Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/05/2024, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe
Resource
win10v2004-20240419-en
General
-
Target
079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe
-
Size
4.1MB
-
MD5
76bd1a7f1723f2f601029f077d940d85
-
SHA1
84ded836b2fb0e0e3dbab4881fb522c924cf27bc
-
SHA256
079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2
-
SHA512
cb9487bc157ab48b952967d206ca6c3181d422ad3470b7c19c165d1ca019dfce6bc320b4334775f886170aa6f77deffb1a87038f0117c0ba619dcea11760755f
-
SSDEEP
98304:XnLDm1XoLdMR8t8Rupb9uumF9S8JB25VPPQ2VTa74pIHCae9:XfE4ht8Q1UumFLAPQ2VTFpIiaQ
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral2/memory/1708-2-0x00000000051A0000-0x0000000005A8B000-memory.dmp family_glupteba behavioral2/memory/1708-3-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1708-24-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1708-51-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1708-53-0x00000000051A0000-0x0000000005A8B000-memory.dmp family_glupteba behavioral2/memory/2496-123-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1524-148-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1524-196-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1524-203-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1524-205-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1524-207-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1524-209-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1524-211-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1524-213-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1524-215-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba behavioral2/memory/1524-217-0x0000000000400000-0x0000000002ED6000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2220 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1524 csrss.exe 3736 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe File created C:\Windows\rss\csrss.exe 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3836 schtasks.exe 4608 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4188 powershell.exe 4188 powershell.exe 1708 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 1708 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 1284 powershell.exe 1284 powershell.exe 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 3780 powershell.exe 3780 powershell.exe 4932 powershell.exe 4932 powershell.exe 4312 powershell.exe 4312 powershell.exe 3852 powershell.exe 3852 powershell.exe 2772 powershell.exe 2772 powershell.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 1524 csrss.exe 1524 csrss.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 1524 csrss.exe 1524 csrss.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe 3736 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4188 powershell.exe Token: SeDebugPrivilege 1708 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Token: SeImpersonatePrivilege 1708 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe Token: SeDebugPrivilege 1284 powershell.exe Token: SeDebugPrivilege 3780 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 4312 powershell.exe Token: SeDebugPrivilege 3852 powershell.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeSystemEnvironmentPrivilege 1524 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1708 wrote to memory of 4188 1708 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 81 PID 1708 wrote to memory of 4188 1708 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 81 PID 1708 wrote to memory of 4188 1708 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 81 PID 2496 wrote to memory of 1284 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 86 PID 2496 wrote to memory of 1284 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 86 PID 2496 wrote to memory of 1284 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 86 PID 2496 wrote to memory of 3964 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 88 PID 2496 wrote to memory of 3964 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 88 PID 3964 wrote to memory of 2220 3964 cmd.exe 90 PID 3964 wrote to memory of 2220 3964 cmd.exe 90 PID 2496 wrote to memory of 3780 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 91 PID 2496 wrote to memory of 3780 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 91 PID 2496 wrote to memory of 3780 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 91 PID 2496 wrote to memory of 4932 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 93 PID 2496 wrote to memory of 4932 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 93 PID 2496 wrote to memory of 4932 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 93 PID 2496 wrote to memory of 1524 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 95 PID 2496 wrote to memory of 1524 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 95 PID 2496 wrote to memory of 1524 2496 079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe 95 PID 1524 wrote to memory of 4312 1524 csrss.exe 96 PID 1524 wrote to memory of 4312 1524 csrss.exe 96 PID 1524 wrote to memory of 4312 1524 csrss.exe 96 PID 1524 wrote to memory of 3852 1524 csrss.exe 102 PID 1524 wrote to memory of 3852 1524 csrss.exe 102 PID 1524 wrote to memory of 3852 1524 csrss.exe 102 PID 1524 wrote to memory of 2772 1524 csrss.exe 104 PID 1524 wrote to memory of 2772 1524 csrss.exe 104 PID 1524 wrote to memory of 2772 1524 csrss.exe 104 PID 1524 wrote to memory of 3736 1524 csrss.exe 106 PID 1524 wrote to memory of 3736 1524 csrss.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe"C:\Users\Admin\AppData\Local\Temp\079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe"C:\Users\Admin\AppData\Local\Temp\079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2220
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3836
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:388
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4608
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56bb598ef5612436d06ac22e429563fec
SHA14d515e6363f520c4113cd9b4506b5d09969fd6a0
SHA256f8838b2d8bd56b4db33d06bea1aff57e4df3631c1a01928dd0d555a9eb3ef765
SHA512f974a15fe3c4cb0f6e56135ea850f478a9064aba01c6893afe000b56a57b827e51064fc558ff5955850870704d83446267977179b44e28169a936f791401f0ef
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52e3e39e04b638bc07a22abf6cd022256
SHA1238d02de76d88743bac64853027182845db61203
SHA25608b7fdbb8990a14904f2a9e91c15fd59fc078c115887bff16f5eb15552e2d01b
SHA512523d1749e197ca0834b16d7fd64a2c1992ba5f0aa8ddbd6b217947095053169b8b4753ddc50874bfca10b86d717044fade15ad77844239836b4638dc90133342
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bacaccb51542157c99ae7f20891ce1cd
SHA16a8902ff418bc8f8887afa6ef495a7aae7a88971
SHA25610631a4ae51e8a8770bb2817cf006ab92762099ad538fe5f3f3df45d6df15432
SHA512b9e6b8af6acbde689918853192077e9a11a4da55b2bfbd1e803f8b99166a1e4ed004fbac0fc7f2671527b6962bd2496f26c7a348e35263ede986b60adc04b361
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51113e8e47fb2875e1d32115dc24ced40
SHA156f0bcbfb684b2a1eea67e6b2c11b11732d31eea
SHA25630aa1610b6f87f2c1c06f4c32cf2c98eef5351e8b6c03f8bcc96acf1fa52ac11
SHA512c2d9e3d47f899b53312560fcb9d60fd3f05644292947679f3e3ca2d586d904af082e184402e260e391805d2a3557b63a6d63b67c7190961a647e82c6ddcac1ff
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD595ec6852fd168d76400cc006badc5931
SHA1ee28f94f819a8a030aba4c504a5454ba095e1d63
SHA256813f2c5192a04cac15c2b559b2b91acd5ff479b4f4a59b75c5aef03385843a01
SHA51275f807a5f7921b4621aeaaeadb197e1fb0553f9c2c777604ca5675d47520f58af3c5c1318ed272f7759ccac587c9f501ff782c0ddda1335cf13d176a7f2940fc
-
Filesize
4.1MB
MD576bd1a7f1723f2f601029f077d940d85
SHA184ded836b2fb0e0e3dbab4881fb522c924cf27bc
SHA256079bf2cfc5ad89ada232fc9b7ac47716669d510a4a0e336025bf4cdbdb1e61d2
SHA512cb9487bc157ab48b952967d206ca6c3181d422ad3470b7c19c165d1ca019dfce6bc320b4334775f886170aa6f77deffb1a87038f0117c0ba619dcea11760755f