Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/04/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe
Resource
win10v2004-20240412-en
General
-
Target
40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe
-
Size
4.2MB
-
MD5
01184610a639c8674591e36b9181f3d0
-
SHA1
2a5eb820ab0d3aafd0f25bbfb83fd6cb2b6d6d67
-
SHA256
40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb
-
SHA512
c667455dca7ace8705c9ceba5c16c85fa291ba31e2c09ab5b82d957213f787f7518049990cbcfae5e02a73fca2b927a6c9516361292ba9ed8678f63e7926311d
-
SSDEEP
98304:VjZ0w3JCpg65gxtzIPECtbDHCGHQv1+jWp0itpTHKkwvKchVEkEa:foB5gcPNN+GC1+jc0itcvKKr
Malware Config
Signatures
-
Glupteba payload 17 IoCs
resource yara_rule behavioral2/memory/796-2-0x00000000065F0000-0x0000000006EDB000-memory.dmp family_glupteba behavioral2/memory/796-63-0x00000000065F0000-0x0000000006EDB000-memory.dmp family_glupteba behavioral2/memory/796-143-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1868-203-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-238-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-241-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-244-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-255-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-259-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-263-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-267-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-271-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-275-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-279-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-283-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-287-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba behavioral2/memory/1696-291-0x0000000000400000-0x0000000004426000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4204 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 1696 csrss.exe 2464 injector.exe 816 windefender.exe 2604 windefender.exe -
resource yara_rule behavioral2/files/0x000200000002a9c6-248.dat upx behavioral2/memory/816-252-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2604-257-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2604-265-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-834482027-582050234-2368284635-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\S-1-5-21-834482027-582050234-2368284635-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe File created C:\Windows\rss\csrss.exe 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4712 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2124 schtasks.exe 2496 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-911 = "Mauritius Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2942 = "Sao Tome Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2764 powershell.exe 2764 powershell.exe 796 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 796 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 3452 powershell.exe 3452 powershell.exe 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 5044 powershell.exe 5044 powershell.exe 2180 powershell.exe 2180 powershell.exe 2260 powershell.exe 2260 powershell.exe 1652 powershell.exe 1652 powershell.exe 936 powershell.exe 936 powershell.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 1696 csrss.exe 1696 csrss.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 1696 csrss.exe 1696 csrss.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe 2464 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2764 powershell.exe Token: SeDebugPrivilege 796 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Token: SeImpersonatePrivilege 796 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe Token: SeDebugPrivilege 3452 powershell.exe Token: SeDebugPrivilege 5044 powershell.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 1652 powershell.exe Token: SeDebugPrivilege 936 powershell.exe Token: SeSystemEnvironmentPrivilege 1696 csrss.exe Token: SeSecurityPrivilege 4712 sc.exe Token: SeSecurityPrivilege 4712 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 796 wrote to memory of 2764 796 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 82 PID 796 wrote to memory of 2764 796 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 82 PID 796 wrote to memory of 2764 796 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 82 PID 1868 wrote to memory of 3452 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 88 PID 1868 wrote to memory of 3452 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 88 PID 1868 wrote to memory of 3452 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 88 PID 1868 wrote to memory of 3884 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 90 PID 1868 wrote to memory of 3884 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 90 PID 3884 wrote to memory of 4204 3884 cmd.exe 92 PID 3884 wrote to memory of 4204 3884 cmd.exe 92 PID 1868 wrote to memory of 5044 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 93 PID 1868 wrote to memory of 5044 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 93 PID 1868 wrote to memory of 5044 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 93 PID 1868 wrote to memory of 2180 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 95 PID 1868 wrote to memory of 2180 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 95 PID 1868 wrote to memory of 2180 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 95 PID 1868 wrote to memory of 1696 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 97 PID 1868 wrote to memory of 1696 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 97 PID 1868 wrote to memory of 1696 1868 40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe 97 PID 1696 wrote to memory of 2260 1696 csrss.exe 98 PID 1696 wrote to memory of 2260 1696 csrss.exe 98 PID 1696 wrote to memory of 2260 1696 csrss.exe 98 PID 1696 wrote to memory of 1652 1696 csrss.exe 104 PID 1696 wrote to memory of 1652 1696 csrss.exe 104 PID 1696 wrote to memory of 1652 1696 csrss.exe 104 PID 1696 wrote to memory of 936 1696 csrss.exe 106 PID 1696 wrote to memory of 936 1696 csrss.exe 106 PID 1696 wrote to memory of 936 1696 csrss.exe 106 PID 1696 wrote to memory of 2464 1696 csrss.exe 108 PID 1696 wrote to memory of 2464 1696 csrss.exe 108 PID 816 wrote to memory of 2228 816 windefender.exe 114 PID 816 wrote to memory of 2228 816 windefender.exe 114 PID 816 wrote to memory of 2228 816 windefender.exe 114 PID 2228 wrote to memory of 4712 2228 cmd.exe 115 PID 2228 wrote to memory of 4712 2228 cmd.exe 115 PID 2228 wrote to memory of 4712 2228 cmd.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe"C:\Users\Admin\AppData\Local\Temp\40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe"C:\Users\Admin\AppData\Local\Temp\40b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4204
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2124
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2496
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2604
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD541be9042382056b99e1ebda2be12c090
SHA171a281df68487dce43918af7b151d08a514a58df
SHA2568d48bf8a7d21280b339808b32b2a9a2afa5a65db3a0e091926929dfe24ef2a7e
SHA512360066fde920953a905dce28c17e3d3a7930142fa4b03efbf60bdcc3b1604953e5bb5a0c9265a6b48a024b6700a70f9215fabfa77822ddac7efba76bf2a4e554
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c2caf69d58b22c72fcb1bd30f06a33f9
SHA162d9120f21c9f74f8513f4090cd35eb709c53c97
SHA25623a9b974d4b94bb62a5abd42378ecca85e0b3b45df70df00eeeeb46335b9bdb8
SHA512cc34bc8cb470d0004f738577b756af4faee2506ff783170e729de885981c47200c6140d4e59f3266093dd8cc4c07517b00903baf0d7e7b06901c7aa09d3604ab
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5885ef818a9e7ad48cbf8c03bb3d8ad93
SHA134a3f7561028434fd783e28ddda0ad31c50b42d2
SHA256a273d9eab4f54314a275462839ff1fd968ce21c37f562d5a0f486189809f9f37
SHA512ac552fec28906336626e30ecb73c2b4127aeebd575639df4377fa70faad8495d7ed417782e5199cca873fd0b43f7dd688c63736a2142d7b26ed1f0a0e187e333
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59298f0e5682ce5054e0cb5aa2cfcb0f7
SHA10be391289028a78761ed7a43a589b71a667e949b
SHA256b1cb3c6e06b717933d8d65c7187f15110f087d4e406868edac9be383dd7a7f82
SHA51275241cb4267ce4d49d7ec30b0eb3c6f2830761a25e4ed0a9a7707b774139a23e05e4f89a658f83ca572bbe0c5989cba9d32986fc96bfa9ee98d52ef260e271a6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d654e9e432feacf812910bc77aa577a5
SHA155e16e8690cd3a045faddd41d4ca1439349c90cd
SHA2564b3642e2b7e78bc8ff91afe865b119c9f04550334cc1e4318a90668d661bde13
SHA512ac667ac16da6b42194d7fe87fdab57446d93f4b988c5a0f55b9e1f7f7fc343f0e58a03d00866da04230a5b695be571aaa08fb29fea01dbaa12dc67711378ec07
-
Filesize
4.2MB
MD501184610a639c8674591e36b9181f3d0
SHA12a5eb820ab0d3aafd0f25bbfb83fd6cb2b6d6d67
SHA25640b88c9996809d63b87ccc08035535516c92d9f226636f7812d79423985ccffb
SHA512c667455dca7ace8705c9ceba5c16c85fa291ba31e2c09ab5b82d957213f787f7518049990cbcfae5e02a73fca2b927a6c9516361292ba9ed8678f63e7926311d
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec