Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe
Resource
win10v2004-20240419-en
General
-
Target
f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe
-
Size
4.2MB
-
MD5
da51e953e46267c1c827280b45abe6fe
-
SHA1
77cbc46b84da88a8dbaf41aaca7dfaae0f03cc12
-
SHA256
f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080
-
SHA512
2be393cac0569977808cea0f1d33d210218c2aaea39c9e118375e7d9909a9375217a27ecceeed95c452cc69ccd02ff2d53fc9321e6c8a20f17d991119452bb12
-
SSDEEP
98304:PHUv657qgpFkyPwi+mbANtH/q59RA4PaMEp3P6wQjbKVpC:vUIpFNPwi0tHCfRZaiwIbEpC
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral1/memory/3512-2-0x0000000003E60000-0x000000000474B000-memory.dmp family_glupteba behavioral1/memory/3512-3-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3512-78-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3512-104-0x0000000003E60000-0x000000000474B000-memory.dmp family_glupteba behavioral1/memory/3100-131-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-157-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-213-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-215-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-217-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-219-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-221-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-223-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-225-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-227-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-229-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-231-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-233-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba behavioral1/memory/3824-235-0x0000000000400000-0x0000000001DFB000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1696 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3824 csrss.exe 1012 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe File created C:\Windows\rss\csrss.exe f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3168 schtasks.exe 4012 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3508 powershell.exe 3508 powershell.exe 3512 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3512 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3808 powershell.exe 3808 powershell.exe 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 1012 powershell.exe 1012 powershell.exe 1540 powershell.exe 1540 powershell.exe 3464 powershell.exe 3464 powershell.exe 4412 powershell.exe 4412 powershell.exe 1720 powershell.exe 1720 powershell.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 3824 csrss.exe 3824 csrss.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 3824 csrss.exe 3824 csrss.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe 1012 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3508 powershell.exe Token: SeDebugPrivilege 3512 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Token: SeImpersonatePrivilege 3512 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe Token: SeDebugPrivilege 3808 powershell.exe Token: SeDebugPrivilege 1012 powershell.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeDebugPrivilege 3464 powershell.exe Token: SeDebugPrivilege 4412 powershell.exe Token: SeDebugPrivilege 1720 powershell.exe Token: SeSystemEnvironmentPrivilege 3824 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3512 wrote to memory of 3508 3512 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 88 PID 3512 wrote to memory of 3508 3512 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 88 PID 3512 wrote to memory of 3508 3512 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 88 PID 3100 wrote to memory of 3808 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 93 PID 3100 wrote to memory of 3808 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 93 PID 3100 wrote to memory of 3808 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 93 PID 3100 wrote to memory of 4416 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 95 PID 3100 wrote to memory of 4416 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 95 PID 4416 wrote to memory of 1696 4416 cmd.exe 97 PID 4416 wrote to memory of 1696 4416 cmd.exe 97 PID 3100 wrote to memory of 1012 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 98 PID 3100 wrote to memory of 1012 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 98 PID 3100 wrote to memory of 1012 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 98 PID 3100 wrote to memory of 1540 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 100 PID 3100 wrote to memory of 1540 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 100 PID 3100 wrote to memory of 1540 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 100 PID 3100 wrote to memory of 3824 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 102 PID 3100 wrote to memory of 3824 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 102 PID 3100 wrote to memory of 3824 3100 f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe 102 PID 3824 wrote to memory of 3464 3824 csrss.exe 103 PID 3824 wrote to memory of 3464 3824 csrss.exe 103 PID 3824 wrote to memory of 3464 3824 csrss.exe 103 PID 3824 wrote to memory of 4412 3824 csrss.exe 109 PID 3824 wrote to memory of 4412 3824 csrss.exe 109 PID 3824 wrote to memory of 4412 3824 csrss.exe 109 PID 3824 wrote to memory of 1720 3824 csrss.exe 112 PID 3824 wrote to memory of 1720 3824 csrss.exe 112 PID 3824 wrote to memory of 1720 3824 csrss.exe 112 PID 3824 wrote to memory of 1012 3824 csrss.exe 114 PID 3824 wrote to memory of 1012 3824 csrss.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe"C:\Users\Admin\AppData\Local\Temp\f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe"C:\Users\Admin\AppData\Local\Temp\f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1696
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4012
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3856
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3168
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD570238a0b9d616c6f4aebd9de01bd1b13
SHA1237725b6f591fa4de7655eaa93ef1d928b911a27
SHA256c52de02e4f91eb40e363bc449c72c58277bffd65bf40741218d88ab40f2dc765
SHA512f9e65a558ab83eb3d388129b73fe359dfa5f71b6b8bf5b6cc04e5f5c84ff0262438740ca7415676b99d48e8f7bee9d50d1095ff8ae04d6bc8061d2d8908edf7e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51570c3053459dbcd9fff09ec1ecabea4
SHA16024375417639ef8e548e75414a799c1290e8dee
SHA2563664c9b94f4cdf63941e7af7ebf593f0db23dc04c5852ea898adf3f890dcbf48
SHA5124e778fd9b86fcf0c640430fa820d86a531c3f2645963095a06d2d2ed75ccaef41cde150d50b8ac433d093ff8e9318cbce77dcd280f47b01d978fa65e4ce2808b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5cbad59a22b93fb129fbb748e3442f307
SHA12dfc1451db53d94af5df6fdb3bfa9889198d2a1a
SHA2562c7b2ed6ceadf563b1d40c0f819d08823a2536e64453ff681572050b2c6d64bd
SHA512fe4686f50b173135fc5278f27dac750505824558fc5a5d90556d177c00a3c98d993e2f09a875009294e969713884b5f22c01969230816d7c52b40af3a98eb9ee
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59d593e747b2be75874410096ec8ba296
SHA1f6bb32cf43fd68b3bb38a23b3f68aa10caa0275b
SHA256de404e2f9aeeaff7682ca1ff707b77ca7c3274aede9cd12c4b8f1a3f45c0d1b8
SHA512358edc0b2a6bfb4f2a474911957e092903aff43b362e719f49620ccce6512842edbfb9d3941eb256b6a8e7bf41e6fe1bd3a797ce4d28ed8ffdc847c9ded6e487
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d79f2997f7338219d79cd772a2349288
SHA1ba3fec66f7c99e0e8a5c92ae3ec25c4b0ec60b50
SHA25623da61d3d7c6f60b4d321d0c86300f47aba6067f6e7c40e457aca1551850928b
SHA512d4f38ad8e2d1c2f01b86baf5883e5281e49baf4969901adf0ca178994a0b15774f154774274661a0d57c726b1fb1bbf332e65580e40e1805a78533ccb2d8856e
-
Filesize
4.2MB
MD5da51e953e46267c1c827280b45abe6fe
SHA177cbc46b84da88a8dbaf41aaca7dfaae0f03cc12
SHA256f2eca1b504ee269508ce11165981431de9e61179dc138a168a4451753fb2b080
SHA5122be393cac0569977808cea0f1d33d210218c2aaea39c9e118375e7d9909a9375217a27ecceeed95c452cc69ccd02ff2d53fc9321e6c8a20f17d991119452bb12