Analysis
-
max time kernel
115s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe
Resource
win10v2004-20240226-en
General
-
Target
384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe
-
Size
4.2MB
-
MD5
3f3343c89545fedc460427c1cba42f6e
-
SHA1
3d664c1f1853a6fd47d2b46011d8cad3aeee5b9d
-
SHA256
384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625
-
SHA512
69ab1ec47eef39ac44004afeca8cb3ca774f423cd36b3bb34ddfdd76e9c78753a5997755a37cb893194087512ab145907843de6352132a108fbd3ebbb102e7e1
-
SSDEEP
98304:H5+mIL5L7IQj8yJZZuDoiuzYljTftPavivh2zh/weL:Z+zh739J3uDoioYlH4vmAzhzL
Malware Config
Signatures
-
Glupteba payload 13 IoCs
resource yara_rule behavioral1/memory/3372-2-0x00000000050F0000-0x00000000059DB000-memory.dmp family_glupteba behavioral1/memory/3372-3-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/3372-4-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/3372-30-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/3372-58-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/3372-59-0x00000000050F0000-0x00000000059DB000-memory.dmp family_glupteba behavioral1/memory/4736-61-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/4736-96-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/4736-158-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/2508-194-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/2508-259-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/2508-268-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral1/memory/2508-271-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3896 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2508 csrss.exe -
resource yara_rule behavioral1/files/0x0004000000000711-264.dat upx behavioral1/memory/1160-269-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/856-272-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe File opened for modification C:\Windows\rss 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2708 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4576 3372 WerFault.exe 90 4472 4736 WerFault.exe 99 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1824 schtasks.exe 896 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3116 powershell.exe 3116 powershell.exe 3372 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 3372 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 3316 powershell.exe 3316 powershell.exe 3316 powershell.exe 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 1984 powershell.exe 1984 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 3372 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Token: SeImpersonatePrivilege 3372 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe Token: SeDebugPrivilege 3316 powershell.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeDebugPrivilege 3988 powershell.exe Token: SeDebugPrivilege 1984 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3372 wrote to memory of 3116 3372 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 92 PID 3372 wrote to memory of 3116 3372 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 92 PID 3372 wrote to memory of 3116 3372 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 92 PID 4736 wrote to memory of 3316 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 107 PID 4736 wrote to memory of 3316 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 107 PID 4736 wrote to memory of 3316 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 107 PID 4736 wrote to memory of 4060 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 109 PID 4736 wrote to memory of 4060 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 109 PID 4060 wrote to memory of 3896 4060 cmd.exe 111 PID 4060 wrote to memory of 3896 4060 cmd.exe 111 PID 4736 wrote to memory of 4640 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 112 PID 4736 wrote to memory of 4640 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 112 PID 4736 wrote to memory of 4640 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 112 PID 4736 wrote to memory of 3988 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 114 PID 4736 wrote to memory of 3988 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 114 PID 4736 wrote to memory of 3988 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 114 PID 4736 wrote to memory of 2508 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 116 PID 4736 wrote to memory of 2508 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 116 PID 4736 wrote to memory of 2508 4736 384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe 116 PID 2508 wrote to memory of 1984 2508 csrss.exe 119 PID 2508 wrote to memory of 1984 2508 csrss.exe 119 PID 2508 wrote to memory of 1984 2508 csrss.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe"C:\Users\Admin\AppData\Local\Temp\384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Users\Admin\AppData\Local\Temp\384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe"C:\Users\Admin\AppData\Local\Temp\384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3896
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1824
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4896
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:380
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:896
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:1160
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4488
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:2708
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 7123⤵
- Program crash
PID:4472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 9002⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3372 -ip 33721⤵PID:2388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4736 -ip 47361⤵PID:32
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a9ab9285195bd16fc404121432f2e4bd
SHA127936880024881f62d8c104ded82f57688633317
SHA256076e9e7fa9c92cf29f13209afb7126664189eaecba1f1bc8f6222ae9285d5646
SHA512d2ec8fc1b679165676d252d30473e405dc56bfbb23d83c704c4f086f4563323f1b881c51ade61acfcddbaf252d905a5c548dba63aa95b54f92b8c36e3fefc348
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bf20f7167bb676f94a2586cca8c681c7
SHA19a749af8561c448007c625bc35f5dc6a9e5fc5bd
SHA256ab69f3d6a61cea28d64c025d816b45b7c3383f1303c51a602553d8e86d33c6bd
SHA512fd9501c772ce1c4d9452387522ffcd7fd8c8b87c7af883c38ba26561c0cd71acf8dc7b3b74d3cf71b3d51381fcf4049f3908bc95b83438f214a0f3941f3f093d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c2c7266eead35590c8f8b6c4fd7506f7
SHA18b70866e752ecc53ca1cea79435e1587eac64383
SHA256a20e40c6968e7f7db95f9ccc786ff9da9fdb22bbc82055dfa442881f0f1372e1
SHA5123f87586488078d894c7f99886a065ac7d7abe60eaa9770b03052719d30fabf3790ad292910a664ace6549ae01013aa1f66cdffcf96222766d4fb5216bbcc7318
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53848d6b416b3e21315397734bd89adf0
SHA1eb7f019c344c0c70a67db54041f0237a104ed7e7
SHA256f63c0b1141e0c31af74fb2468b21d24269684a6b6200010a9e4793bdc9c8ee93
SHA5123f73a6a3e9d8752e905f8a89711476c45493619d8b493e4c1ca97a555a0a8588399c0be571b7016ae2229ee2e6c51b8fbd1c5089c3cd4080b929122173fff33f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a061bc914842e5266505f4e4622e4da1
SHA173c321dc2ba28b00c8205824021aa276635c5c4c
SHA2561e0c82a68f3f7d07557e48614285e40320fbb1324aac86be9080fbbe5264f6dc
SHA5128721e80f919d7112b542049f8af743105933586f8a5dbfaea43203959232f6492344953e3d1c4417da92db710e9282a002f8ca2b180244cdc71b18e3cab2e7de
-
Filesize
4.2MB
MD53f3343c89545fedc460427c1cba42f6e
SHA13d664c1f1853a6fd47d2b46011d8cad3aeee5b9d
SHA256384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625
SHA51269ab1ec47eef39ac44004afeca8cb3ca774f423cd36b3bb34ddfdd76e9c78753a5997755a37cb893194087512ab145907843de6352132a108fbd3ebbb102e7e1
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec