Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe
Resource
win10v2004-20240412-en
General
-
Target
3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe
-
Size
4.1MB
-
MD5
80cb3c40ae24ca8b6eb6a21cf4d44d6f
-
SHA1
18d66c082a61fa3ec2a72db2aed8c4af5cf7f9c0
-
SHA256
3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190
-
SHA512
a430b885277d566f18a3db8f4c72351181d4728f851c4e1ad7484e48e2fbf6a04e1ec5e391cfd27f42a894c134f1e4d63b62c4090e7fd3bdb6048643d4b451df
-
SSDEEP
98304:dFddrpuoRE7tl1yJ8vae/QmLpm2XHwIZYQzHZc5g5rp30lCUZ:nLdBQ1yJ8Sedm2XHUQNc5XgQ
Malware Config
Signatures
-
Glupteba payload 17 IoCs
Processes:
resource yara_rule behavioral1/memory/5112-2-0x0000000006630000-0x0000000006F1B000-memory.dmp family_glupteba behavioral1/memory/3100-54-0x0000000006570000-0x0000000006E5B000-memory.dmp family_glupteba behavioral1/memory/5112-117-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3100-180-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-248-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-260-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-264-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-268-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-272-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-276-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-280-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-284-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-288-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-292-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-296-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-300-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba behavioral1/memory/3260-304-0x0000000000400000-0x0000000004416000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 5104 netsh.exe -
Executes dropped EXE 4 IoCs
Processes:
csrss.exeinjector.exewindefender.exewindefender.exepid process 3260 csrss.exe 2804 injector.exe 4972 windefender.exe 3532 windefender.exe -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral1/memory/4972-257-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3532-270-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe -
Drops file in Windows directory 4 IoCs
Processes:
3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.execsrss.exedescription ioc process File created C:\Windows\rss\csrss.exe 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4580 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1488 schtasks.exe 4500 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exepowershell.exepowershell.exewindefender.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-51 = "Greenland Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2941 = "Sao Tome Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exepowershell.exe3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid process 2700 powershell.exe 2700 powershell.exe 5112 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 5112 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 1588 powershell.exe 1588 powershell.exe 1588 powershell.exe 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe 2472 powershell.exe 2472 powershell.exe 2472 powershell.exe 1032 powershell.exe 1032 powershell.exe 1032 powershell.exe 3748 powershell.exe 3748 powershell.exe 3748 powershell.exe 2796 powershell.exe 2796 powershell.exe 2796 powershell.exe 4612 powershell.exe 4612 powershell.exe 4612 powershell.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 3260 csrss.exe 3260 csrss.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 3260 csrss.exe 3260 csrss.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 3260 csrss.exe 3260 csrss.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe 2804 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exe3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 5112 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Token: SeImpersonatePrivilege 5112 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 1032 powershell.exe Token: SeDebugPrivilege 3748 powershell.exe Token: SeDebugPrivilege 2796 powershell.exe Token: SeDebugPrivilege 4612 powershell.exe Token: SeSystemEnvironmentPrivilege 3260 csrss.exe Token: SeSecurityPrivilege 4580 sc.exe Token: SeSecurityPrivilege 4580 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.execmd.execsrss.exewindefender.execmd.exedescription pid process target process PID 5112 wrote to memory of 2700 5112 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 5112 wrote to memory of 2700 5112 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 5112 wrote to memory of 2700 5112 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 3100 wrote to memory of 1588 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 3100 wrote to memory of 1588 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 3100 wrote to memory of 1588 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 3100 wrote to memory of 652 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe cmd.exe PID 3100 wrote to memory of 652 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe cmd.exe PID 652 wrote to memory of 5104 652 cmd.exe netsh.exe PID 652 wrote to memory of 5104 652 cmd.exe netsh.exe PID 3100 wrote to memory of 2472 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 3100 wrote to memory of 2472 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 3100 wrote to memory of 2472 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 3100 wrote to memory of 1032 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 3100 wrote to memory of 1032 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 3100 wrote to memory of 1032 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe powershell.exe PID 3100 wrote to memory of 3260 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe csrss.exe PID 3100 wrote to memory of 3260 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe csrss.exe PID 3100 wrote to memory of 3260 3100 3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe csrss.exe PID 3260 wrote to memory of 3748 3260 csrss.exe powershell.exe PID 3260 wrote to memory of 3748 3260 csrss.exe powershell.exe PID 3260 wrote to memory of 3748 3260 csrss.exe powershell.exe PID 3260 wrote to memory of 2796 3260 csrss.exe powershell.exe PID 3260 wrote to memory of 2796 3260 csrss.exe powershell.exe PID 3260 wrote to memory of 2796 3260 csrss.exe powershell.exe PID 3260 wrote to memory of 4612 3260 csrss.exe powershell.exe PID 3260 wrote to memory of 4612 3260 csrss.exe powershell.exe PID 3260 wrote to memory of 4612 3260 csrss.exe powershell.exe PID 3260 wrote to memory of 2804 3260 csrss.exe injector.exe PID 3260 wrote to memory of 2804 3260 csrss.exe injector.exe PID 4972 wrote to memory of 5104 4972 windefender.exe cmd.exe PID 4972 wrote to memory of 5104 4972 windefender.exe cmd.exe PID 4972 wrote to memory of 5104 4972 windefender.exe cmd.exe PID 5104 wrote to memory of 4580 5104 cmd.exe sc.exe PID 5104 wrote to memory of 4580 5104 cmd.exe sc.exe PID 5104 wrote to memory of 4580 5104 cmd.exe sc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe"C:\Users\Admin\AppData\Local\Temp\3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe"C:\Users\Admin\AppData\Local\Temp\3c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:5104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1488 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3844
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4500 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3532
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54392859d650f836fd066acdd11610b87
SHA10e07c6cbacb1dea91398151d3ba3f4edcbf1cb6b
SHA256609c05a3279b11f71fc8b9dfb46b5e93d7d4e6efba599ae4d4c772973b10ada8
SHA5125e7a571530b080ab4a45468b84fba1344a06a73226b20f3604b63689dd9a8e83674b63f80597457828fd8d54903a39528b8641017821948760bdddcaa5ef11ca
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50001b4a36f07524470fbde77e3dec856
SHA1b05bd16c415707fd470c68430dac5ae92f091610
SHA25667af42a06e0198d62b1a25df4c4e9e1d5081475334637d41815c000e1d260c08
SHA51278e48d06bc17739ce868a63ce97e7f9b35ca19e8f78c7b3598efeb8c9acb60ea38fc372356314d441750e0349c4999d8aebfcf04f29551678d6edde605840015
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5331630e5860789e0f3dd4004aa861255
SHA144bfc03e2abd48f683f5e04110e94a5e43025046
SHA256cf97f123293065aa77e545e0db1e1e96638567902bb7c06724623564e7e58ec4
SHA512f38b8e298434400db8b835da3bbf4e9260eff15dd48e81051dc081a51409f79e51d2fb7111ffef6944a557cc9c640e0fed90d7ceebea4b9310fc9277ba43bc58
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5585465dffdf4eaba381fea0645017597
SHA1fa60c6134ce2cdb2c39fd95adebdc4ba0c5194c7
SHA256551b76c6956df8546122f1794ab09b576bd3a5ea5f1dc0ae216bba964a30560c
SHA512c8db511641454114581fde5c9b0e67698bda7167d34f5392d0b020a544eecac60ece23102fff9edc0b0e7a3e0e26455dd29247f1ac9d2fcb29f6bf8c00e18b27
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57f8874a00db1e11d243a7759b381e5ea
SHA10b19c82263099ed1935492854f1157a91528b1b3
SHA256ae6957ea665dcac67421168c3d5c4bd58574bb6e1dda78c86c979e4f45ae5dc5
SHA512eab8663786f459847afa94c86a101be60f37fe434f88106c5faf793a33ee6bbf757922fccd874bcc43ccb11df7ef4385c99810571972d113a7258a4914c36921
-
Filesize
4.1MB
MD580cb3c40ae24ca8b6eb6a21cf4d44d6f
SHA118d66c082a61fa3ec2a72db2aed8c4af5cf7f9c0
SHA2563c817731f1579a798ad9872bcf123896afcca578700566726ba29916c6fc0190
SHA512a430b885277d566f18a3db8f4c72351181d4728f851c4e1ad7484e48e2fbf6a04e1ec5e391cfd27f42a894c134f1e4d63b62c4090e7fd3bdb6048643d4b451df
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec