Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe
Resource
win10v2004-20240419-en
General
-
Target
093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe
-
Size
4.2MB
-
MD5
dbdb501599d14223dae1aad6bbe91d94
-
SHA1
26b42dfe4cd8eb952f1503f241ba0cf1e9aa77f8
-
SHA256
093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc
-
SHA512
45f30ff2c264755609924e0ac5f548130844f896125bda97474527fddf2d3906e1deee84ecdb3d073e3bb3a60ee9b58668ceb72b4d6904d34ed54d22400ba15a
-
SSDEEP
98304:8yb2/pxGAqvjKGZ/7eD1UGv+HfQT3fTW6jcPg261rZIfuRXiGDb:H+GveK7x+17fTW6jidDWVicb
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/4928-2-0x0000000003E10000-0x00000000046FB000-memory.dmp family_glupteba behavioral1/memory/4928-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4928-102-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/4428-130-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/4928-155-0x0000000003E10000-0x00000000046FB000-memory.dmp family_glupteba behavioral1/memory/4928-206-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3680-213-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-222-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-224-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-227-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-231-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-234-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-236-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-239-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-243-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-246-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-248-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-252-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba behavioral1/memory/3680-255-0x0000000000400000-0x0000000001DFE000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1676 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 3680 csrss.exe 3164 injector.exe 1696 windefender.exe 3308 windefender.exe -
resource yara_rule behavioral1/files/0x000b000000023bbd-217.dat upx behavioral1/memory/1696-218-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1696-221-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3308-225-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3308-230-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3308-240-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4020 sc.exe -
pid Process 3608 powershell.exe 804 powershell.exe 2748 powershell.exe 1376 powershell.exe 3124 powershell.exe 3812 powershell.exe 3528 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4692 schtasks.exe 2116 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3608 powershell.exe 3608 powershell.exe 4928 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 4928 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 804 powershell.exe 804 powershell.exe 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 2748 powershell.exe 2748 powershell.exe 1376 powershell.exe 1376 powershell.exe 1376 powershell.exe 3124 powershell.exe 3124 powershell.exe 3812 powershell.exe 3812 powershell.exe 3528 powershell.exe 3528 powershell.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3680 csrss.exe 3680 csrss.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3680 csrss.exe 3680 csrss.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3680 csrss.exe 3680 csrss.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe 3164 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3608 powershell.exe Token: SeDebugPrivilege 4928 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Token: SeImpersonatePrivilege 4928 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe Token: SeDebugPrivilege 804 powershell.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 1376 powershell.exe Token: SeDebugPrivilege 3124 powershell.exe Token: SeDebugPrivilege 3812 powershell.exe Token: SeDebugPrivilege 3528 powershell.exe Token: SeSystemEnvironmentPrivilege 3680 csrss.exe Token: SeSecurityPrivilege 4020 sc.exe Token: SeSecurityPrivilege 4020 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3608 4928 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 87 PID 4928 wrote to memory of 3608 4928 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 87 PID 4928 wrote to memory of 3608 4928 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 87 PID 4428 wrote to memory of 804 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 95 PID 4428 wrote to memory of 804 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 95 PID 4428 wrote to memory of 804 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 95 PID 4428 wrote to memory of 740 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 99 PID 4428 wrote to memory of 740 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 99 PID 740 wrote to memory of 1676 740 cmd.exe 101 PID 740 wrote to memory of 1676 740 cmd.exe 101 PID 4428 wrote to memory of 2748 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 103 PID 4428 wrote to memory of 2748 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 103 PID 4428 wrote to memory of 2748 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 103 PID 4428 wrote to memory of 1376 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 107 PID 4428 wrote to memory of 1376 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 107 PID 4428 wrote to memory of 1376 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 107 PID 4428 wrote to memory of 3680 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 109 PID 4428 wrote to memory of 3680 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 109 PID 4428 wrote to memory of 3680 4428 093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe 109 PID 3680 wrote to memory of 3124 3680 csrss.exe 110 PID 3680 wrote to memory of 3124 3680 csrss.exe 110 PID 3680 wrote to memory of 3124 3680 csrss.exe 110 PID 3680 wrote to memory of 3812 3680 csrss.exe 115 PID 3680 wrote to memory of 3812 3680 csrss.exe 115 PID 3680 wrote to memory of 3812 3680 csrss.exe 115 PID 3680 wrote to memory of 3528 3680 csrss.exe 118 PID 3680 wrote to memory of 3528 3680 csrss.exe 118 PID 3680 wrote to memory of 3528 3680 csrss.exe 118 PID 3680 wrote to memory of 3164 3680 csrss.exe 120 PID 3680 wrote to memory of 3164 3680 csrss.exe 120 PID 1696 wrote to memory of 4572 1696 windefender.exe 127 PID 1696 wrote to memory of 4572 1696 windefender.exe 127 PID 1696 wrote to memory of 4572 1696 windefender.exe 127 PID 4572 wrote to memory of 4020 4572 cmd.exe 128 PID 4572 wrote to memory of 4020 4572 cmd.exe 128 PID 4572 wrote to memory of 4020 4572 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe"C:\Users\Admin\AppData\Local\Temp\093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe"C:\Users\Admin\AppData\Local\Temp\093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1676
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4692
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:5036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2116
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD564998e9cf9752d2e113292bf764c70b8
SHA1403d3335c2f9bfe757783b1bb2b547e28e46f311
SHA2562e2db3e6fe9eff86d9c39cb84c86aff02c1ba68f1e18745fa24b42b69b146575
SHA5125a850a3025f1dcc19da91e5b690066037b5007be5bdd8b8b04509d321224369c52a78d81dcf343141ae2329f19ca31debafdc87f7f01722bc8eea53dfa5f79d9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59da364ca304b4a3eda1c51e39eb06a1e
SHA1005e75f983bed907929b9df5ff429e23a544a0f2
SHA25686d41765e858bb07a3d61c129da8d401e2d7cf85fd82fedd2c5465efe14a5628
SHA512f3aae967fe35a6e2aa147cde867815ec49514f1a88e9c3d6d1426fcf0a1901ffd58f118a45f3e415598a3914fea47eeccb63b04cb6cdceaa1335e36da284ffa5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5800420427865100cf08afb9474633814
SHA14caf7d31b638cc894a7b8217b6dcd324fea93850
SHA25618da7cb669b55734303668e5ac21c935e98001af080e202e5f10fcbab25179ea
SHA5125e740dd62084912adaa2603b12f999dac471a7f18e31fa63167b204be2bdcc805256d7ff7f6236af3c9c0e075a7485f69fd8258edccc5c04d1d9c27696a16f4c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59bbe27853eb4116f31f8a7434900a5f1
SHA11ccb6b5b229297795e88ef4d3c6821eecd09c5c4
SHA25653ea8ff094addaa4f8cf9a990893091b1903df3c9375aaf889e52366c9367111
SHA5129577ee9f3912da1c995b40c5c582c97ed5885b323b627a4e2cd66ea2313b36fa6516bf01c955980350201220dd8cdf106ff1634464e4757e378472efe08e2834
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56968e1ef34ba3c13be724c35f92b60ed
SHA1b5f1c9c4e5900d32a6f1413038541f04a0d3c099
SHA256f59df1f154bbbac3b7377a2eef13cc40c08472d60933839278ef79a1183d6f7e
SHA5122daedb10c5aafbbdf36a76d124b6f4ad8a4bc6cba23b77019c05161c325e9bc3345cbd69fe407f6d305b284fd29f985a95c5c2ad6838cb7d0cc257e43f4c7052
-
Filesize
4.2MB
MD5dbdb501599d14223dae1aad6bbe91d94
SHA126b42dfe4cd8eb952f1503f241ba0cf1e9aa77f8
SHA256093078dfea4961d666ff4fb56526ec7de4cf592da90049e70b0fe62c1a74b3dc
SHA51245f30ff2c264755609924e0ac5f548130844f896125bda97474527fddf2d3906e1deee84ecdb3d073e3bb3a60ee9b58668ceb72b4d6904d34ed54d22400ba15a
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec