Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-04-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe
Resource
win10v2004-20240412-en
General
-
Target
3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe
-
Size
4.2MB
-
MD5
89d4272e02b7a1bfa1c3548925f01017
-
SHA1
21ec3caa6e0fccc0af966abcb0469d794eaea7c4
-
SHA256
3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000
-
SHA512
a5c6bf032b6ba18e2c4b2e55864fa3592dc984c7b1fda73ed6d98f5963b7ce4e854df18505df97d3ba2581cddf2f501e5718dcaaf5c6e1aca8d7c310b1de816d
-
SSDEEP
98304:Du15A1GiNRFuKfVvdEh8/k6ld6teGU//blllQO5EUt0+BFZRUpdVY+:DaARFuKJWhQkavn//blllQdNaFDGXJ
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/3816-2-0x0000000004040000-0x000000000492B000-memory.dmp family_glupteba behavioral2/memory/3816-3-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3000-52-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3000-53-0x0000000003F10000-0x00000000047FB000-memory.dmp family_glupteba behavioral2/memory/3816-78-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3000-190-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-244-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-255-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-259-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-263-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-267-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-271-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-275-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-279-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-283-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-287-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-291-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-295-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/1188-299-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3612 netsh.exe -
Executes dropped EXE 4 IoCs
Processes:
csrss.exeinjector.exewindefender.exewindefender.exepid process 1188 csrss.exe 2924 injector.exe 3360 windefender.exe 764 windefender.exe -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral2/memory/3360-253-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/764-258-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/764-265-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe -
Drops file in Windows directory 4 IoCs
Processes:
3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.execsrss.exedescription ioc process File opened for modification C:\Windows\rss 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe File created C:\Windows\rss\csrss.exe 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 920 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3308 schtasks.exe 4644 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exewindefender.exe3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-152 = "Central America Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-491 = "India Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exepowershell.exe3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid process 924 powershell.exe 924 powershell.exe 3816 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3816 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 4140 powershell.exe 4140 powershell.exe 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe 3696 powershell.exe 3696 powershell.exe 4640 powershell.exe 4640 powershell.exe 4772 powershell.exe 4772 powershell.exe 4412 powershell.exe 4412 powershell.exe 4220 powershell.exe 4220 powershell.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 1188 csrss.exe 1188 csrss.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 1188 csrss.exe 1188 csrss.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 1188 csrss.exe 1188 csrss.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe 2924 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exe3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 924 powershell.exe Token: SeDebugPrivilege 3816 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Token: SeImpersonatePrivilege 3816 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe Token: SeDebugPrivilege 4140 powershell.exe Token: SeDebugPrivilege 3696 powershell.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeDebugPrivilege 4772 powershell.exe Token: SeDebugPrivilege 4412 powershell.exe Token: SeDebugPrivilege 4220 powershell.exe Token: SeSystemEnvironmentPrivilege 1188 csrss.exe Token: SeSecurityPrivilege 920 sc.exe Token: SeSecurityPrivilege 920 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.execmd.execsrss.exewindefender.execmd.exedescription pid process target process PID 3816 wrote to memory of 924 3816 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3816 wrote to memory of 924 3816 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3816 wrote to memory of 924 3816 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3000 wrote to memory of 4140 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3000 wrote to memory of 4140 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3000 wrote to memory of 4140 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3000 wrote to memory of 4488 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe cmd.exe PID 3000 wrote to memory of 4488 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe cmd.exe PID 4488 wrote to memory of 3612 4488 cmd.exe netsh.exe PID 4488 wrote to memory of 3612 4488 cmd.exe netsh.exe PID 3000 wrote to memory of 3696 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3000 wrote to memory of 3696 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3000 wrote to memory of 3696 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3000 wrote to memory of 4640 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3000 wrote to memory of 4640 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3000 wrote to memory of 4640 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe powershell.exe PID 3000 wrote to memory of 1188 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe csrss.exe PID 3000 wrote to memory of 1188 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe csrss.exe PID 3000 wrote to memory of 1188 3000 3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe csrss.exe PID 1188 wrote to memory of 4772 1188 csrss.exe powershell.exe PID 1188 wrote to memory of 4772 1188 csrss.exe powershell.exe PID 1188 wrote to memory of 4772 1188 csrss.exe powershell.exe PID 1188 wrote to memory of 4412 1188 csrss.exe powershell.exe PID 1188 wrote to memory of 4412 1188 csrss.exe powershell.exe PID 1188 wrote to memory of 4412 1188 csrss.exe powershell.exe PID 1188 wrote to memory of 4220 1188 csrss.exe powershell.exe PID 1188 wrote to memory of 4220 1188 csrss.exe powershell.exe PID 1188 wrote to memory of 4220 1188 csrss.exe powershell.exe PID 1188 wrote to memory of 2924 1188 csrss.exe injector.exe PID 1188 wrote to memory of 2924 1188 csrss.exe injector.exe PID 3360 wrote to memory of 3384 3360 windefender.exe cmd.exe PID 3360 wrote to memory of 3384 3360 windefender.exe cmd.exe PID 3360 wrote to memory of 3384 3360 windefender.exe cmd.exe PID 3384 wrote to memory of 920 3384 cmd.exe sc.exe PID 3384 wrote to memory of 920 3384 cmd.exe sc.exe PID 3384 wrote to memory of 920 3384 cmd.exe sc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe"C:\Users\Admin\AppData\Local\Temp\3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe"C:\Users\Admin\AppData\Local\Temp\3dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3612
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3308
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:5108
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4644
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55ad6c16aa41a67f58ccd4018e4a42c4d
SHA1f121e2f47a82ce3a0fbb535d7ed92169bda3e1d4
SHA25659fd2148f4415348c0036b234675f2a8c027e446a8a8f038480eb44fd9322137
SHA512dc525bae8980ea200b7b34b7aa22181cc681172bc864a6648ebc686fddce29a5dbed05b7abf764839ccb2e659d4354f93825c4b65346592e7bd91142ba865dc8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD527d138dbc210a4db7b0671291e872130
SHA19ff1a5907fe84a0288c3faadb25568e8999f3efa
SHA256511bb54021d71628e0c9205332082ccc54b76d34f743c9b55e19c702e908eb97
SHA5128779d7423b6e32352f620256e3351ef13bba6f7b041cb46970bdbe293c37f9ad5fc202446f8ff660e78acc62e545b5c14277f8609d6a6e68259aff38d242e745
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5be8d38a4edc073aa7685057f81896aab
SHA12ac3a1758e3008837a9fa5376e27e92898b1a5a9
SHA256c644a7436bdc60f9e0736a365e8754d9c77f120ce7547354124b5b7b17963675
SHA512eb7e34f495e058e2ebd3a04971d263066b453f638e796ad1f8698811508d2ce0499e06a0fc1c22af6e99dbdec10e0d30d2b46e762555b33438fbb86ae056e84d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD593262603cd2834283e391c2a2ff536f5
SHA13a5fa2b3025525e6a3bd67a7b628f91ee457306b
SHA256277cb6b5bb01f89388cfd9e4831d55df96dbec9a985b247285d4640fd288b5b6
SHA5120ed88ae9bb31b90d20866276f32e79c1dd527ffec9ea34d183737c3e236014650227c32643ebf42f28265671ac666df6afa7ec1c2459bc9abafe4af28651de7d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59e6a26734bc931b32e720621573ec2b2
SHA16464a12928cfd3a1da6e7c35aa52c7d810d698ae
SHA256e07fe80b462ce911af9829b9d892c6f9f70b1183654a036bda115ccd423d4ee6
SHA512ca22bb7c8436c829471bddf9a6c11069eee657fbab5705c97b754c25869c2cdc86abd89c4d8de39fde895a18328c21e51f42383097d18085c90b47326191b617
-
Filesize
4.2MB
MD589d4272e02b7a1bfa1c3548925f01017
SHA121ec3caa6e0fccc0af966abcb0469d794eaea7c4
SHA2563dcce373d1f6fa8ff45d1f6f6c9335ec769ce24a50fb1d04ab20f81ed99b0000
SHA512a5c6bf032b6ba18e2c4b2e55864fa3592dc984c7b1fda73ed6d98f5963b7ce4e854df18505df97d3ba2581cddf2f501e5718dcaaf5c6e1aca8d7c310b1de816d
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec