Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe
Resource
win10v2004-20240419-en
General
-
Target
af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe
-
Size
4.2MB
-
MD5
f6f4ac2faba25063d45d58898b15f67d
-
SHA1
9a846601fc2b101b75688a7b51ebc3690f2e033b
-
SHA256
af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236
-
SHA512
1c9d5f7a2b527efe1c4b675c5ef73e3243f4368a9f9e830668850553a577e189702f2fecca8101c134d481b86b87fb50cc2b7e1ef4a3994506b7327cb686f95b
-
SSDEEP
98304:Ab+3Tqod9xs7WmePO2nuapcHvVcyQJeREDXoxNTQNO8zLe6:3Dj9xsgO9aeceR8YkzH
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral1/memory/1980-2-0x00000000064C0000-0x0000000006DAB000-memory.dmp family_glupteba behavioral1/memory/1980-3-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/1980-76-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/4936-130-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/1980-155-0x00000000064C0000-0x0000000006DAB000-memory.dmp family_glupteba behavioral1/memory/716-157-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-215-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-217-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-220-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-223-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-226-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-229-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-232-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-235-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-238-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-241-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-244-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba behavioral1/memory/716-247-0x0000000000400000-0x000000000441E000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4328 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 716 csrss.exe 4472 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe File created C:\Windows\rss\csrss.exe af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4372 schtasks.exe 2448 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4428 powershell.exe 4428 powershell.exe 1980 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 1980 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 3584 powershell.exe 3584 powershell.exe 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 4472 powershell.exe 4472 powershell.exe 992 powershell.exe 992 powershell.exe 4640 powershell.exe 4640 powershell.exe 396 powershell.exe 396 powershell.exe 1524 powershell.exe 1524 powershell.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 716 csrss.exe 716 csrss.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 716 csrss.exe 716 csrss.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe 4472 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4428 powershell.exe Token: SeDebugPrivilege 1980 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Token: SeImpersonatePrivilege 1980 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 4472 powershell.exe Token: SeDebugPrivilege 992 powershell.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeDebugPrivilege 396 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeSystemEnvironmentPrivilege 716 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1980 wrote to memory of 4428 1980 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 86 PID 1980 wrote to memory of 4428 1980 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 86 PID 1980 wrote to memory of 4428 1980 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 86 PID 4936 wrote to memory of 3584 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 91 PID 4936 wrote to memory of 3584 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 91 PID 4936 wrote to memory of 3584 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 91 PID 4936 wrote to memory of 1552 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 93 PID 4936 wrote to memory of 1552 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 93 PID 1552 wrote to memory of 4328 1552 cmd.exe 95 PID 1552 wrote to memory of 4328 1552 cmd.exe 95 PID 4936 wrote to memory of 4472 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 96 PID 4936 wrote to memory of 4472 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 96 PID 4936 wrote to memory of 4472 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 96 PID 4936 wrote to memory of 992 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 98 PID 4936 wrote to memory of 992 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 98 PID 4936 wrote to memory of 992 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 98 PID 4936 wrote to memory of 716 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 100 PID 4936 wrote to memory of 716 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 100 PID 4936 wrote to memory of 716 4936 af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe 100 PID 716 wrote to memory of 4640 716 csrss.exe 101 PID 716 wrote to memory of 4640 716 csrss.exe 101 PID 716 wrote to memory of 4640 716 csrss.exe 101 PID 716 wrote to memory of 396 716 csrss.exe 108 PID 716 wrote to memory of 396 716 csrss.exe 108 PID 716 wrote to memory of 396 716 csrss.exe 108 PID 716 wrote to memory of 1524 716 csrss.exe 110 PID 716 wrote to memory of 1524 716 csrss.exe 110 PID 716 wrote to memory of 1524 716 csrss.exe 110 PID 716 wrote to memory of 4472 716 csrss.exe 112 PID 716 wrote to memory of 4472 716 csrss.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe"C:\Users\Admin\AppData\Local\Temp\af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe"C:\Users\Admin\AppData\Local\Temp\af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4328
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4372
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2448
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57184b75c81112bb5a03fb9af7c47270d
SHA14d306c596d24efbfd06b7e75c93e03a7df6c65c5
SHA256154b61adbeb2f1f93ba9a7b04d71d13ea8a6e281160a39eef0d90f68f56fd621
SHA5124a21f29764101a638ebda4bf14b7e1456a38e0efc5af66fbd8c1d1c225717a59146df6c0d59958803d3e971251e195c4d18dbac42ca3525a1ede52a22cca70c0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b08a99d47a936e2bd6c175831ee47775
SHA14fea4fa55738bc56467bafc185b192dc72dd3ef4
SHA256ed8cc22c26fbb865b19d15d2de98b823841b0f38852ef48d3ec6b6e4318f86fd
SHA512a83c066c57dbad61f3a047d7556f95cd769977448bc600d85c06d73544f6b621166ea2ae33e7f40e0ef70169ac5c8fb80fb7010eb9d3c19c7e493b7a5f1d8bf0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5597010a9a1bd6fcbdc8addad2db0d36f
SHA168e1a4886132bbb6dfb13509b2fc68900a9c0013
SHA2566019e50becd8234a155ae9278eccdb96f2e338070cb0f5d31f9b6753e9758da1
SHA512b1bfb11ce2aa365b9408a5364908999db9ebc957de7d21ae29855c8968cf38df448afc5f2b81cc720194e9cb7491ab27f91ddba6abbaafc79be141286b830eab
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52dd1a5099678d57fa03318a38a05c772
SHA1eb74feb7699043cc55c9bc1aa9fcff328e2b4b95
SHA256abd5251fd43c0b964d22ae96630f1ebbddd396ff3d27c375936138d00c11c968
SHA512c37b08072db5b791c944d50332cddb1660d207df89704a7b8284d119d232f5682606cd9a986553aed20df68c522bfe5a31fa53ad76f675a60241d870cc1727db
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58de24f9264ea253b770f93e40ef0c9e5
SHA1be45929b352710a0518d071dddf49bcd39c0ea7d
SHA256e216922b442902bb217109480d9651a1aabc875cc08065fcd50f370a4a7980e2
SHA51296d0929d34ab07cda32444bbe47f39b66d3860341d7869aac5459ecd17369f542c3e59b63bf307cf42d714865c76de0c148ffd8326db1636f4b84ae187dc1e70
-
Filesize
4.2MB
MD5f6f4ac2faba25063d45d58898b15f67d
SHA19a846601fc2b101b75688a7b51ebc3690f2e033b
SHA256af94e49c208a10b8c8f1019089678cf0094f06d8f0e18cbf26855f2797724236
SHA5121c9d5f7a2b527efe1c4b675c5ef73e3243f4368a9f9e830668850553a577e189702f2fecca8101c134d481b86b87fb50cc2b7e1ef4a3994506b7327cb686f95b