Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/04/2024, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe
Resource
win10v2004-20240412-en
General
-
Target
e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe
-
Size
4.2MB
-
MD5
b3dfe493bea72db1cf25c2ecf858f2f6
-
SHA1
4e38e39c15cf96bd1ed9d5a85ba09f35a1bc6219
-
SHA256
e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f
-
SHA512
271642301a276cfa2dd674f41468cf5254438665dc2dc1fdfdd0d43beb84cc7de803486e10431190b2009f2048467c284be5ed114d2c3519b679e909c02033d2
-
SSDEEP
98304:VBy5JAu+Hk0Et5Mgg8VWlfA2+5+VVv7Fm6fCi:OAu+ENnjVyYiVNw4D
Malware Config
Signatures
-
Glupteba payload 15 IoCs
resource yara_rule behavioral2/memory/2932-2-0x0000000004100000-0x00000000049EB000-memory.dmp family_glupteba behavioral2/memory/2932-3-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/840-53-0x0000000003FE0000-0x00000000048CB000-memory.dmp family_glupteba behavioral2/memory/840-54-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/2932-77-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/840-133-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/840-196-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3952-224-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3952-242-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3952-258-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3952-274-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3952-290-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3952-306-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3952-322-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba behavioral2/memory/3952-338-0x0000000000400000-0x0000000001DFD000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3240 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 3952 csrss.exe -
resource yara_rule behavioral2/memory/1376-239-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3140-256-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3140-288-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-834482027-582050234-2368284635-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\S-1-5-21-834482027-582050234-2368284635-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe File created C:\Windows\rss\csrss.exe e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1116 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2852 schtasks.exe 4728 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-71 = "Newfoundland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-652 = "AUS Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5064 powershell.exe 5064 powershell.exe 2932 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 2932 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 1644 powershell.exe 1644 powershell.exe 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 2044 powershell.exe 2044 powershell.exe 4548 powershell.exe 4548 powershell.exe 4356 powershell.exe 4356 powershell.exe 1524 powershell.exe 1524 powershell.exe 5036 powershell.exe 5036 powershell.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe 1688 injector.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 5064 powershell.exe Token: SeDebugPrivilege 2932 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Token: SeImpersonatePrivilege 2932 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 2044 powershell.exe Token: SeDebugPrivilege 4548 powershell.exe Token: SeDebugPrivilege 4356 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 5036 powershell.exe Token: SeSecurityPrivilege 1116 sc.exe Token: SeSecurityPrivilege 1116 sc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2932 wrote to memory of 5064 2932 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 81 PID 2932 wrote to memory of 5064 2932 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 81 PID 2932 wrote to memory of 5064 2932 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 81 PID 840 wrote to memory of 1644 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 87 PID 840 wrote to memory of 1644 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 87 PID 840 wrote to memory of 1644 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 87 PID 840 wrote to memory of 4036 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 89 PID 840 wrote to memory of 4036 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 89 PID 4036 wrote to memory of 3240 4036 cmd.exe 91 PID 4036 wrote to memory of 3240 4036 cmd.exe 91 PID 840 wrote to memory of 2044 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 92 PID 840 wrote to memory of 2044 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 92 PID 840 wrote to memory of 2044 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 92 PID 840 wrote to memory of 4548 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 94 PID 840 wrote to memory of 4548 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 94 PID 840 wrote to memory of 4548 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 94 PID 840 wrote to memory of 3952 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 96 PID 840 wrote to memory of 3952 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 96 PID 840 wrote to memory of 3952 840 e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe 96 PID 1376 wrote to memory of 4124 1376 windefender.exe 113 PID 1376 wrote to memory of 4124 1376 windefender.exe 113 PID 1376 wrote to memory of 4124 1376 windefender.exe 113 PID 4124 wrote to memory of 1116 4124 cmd.exe 114 PID 4124 wrote to memory of 1116 4124 cmd.exe 114 PID 4124 wrote to memory of 1116 4124 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe"C:\Users\Admin\AppData\Local\Temp\e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe"C:\Users\Admin\AppData\Local\Temp\e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3240
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2852
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3520
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4728
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Modifies data under HKEY_USERS
PID:3140
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51d9000677fa409a436713fa72c1a03de
SHA1e08abeecfe42e04fa1356258cf19618394db7903
SHA2565026bcafaeb06b7cb047c0a36720e7a92a8a3b82bfd688998569cfbd53fb035e
SHA512fca302ded63aa4f6e57b9a4690e87693c6a7bdd1dc782835e30f269054d0978a76c7ee890fe53b2c2aca5c4fdb2e4b4aeb0c4384fdd8fcbaba279d5f786d6a3e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56a0e90349dc90188d6b697b762cfe22a
SHA174b5d58c74663abf44948f9b749000e66f03f397
SHA256afbd5b190f4112242f95baa737aee58ea8b2ee638b20bf71de0e28036f2693b4
SHA512ded2563a5f379edc7f692df955e12e030337215a2e7709dfea3905ea7b94c29f4656ebc928eee23cebad8474fdf42d30d197dffd09b1056612e4446bc55c5355
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56fd47704e60341a313fa64a00ced0ff7
SHA174caacd9a94bb76ae02b41170fdd48160eae21d4
SHA256a7b459b96ce539dedecc97e960a35eb80729c34adb42b3278a49f9029ce69ca1
SHA512f27fc0656c16379abe0d46758c5d5616f528081044786c6ec1cd3467dcf169684a11ab65ade0c52c936fb3edae92f4a3786e0507bea7506330fa2bad61a33b94
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5296623a7907b80be27c46ae532f196b9
SHA1e1ba2be914748e4d6384ac12a05bcdb64bb3bd67
SHA2563da8951e56c39a46debc2aa7ba41969bb5680cd147bfbc78bde3f24025efe24e
SHA512d0f3569d07ac459741eeece59e03babe3cc69c9d9b1d181e55d1368bf5427b2ea240381e4b39a7434038f9eb69fbb202abdeeaa26e571d5c0de4e4acfdc5047a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5de977f7ea172148609fa2cbc076ab9b0
SHA107d0a9fab5914b120715fd5df4529c6aca9a98ab
SHA25637deeadd8898736a5582906af9e8d89c4fec1f57f291a7f8396936fdb454c673
SHA512df44eb1913c0076436267f34558a75bf8e74ee8f25d4936f5eb17dce8c543826ae84e18b6eb386462db752ebe5f02d83c5260eb57682ccff779edbc55af45a86
-
Filesize
4.2MB
MD5b3dfe493bea72db1cf25c2ecf858f2f6
SHA14e38e39c15cf96bd1ed9d5a85ba09f35a1bc6219
SHA256e45c74fce0369066e0918bf98bbb75af67642036dae661878f125afd98e67e2f
SHA512271642301a276cfa2dd674f41468cf5254438665dc2dc1fdfdd0d43beb84cc7de803486e10431190b2009f2048467c284be5ed114d2c3519b679e909c02033d2