Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe
Resource
win10v2004-20240412-en
General
-
Target
5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe
-
Size
4.2MB
-
MD5
2512b08a1bc97d813797fc59f756a374
-
SHA1
9973655d71eec6b09b3cee646dc8f2afbe541251
-
SHA256
5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c
-
SHA512
a84d3930c1feca2c50aa448d2f06e38f660a940413f479a314402a5002ccb59bb87c03c36839fb6398eebf8b3ec7ddf30e386ea13e5f57009ee61ddbd8821131
-
SSDEEP
98304:7u15A1GiNRFuKfVvdEh8/k6ld6teGU//blllQO5EUt0+BFZRUpdVYn:7aARFuKJWhQkavn//blllQdNaFDGX0
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1888-2-0x0000000003E10000-0x00000000046FB000-memory.dmp family_glupteba behavioral1/memory/1888-3-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/864-57-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1888-70-0x0000000003E10000-0x00000000046FB000-memory.dmp family_glupteba behavioral1/memory/1888-84-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/864-221-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-256-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-267-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-271-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-275-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-279-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-283-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-287-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-291-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-295-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-299-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-303-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-307-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral1/memory/1044-311-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 5072 netsh.exe -
Executes dropped EXE 4 IoCs
Processes:
csrss.exeinjector.exewindefender.exewindefender.exepid process 1044 csrss.exe 3496 injector.exe 224 windefender.exe 2724 windefender.exe -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral1/memory/224-264-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2724-269-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2724-277-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
csrss.exe5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe -
Drops file in Windows directory 4 IoCs
Processes:
5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.execsrss.exedescription ioc process File opened for modification C:\Windows\rss 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe File created C:\Windows\rss\csrss.exe 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2308 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 760 schtasks.exe 2084 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
windefender.exepowershell.exepowershell.exepowershell.exe5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-3051 = "Qyzylorda Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1912 = "Russia TZ 10 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2942 = "Sao Tome Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exepowershell.exe5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid process 3708 powershell.exe 3708 powershell.exe 1888 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 1888 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 1472 powershell.exe 1472 powershell.exe 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe 3956 powershell.exe 3956 powershell.exe 372 powershell.exe 372 powershell.exe 2796 powershell.exe 2796 powershell.exe 848 powershell.exe 848 powershell.exe 3920 powershell.exe 3920 powershell.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 1044 csrss.exe 1044 csrss.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 1044 csrss.exe 1044 csrss.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 1044 csrss.exe 1044 csrss.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe 3496 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exe5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 3708 powershell.exe Token: SeDebugPrivilege 1888 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Token: SeImpersonatePrivilege 1888 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 3956 powershell.exe Token: SeDebugPrivilege 372 powershell.exe Token: SeDebugPrivilege 2796 powershell.exe Token: SeDebugPrivilege 848 powershell.exe Token: SeDebugPrivilege 3920 powershell.exe Token: SeSystemEnvironmentPrivilege 1044 csrss.exe Token: SeSecurityPrivilege 2308 sc.exe Token: SeSecurityPrivilege 2308 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.execmd.execsrss.exewindefender.execmd.exedescription pid process target process PID 1888 wrote to memory of 3708 1888 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 1888 wrote to memory of 3708 1888 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 1888 wrote to memory