5a002880abcfad66b6b75950bf1
SHA1d9067f2a43f9b2763465cadaceccd1b19308ba9c
SHA2561bbe0ea404839b53ff8f590398f9ec220f445a0804915c7871c709885b77df7f
SHA5129881be1afc67645535a1c87cc74cb49362d02daba7ad6c91997fc0097c33f5fb7bf66d07741a0dfac4e69dcecd12d6ccfc0f1942c6c445dce51abcbdac55adbc
-
Filesize
4.2MB
MD5af60398f0dde0f0b4b42ba0109bc0c11
SHA17420e865c11906ab5f1bb7365decb3bb9cb2b83b
SHA2560e2f764e25439b12e157acf4026e476170b035a63fdf03a7787804167342912f
SHA512ee54333d7a97ecc5b18d382c95d6f2d25fa98f184c21cdf58386d18b7c94200d56fab49a4919b4d44fe3a3ead2cdfba099797be3ed13272fd98fd0927f722e3b
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec