Analysis
-
max time kernel
49s -
max time network
53s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-04-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe
Resource
win11-20240412-en
Errors
General
-
Target
15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe
-
Size
4.2MB
-
MD5
9649f6f868bed5e94efcbc808afc962d
-
SHA1
8863e6ec1a2791f580c5d3e6f3f6e4a961908743
-
SHA256
15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271
-
SHA512
ede10fbbdcd7dc161c7a13f5aa0dabae664c96e8e1f3abbdbbd0733ae4186e2a65536e059757ea77ec07348fd7d81e7b4bd788cb32fcc53b41c5b40a81a0ad6e
-
SSDEEP
98304:emG+ILlmwFOXti2i4yafdSAta9/r6eiiYAoaUebjXDBdI:DV62/i4yafdST/r6FFcTBdI
Malware Config
Signatures
-
Glupteba payload 7 IoCs
resource yara_rule behavioral2/memory/5104-2-0x0000000005290000-0x0000000005B7B000-memory.dmp family_glupteba behavioral2/memory/5104-3-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral2/memory/5104-51-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral2/memory/5104-53-0x0000000005290000-0x0000000005B7B000-memory.dmp family_glupteba behavioral2/memory/128-56-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral2/memory/128-102-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba behavioral2/memory/128-149-0x0000000000400000-0x0000000003009000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1620 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 4768 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe File created C:\Windows\rss\csrss.exe 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2092 powershell.exe 2092 powershell.exe 5104 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 5104 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 4020 powershell.exe 4020 powershell.exe 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 2388 powershell.exe 2388 powershell.exe 2920 powershell.exe 2920 powershell.exe 5024 powershell.exe 5024 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 5104 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Token: SeImpersonatePrivilege 5104 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe Token: SeDebugPrivilege 4020 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 5024 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 5104 wrote to memory of 2092 5104 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 81 PID 5104 wrote to memory of 2092 5104 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 81 PID 5104 wrote to memory of 2092 5104 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 81 PID 128 wrote to memory of 4020 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 86 PID 128 wrote to memory of 4020 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 86 PID 128 wrote to memory of 4020 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 86 PID 128 wrote to memory of 2024 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 88 PID 128 wrote to memory of 2024 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 88 PID 2024 wrote to memory of 1620 2024 cmd.exe 90 PID 2024 wrote to memory of 1620 2024 cmd.exe 90 PID 128 wrote to memory of 2388 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 91 PID 128 wrote to memory of 2388 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 91 PID 128 wrote to memory of 2388 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 91 PID 128 wrote to memory of 2920 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 93 PID 128 wrote to memory of 2920 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 93 PID 128 wrote to memory of 2920 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 93 PID 128 wrote to memory of 4768 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 95 PID 128 wrote to memory of 4768 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 95 PID 128 wrote to memory of 4768 128 15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe 95 PID 4768 wrote to memory of 5024 4768 csrss.exe 96 PID 4768 wrote to memory of 5024 4768 csrss.exe 96 PID 4768 wrote to memory of 5024 4768 csrss.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe"C:\Users\Admin\AppData\Local\Temp\15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe"C:\Users\Admin\AppData\Local\Temp\15f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1620
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2776
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3964
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52ebeccbcd1f0cd37958949ea53a675db
SHA1ef59a31ffc9ec0beeddfa9d5c896ff02aa0c277f
SHA256080e03951abb41ee5de0c1951a674563a4af7cf5b0a5b4706752c4cd1ae50c8d
SHA512c531ee0fdf60fc9c1f46dccf94f76f2c79eebc65cc7c239947c1ca86f673047b078d5012b97a23446a8f4200b7b810dfe03c9080700a7e1bb66da85afa7625ef
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5aae7ab1e64579ec1412ec1e098103fc8
SHA13d17f39c86c332da0de502c9b468919986beedee
SHA2565c0f7bc4c87125d9a0e22c2c876828dcfea74b3acf969b7ad17834f3a4a33080
SHA5126504d0d52f1adc1414b7dedb77d74120c71d515c3b4a5c0ea39137b2e36607301f757e9e6d2651db7be3d210cb9f112a97bd3e96ea7f5ed385521538f6b8cee2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d5388001eccaf0d8ba45f0d9c03f105f
SHA1d661c352b74452f796afb797c439afc9f612a425
SHA25600195d613ef8e1c4c12df2db6d1929cb1fd06c64454f16f582e4e0c975e55041
SHA512cb4169ce9f67b71b989aa1a3369f1cda5003df51cfa98e755f51f0449e2b76cf6c53ecb5535707d72e8149b89b61b5d4cf32b91c0b8b46f7cb1b741c8a597fec
-
Filesize
4.2MB
MD59649f6f868bed5e94efcbc808afc962d
SHA18863e6ec1a2791f580c5d3e6f3f6e4a961908743
SHA25615f2f059a54a112bd21a1c140047ccb926c7d3f9b90529d3a1a90aa18ea0d271
SHA512ede10fbbdcd7dc161c7a13f5aa0dabae664c96e8e1f3abbdbbd0733ae4186e2a65536e059757ea77ec07348fd7d81e7b4bd788cb32fcc53b41c5b40a81a0ad6e