of 3708 1888 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 864 wrote to memory of 1472 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 864 wrote to memory of 1472 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 864 wrote to memory of 1472 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 864 wrote to memory of 2192 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe cmd.exe PID 864 wrote to memory of 2192 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe cmd.exe PID 2192 wrote to memory of 5072 2192 cmd.exe netsh.exe PID 2192 wrote to memory of 5072 2192 cmd.exe netsh.exe PID 864 wrote to memory of 3956 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 864 wrote to memory of 3956 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 864 wrote to memory of 3956 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 864 wrote to memory of 372 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 864 wrote to memory of 372 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 864 wrote to memory of 372 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe powershell.exe PID 864 wrote to memory of 1044 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe csrss.exe PID 864 wrote to memory of 1044 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe csrss.exe PID 864 wrote to memory of 1044 864 5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe csrss.exe PID 1044 wrote to memory of 2796 1044 csrss.exe powershell.exe PID 1044 wrote to memory of 2796 1044 csrss.exe powershell.exe PID 1044 wrote to memory of 2796 1044 csrss.exe powershell.exe PID 1044 wrote to memory of 848 1044 csrss.exe powershell.exe PID 1044 wrote to memory of 848 1044 csrss.exe powershell.exe PID 1044 wrote to memory of 848 1044 csrss.exe powershell.exe PID 1044 wrote to memory of 3920 1044 csrss.exe powershell.exe PID 1044 wrote to memory of 3920 1044 csrss.exe powershell.exe PID 1044 wrote to memory of 3920 1044 csrss.exe powershell.exe PID 1044 wrote to memory of 3496 1044 csrss.exe injector.exe PID 1044 wrote to memory of 3496 1044 csrss.exe injector.exe PID 224 wrote to memory of 2840 224 windefender.exe cmd.exe PID 224 wrote to memory of 2840 224 windefender.exe cmd.exe PID 224 wrote to memory of 2840 224 windefender.exe cmd.exe PID 2840 wrote to memory of 2308 2840 cmd.exe sc.exe PID 2840 wrote to memory of 2308 2840 cmd.exe sc.exe PID 2840 wrote to memory of 2308 2840 cmd.exe sc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe"C:\Users\Admin\AppData\Local\Temp\5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe"C:\Users\Admin\AppData\Local\Temp\5c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:5072
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:760
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3880
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2084
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58cd54a9f3a63933ab0d1a0ad300fa37f
SHA1b05eb5102401c2b954ec727452a7cc453a2a1ffe
SHA25657b65c8ba7452c308c7a444bf009281b919be18ccebf546283a76c64a588fa19
SHA5128a55255019448cca464221dc68aa4e198a8b40b9cf26ac431a38941f72f5e0e5b3f6e897290a2c1c02f99392025e0e281d288a94804b5147499db29dd9a60901
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f7631c5ed819925b691413953fa42a8c
SHA1cfbe811fa92755c9c59d5729a55ad1c779705465
SHA256e4c7a87c5d9d719fe9397fbd65289139a8000ded53738e421b857bdd00d7b8d5
SHA512307a3f6a7b8a486600f40e479ecf7c62c4901cec14db59f213a4c88de5f3fcb33c702e72e744ceab70d611b8e797dd0889744570eb4386e7c8f80eb115ad7997
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54f424216226df0d069a66ea89848ce97
SHA119346120c0e39f2dcb7b972c979e40175c23fcb7
SHA256d1f7da0c3209fe9d2b3b3fb28a0cf51c6e1281157d251ffacce8082c6f5af559
SHA512f6c31e239177505c840d732375bcc6d1182d9915deb1245f1f0a95358ac9eb77d913a84edebb994af53e9df9644df2b40d36963542391a473fc886fd7892186b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59b8dd98116ded711db2da284a71b449f
SHA150788ee7cbd54dd9bfd4ff820c6785959c67f29f
SHA256697a6c250f88ad7e23b5d7fc57675e46f0cc002b834d662de7fd71cbd3959cd7
SHA512f5d2f8dc22bfd8cab844c0961faec4a1ed7cd9032c62c83f7819173043fb782ccd6eea072aa38870542d3138c4d286e3953932dec98a8d638dfb69cb5364bf73
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57f337af066a34494253c74c07c1ae8b8
SHA114be6d20be960c208cfb03c7b54bfd20d7940565
SHA2562484a3fbfb3dcbd1ecc845bd447bae779d7a6966fdfad1169b83932142006050
SHA5128924b1810f1525fc0f29a551e1979ce95ab66fe9b66825401e4f98daf6ac6200c270e86e926f4febae08e86694995d3ceadd7b8c2be06982a7fe24b03ed9b236
-
Filesize
4.2MB
MD52512b08a1bc97d813797fc59f756a374
SHA19973655d71eec6b09b3cee646dc8f2afbe541251
SHA2565c3f4241fbb64a371dc6ee56dc53a2bf9cf6c5715e7cae5f0218f9bc20ae6f6c
SHA512a84d3930c1feca2c50aa448d2f06e38f660a940413f479a314402a5002ccb59bb87c03c36839fb6398eebf8b3ec7ddf30e386ea13e5f57009ee61ddbd8821131
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec