Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-04-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe
Resource
win10v2004-20240426-en
General
-
Target
2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe
-
Size
4.2MB
-
MD5
f82b4b019287eb16dd8cf7156c72a3f8
-
SHA1
21d55251bc6cd27b60ecc4660c8d1fc73515967d
-
SHA256
2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444
-
SHA512
4840530f2a567a7d9093d3a5ecb290330096e1e5fcc6378685cfba211e1af0e22724748012f8c5d7cc07da5cb5762783223d2a8846be4aaaca17a58906ed1c5b
-
SSDEEP
98304:73fclVPVcYr6prpRtwbp/CdqhSf/LSZIrcMLb3J1blMIAMQgOHn5ic:bfwpVWrpC6kSXLXv3PWIg9HnAc
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/2744-2-0x0000000003F60000-0x000000000484B000-memory.dmp family_glupteba behavioral2/memory/2744-3-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2744-55-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2744-56-0x0000000003F60000-0x000000000484B000-memory.dmp family_glupteba behavioral2/memory/2864-150-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-156-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-209-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-211-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-213-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-215-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-217-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-219-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-221-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-223-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-225-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-227-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-229-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba behavioral2/memory/2592-231-0x0000000000400000-0x0000000001DF3000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3480 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2592 csrss.exe 1436 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe File created C:\Windows\rss\csrss.exe 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 748 schtasks.exe 2824 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3484 powershell.exe 3484 powershell.exe 2744 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2744 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2824 powershell.exe 2824 powershell.exe 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 2356 powershell.exe 2356 powershell.exe 380 powershell.exe 380 powershell.exe 4916 powershell.exe 4916 powershell.exe 528 powershell.exe 528 powershell.exe 2372 powershell.exe 2372 powershell.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 2592 csrss.exe 2592 csrss.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 2592 csrss.exe 2592 csrss.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe 1436 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3484 powershell.exe Token: SeDebugPrivilege 2744 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Token: SeImpersonatePrivilege 2744 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 380 powershell.exe Token: SeDebugPrivilege 4916 powershell.exe Token: SeDebugPrivilege 528 powershell.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeSystemEnvironmentPrivilege 2592 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2744 wrote to memory of 3484 2744 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 82 PID 2744 wrote to memory of 3484 2744 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 82 PID 2744 wrote to memory of 3484 2744 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 82 PID 2864 wrote to memory of 2824 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 87 PID 2864 wrote to memory of 2824 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 87 PID 2864 wrote to memory of 2824 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 87 PID 2864 wrote to memory of 848 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 89 PID 2864 wrote to memory of 848 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 89 PID 848 wrote to memory of 3480 848 cmd.exe 91 PID 848 wrote to memory of 3480 848 cmd.exe 91 PID 2864 wrote to memory of 2356 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 92 PID 2864 wrote to memory of 2356 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 92 PID 2864 wrote to memory of 2356 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 92 PID 2864 wrote to memory of 380 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 94 PID 2864 wrote to memory of 380 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 94 PID 2864 wrote to memory of 380 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 94 PID 2864 wrote to memory of 2592 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 96 PID 2864 wrote to memory of 2592 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 96 PID 2864 wrote to memory of 2592 2864 2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe 96 PID 2592 wrote to memory of 4916 2592 csrss.exe 97 PID 2592 wrote to memory of 4916 2592 csrss.exe 97 PID 2592 wrote to memory of 4916 2592 csrss.exe 97 PID 2592 wrote to memory of 528 2592 csrss.exe 102 PID 2592 wrote to memory of 528 2592 csrss.exe 102 PID 2592 wrote to memory of 528 2592 csrss.exe 102 PID 2592 wrote to memory of 2372 2592 csrss.exe 105 PID 2592 wrote to memory of 2372 2592 csrss.exe 105 PID 2592 wrote to memory of 2372 2592 csrss.exe 105 PID 2592 wrote to memory of 1436 2592 csrss.exe 107 PID 2592 wrote to memory of 1436 2592 csrss.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe"C:\Users\Admin\AppData\Local\Temp\2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe"C:\Users\Admin\AppData\Local\Temp\2c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3480
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:748
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2824
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55e583f64b4981cea5b5c4ef6befc8741
SHA10c4c267a66891b76acc02fc723a2ef4f0ea00b02
SHA256a2ffc8f7d5b33131946889fba86304d366813957f3c89ee0b02f1fe915c7d3cb
SHA512becbac82f95c72352d13746953ef490441d6643945bdac6b2b7b47a76434eddd9ead4ffaee89eb68666f2f8837cfa024109fec37572919a3b7015a4efcbe5214
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fab18b61e7d46dc8480f01458f489437
SHA1589dca2e4aacd24ada64f40782f17640374b893a
SHA256200b395a7a3f0d423989f72aa019c283293c53fc42a442669daaed0585b7d0f3
SHA51284038b9f5839f0e3678ca70c7de265ac61db3176df3a3e0dbf4d0585a8c2ac58a52f85c9009e9588b9272e119562fb94c7ddc018e54f4ee4bf1f6fe16708e8b9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57797a6ea2b7021815711f5fe6107dacc
SHA1066e3467b4f333141228f69a1ff5461b169f2a3c
SHA2563612c3a711e01cc49690a4d99c3c63af7c3b97b5adfaab7b468dd04edbd2061f
SHA51226f2f5a3872a1dfc9198e28809795f20bbb3f37ae1925bb83357d96a752eabc60f4d5dce02076ee47294e8aabaf8392506aab4524d0f8adedd844c1f4fe3f21d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5201b4a1a95ce472d4413f7b908358016
SHA1dc50b8033a3211b6c7e569b71d6eb37765be81e0
SHA256a6ec6dcbb4b31b5c8a737c30dbce96843f799b8627c65b902ab9c303c4260bb0
SHA51214aa37f5ce14c9c5a491a99c271a2d8e303bd716af817e128ed10b4d1a9ed37fefdf754f8289d726d33ccbc8d0251eac32e46572e6efc54865abbe5317b264a8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59aa5099d065cb4b1aa7fa18a904627eb
SHA10e1fb2a3d165a2e509052e1ca7ef08c91b4e3391
SHA2565a57fdbb6cd3011d801817f1f7197162f2e809c67ab63d3c6e2218f52b68f5d3
SHA5120760a61b2e9312fbd3a62480ac89b93fbc3fa5b6b130ec6431e4768bf1fe57528f6693eb6fe0d3a1541a53ca65f01dd2acd23f6ceca5bbdb6de2e33874dd3675
-
Filesize
4.2MB
MD5f82b4b019287eb16dd8cf7156c72a3f8
SHA121d55251bc6cd27b60ecc4660c8d1fc73515967d
SHA2562c25fc2ae56e07885c9917acc5219a86f8b35bbc4005df0efe7beba881445444
SHA5124840530f2a567a7d9093d3a5ecb290330096e1e5fcc6378685cfba211e1af0e22724748012f8c5d7cc07da5cb5762783223d2a8846be4aaaca17a58906ed1c5b