Analysis
-
max time kernel
45s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe
Resource
win7-20240221-en
General
-
Target
0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe
-
Size
409KB
-
MD5
edcd9de4254f050ffa56e723be49c0c5
-
SHA1
054c541726383f1d70572f72a83ad86061141d64
-
SHA256
0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3
-
SHA512
aadf2f8fd82146c1174efe01261871caff89ba0ca3b18c6be77472609b8dbfa8b4c2b9d15968a7d423be9af0c79005311663478bd6d79fbcb87cf42a5bd20328
-
SSDEEP
12288:AiwMdowCeYkiyh9bGfD7NUwW1ROABchrj9j48Re9TY:AiwQowukiS4iwGROuqrj91
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/3596-408-0x000001F2507E0000-0x000001F254014000-memory.dmp family_zgrat_v1 behavioral2/memory/3596-421-0x000001F26FE10000-0x000001F26FE34000-memory.dmp family_zgrat_v1 behavioral2/memory/3596-417-0x000001F26FF70000-0x000001F27007A000-memory.dmp family_zgrat_v1 -
Glupteba payload 21 IoCs
resource yara_rule behavioral2/memory/2052-226-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/464-275-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/2884-276-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/1816-277-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/1564-413-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/4752-415-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/2940-416-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/2380-414-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/1564-528-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/2940-531-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/4752-530-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/2380-529-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/2940-586-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/1564-587-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/4752-598-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/2380-619-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/3948-620-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/3948-683-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/3948-701-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/3948-705-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba behavioral2/memory/3948-715-0x0000000000400000-0x0000000001DE6000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 0JSfwqirhNNqXfxzexRUrGPh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 0JSfwqirhNNqXfxzexRUrGPh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe = "0" 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 0JSfwqirhNNqXfxzexRUrGPh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 0JSfwqirhNNqXfxzexRUrGPh.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1168 powershell.exe 4588 powershell.exe 4780 powershell.exe 3344 powershell.exe 2400 powershell.exe 3604 powershell.exe 4072 powershell.exe 1320 powershell.exe 4444 powershell.exe 2488 powershell.exe 4196 powershell.exe 228 powershell.exe 2520 powershell.exe 3252 powershell.exe 3292 powershell.exe 4088 powershell.exe 1148 powershell.exe 5024 powershell.exe 4272 powershell.exe 1580 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 928 netsh.exe 4160 netsh.exe 1744 netsh.exe 4296 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation eys115HNSlTckIZzUz8rIoTq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation u130.1.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iyvtJNOuy1C9MFsm9UJPEnPW.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\o16YftEpgFCgAGQvd6VclKeI.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hfIwLwA0fCq6N0uAUzFxOsyH.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\heAKgykL8mNO16oVQ5OJuehE.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mVtMpHkd4piy9ysoJWRcaZ4C.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8bHYZlNV89UEkcGYVWvQtIfS.bat CasPol.exe -
Executes dropped EXE 11 IoCs
pid Process 1404 eys115HNSlTckIZzUz8rIoTq.exe 464 CXtSb53XuXt6JfSkwDM9g1YG.exe 2884 om0NpiARVNZOY6S2ZizaeKsL.exe 1816 CZxiSEoP3PjM72YzVC9Tyray.exe 2052 0JSfwqirhNNqXfxzexRUrGPh.exe 1884 u130.0.exe 4924 u130.1.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 4752 om0NpiARVNZOY6S2ZizaeKsL.exe 2940 CZxiSEoP3PjM72YzVC9Tyray.exe -
resource yara_rule behavioral2/files/0x0008000000023436-691.dat upx behavioral2/memory/4888-704-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe = "0" 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 0JSfwqirhNNqXfxzexRUrGPh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 0JSfwqirhNNqXfxzexRUrGPh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 0JSfwqirhNNqXfxzexRUrGPh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 0JSfwqirhNNqXfxzexRUrGPh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 0JSfwqirhNNqXfxzexRUrGPh.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 10 pastebin.com -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1916 set thread context of 620 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 89 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 4 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN CZxiSEoP3PjM72YzVC9Tyray.exe File opened (read-only) \??\VBoxMiniRdrDN om0NpiARVNZOY6S2ZizaeKsL.exe File opened (read-only) \??\VBoxMiniRdrDN 0JSfwqirhNNqXfxzexRUrGPh.exe File opened (read-only) \??\VBoxMiniRdrDN CXtSb53XuXt6JfSkwDM9g1YG.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 0JSfwqirhNNqXfxzexRUrGPh.exe File created C:\Windows\rss\csrss.exe 0JSfwqirhNNqXfxzexRUrGPh.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4140 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5000 1404 WerFault.exe 94 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u130.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u130.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u130.1.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1940 schtasks.exe 8 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" CXtSb53XuXt6JfSkwDM9g1YG.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1168 powershell.exe 1168 powershell.exe 3252 powershell.exe 3252 powershell.exe 4072 powershell.exe 4072 powershell.exe 4444 powershell.exe 4444 powershell.exe 3604 powershell.exe 3604 powershell.exe 3604 powershell.exe 4444 powershell.exe 4072 powershell.exe 3252 powershell.exe 1816 CZxiSEoP3PjM72YzVC9Tyray.exe 464 CXtSb53XuXt6JfSkwDM9g1YG.exe 1816 CZxiSEoP3PjM72YzVC9Tyray.exe 464 CXtSb53XuXt6JfSkwDM9g1YG.exe 2884 om0NpiARVNZOY6S2ZizaeKsL.exe 2884 om0NpiARVNZOY6S2ZizaeKsL.exe 2052 0JSfwqirhNNqXfxzexRUrGPh.exe 2052 0JSfwqirhNNqXfxzexRUrGPh.exe 1148 powershell.exe 1148 powershell.exe 4088 powershell.exe 4088 powershell.exe 3292 powershell.exe 3292 powershell.exe 1148 powershell.exe 4088 powershell.exe 3292 powershell.exe 1320 powershell.exe 1320 powershell.exe 1320 powershell.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 4752 om0NpiARVNZOY6S2ZizaeKsL.exe 4752 om0NpiARVNZOY6S2ZizaeKsL.exe 2940 CZxiSEoP3PjM72YzVC9Tyray.exe 2940 CZxiSEoP3PjM72YzVC9Tyray.exe 2940 CZxiSEoP3PjM72YzVC9Tyray.exe 2940 CZxiSEoP3PjM72YzVC9Tyray.exe 4752 om0NpiARVNZOY6S2ZizaeKsL.exe 4752 om0NpiARVNZOY6S2ZizaeKsL.exe 2940 CZxiSEoP3PjM72YzVC9Tyray.exe 2940 CZxiSEoP3PjM72YzVC9Tyray.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe Token: SeDebugPrivilege 1168 powershell.exe Token: SeDebugPrivilege 620 CasPol.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeDebugPrivilege 3604 powershell.exe Token: SeDebugPrivilege 4444 powershell.exe Token: SeDebugPrivilege 3252 powershell.exe Token: SeDebugPrivilege 1816 CZxiSEoP3PjM72YzVC9Tyray.exe Token: SeDebugPrivilege 464 CXtSb53XuXt6JfSkwDM9g1YG.exe Token: SeDebugPrivilege 2884 om0NpiARVNZOY6S2ZizaeKsL.exe Token: SeDebugPrivilege 2052 0JSfwqirhNNqXfxzexRUrGPh.exe Token: SeImpersonatePrivilege 1816 CZxiSEoP3PjM72YzVC9Tyray.exe Token: SeImpersonatePrivilege 464 CXtSb53XuXt6JfSkwDM9g1YG.exe Token: SeImpersonatePrivilege 2884 om0NpiARVNZOY6S2ZizaeKsL.exe Token: SeImpersonatePrivilege 2052 0JSfwqirhNNqXfxzexRUrGPh.exe Token: SeDebugPrivilege 4088 powershell.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeDebugPrivilege 3292 powershell.exe Token: SeDebugPrivilege 1320 powershell.exe Token: SeDebugPrivilege 4588 powershell.exe Token: SeDebugPrivilege 4780 powershell.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeDebugPrivilege 3344 powershell.exe Token: SeDebugPrivilege 3596 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 4196 powershell.exe Token: SeDebugPrivilege 2488 powershell.exe Token: SeDebugPrivilege 228 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4924 u130.1.exe 4924 u130.1.exe 4924 u130.1.exe 4924 u130.1.exe 4924 u130.1.exe 4924 u130.1.exe 4924 u130.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4924 u130.1.exe 4924 u130.1.exe 4924 u130.1.exe 4924 u130.1.exe 4924 u130.1.exe 4924 u130.1.exe 4924 u130.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1168 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 PID 1916 wrote to memory of 1168 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 86 PID 1916 wrote to memory of 3512 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 88 PID 1916 wrote to memory of 3512 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 88 PID 1916 wrote to memory of 3512 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 88 PID 1916 wrote to memory of 620 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 89 PID 1916 wrote to memory of 620 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 89 PID 1916 wrote to memory of 620 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 89 PID 1916 wrote to memory of 620 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 89 PID 1916 wrote to memory of 620 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 89 PID 1916 wrote to memory of 620 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 89 PID 1916 wrote to memory of 620 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 89 PID 1916 wrote to memory of 620 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 89 PID 1916 wrote to memory of 544 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 90 PID 1916 wrote to memory of 544 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 90 PID 1916 wrote to memory of 544 1916 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe 90 PID 620 wrote to memory of 1404 620 CasPol.exe 94 PID 620 wrote to memory of 1404 620 CasPol.exe 94 PID 620 wrote to memory of 1404 620 CasPol.exe 94 PID 620 wrote to memory of 464 620 CasPol.exe 95 PID 620 wrote to memory of 464 620 CasPol.exe 95 PID 620 wrote to memory of 464 620 CasPol.exe 95 PID 620 wrote to memory of 2884 620 CasPol.exe 96 PID 620 wrote to memory of 2884 620 CasPol.exe 96 PID 620 wrote to memory of 2884 620 CasPol.exe 96 PID 620 wrote to memory of 1816 620 CasPol.exe 97 PID 620 wrote to memory of 1816 620 CasPol.exe 97 PID 620 wrote to memory of 1816 620 CasPol.exe 97 PID 620 wrote to memory of 2052 620 CasPol.exe 98 PID 620 wrote to memory of 2052 620 CasPol.exe 98 PID 620 wrote to memory of 2052 620 CasPol.exe 98 PID 1404 wrote to memory of 1884 1404 eys115HNSlTckIZzUz8rIoTq.exe 100 PID 1404 wrote to memory of 1884 1404 eys115HNSlTckIZzUz8rIoTq.exe 100 PID 1404 wrote to memory of 1884 1404 eys115HNSlTckIZzUz8rIoTq.exe 100 PID 1816 wrote to memory of 3252 1816 CZxiSEoP3PjM72YzVC9Tyray.exe 102 PID 1816 wrote to memory of 3252 1816 CZxiSEoP3PjM72YzVC9Tyray.exe 102 PID 1816 wrote to memory of 3252 1816 CZxiSEoP3PjM72YzVC9Tyray.exe 102 PID 2052 wrote to memory of 3604 2052 0JSfwqirhNNqXfxzexRUrGPh.exe 147 PID 2052 wrote to memory of 3604 2052 0JSfwqirhNNqXfxzexRUrGPh.exe 147 PID 2052 wrote to memory of 3604 2052 0JSfwqirhNNqXfxzexRUrGPh.exe 147 PID 464 wrote to memory of 4072 464 CXtSb53XuXt6JfSkwDM9g1YG.exe 105 PID 464 wrote to memory of 4072 464 CXtSb53XuXt6JfSkwDM9g1YG.exe 105 PID 464 wrote to memory of 4072 464 CXtSb53XuXt6JfSkwDM9g1YG.exe 105 PID 2884 wrote to memory of 4444 2884 om0NpiARVNZOY6S2ZizaeKsL.exe 103 PID 2884 wrote to memory of 4444 2884 om0NpiARVNZOY6S2ZizaeKsL.exe 103 PID 2884 wrote to memory of 4444 2884 om0NpiARVNZOY6S2ZizaeKsL.exe 103 PID 1404 wrote to memory of 4924 1404 eys115HNSlTckIZzUz8rIoTq.exe 110 PID 1404 wrote to memory of 4924 1404 eys115HNSlTckIZzUz8rIoTq.exe 110 PID 1404 wrote to memory of 4924 1404 eys115HNSlTckIZzUz8rIoTq.exe 110 PID 1564 wrote to memory of 3292 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 120 PID 1564 wrote to memory of 3292 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 120 PID 1564 wrote to memory of 3292 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 120 PID 2380 wrote to memory of 4088 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 122 PID 2380 wrote to memory of 4088 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 122 PID 2380 wrote to memory of 4088 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 122 PID 4752 wrote to memory of 1148 4752 om0NpiARVNZOY6S2ZizaeKsL.exe 123 PID 4752 wrote to memory of 1148 4752 om0NpiARVNZOY6S2ZizaeKsL.exe 123 PID 4752 wrote to memory of 1148 4752 om0NpiARVNZOY6S2ZizaeKsL.exe 123 PID 2940 wrote to memory of 1320 2940 CZxiSEoP3PjM72YzVC9Tyray.exe 126 PID 2940 wrote to memory of 1320 2940 CZxiSEoP3PjM72YzVC9Tyray.exe 126 PID 2940 wrote to memory of 1320 2940 CZxiSEoP3PjM72YzVC9Tyray.exe 126 PID 2380 wrote to memory of 2140 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 128 PID 2380 wrote to memory of 2140 2380 0JSfwqirhNNqXfxzexRUrGPh.exe 128 PID 1564 wrote to memory of 1768 1564 CXtSb53XuXt6JfSkwDM9g1YG.exe 130 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe"C:\Users\Admin\AppData\Local\Temp\0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe"1⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe" -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:3512
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\Pictures\eys115HNSlTckIZzUz8rIoTq.exe"C:\Users\Admin\Pictures\eys115HNSlTckIZzUz8rIoTq.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\u130.0.exe"C:\Users\Admin\AppData\Local\Temp\u130.0.exe"4⤵
- Executes dropped EXE
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\u130.1.exe"C:\Users\Admin\AppData\Local\Temp\u130.1.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD15⤵
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 4404⤵
- Program crash
PID:5000
-
-
-
C:\Users\Admin\Pictures\CXtSb53XuXt6JfSkwDM9g1YG.exe"C:\Users\Admin\Pictures\CXtSb53XuXt6JfSkwDM9g1YG.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Users\Admin\Pictures\CXtSb53XuXt6JfSkwDM9g1YG.exe"C:\Users\Admin\Pictures\CXtSb53XuXt6JfSkwDM9g1YG.exe"4⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:1768
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:928
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
-
-
C:\Users\Admin\Pictures\om0NpiARVNZOY6S2ZizaeKsL.exe"C:\Users\Admin\Pictures\om0NpiARVNZOY6S2ZizaeKsL.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Users\Admin\Pictures\om0NpiARVNZOY6S2ZizaeKsL.exe"C:\Users\Admin\Pictures\om0NpiARVNZOY6S2ZizaeKsL.exe"4⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:512
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:1744
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
-
-
C:\Users\Admin\Pictures\CZxiSEoP3PjM72YzVC9Tyray.exe"C:\Users\Admin\Pictures\CZxiSEoP3PjM72YzVC9Tyray.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Users\Admin\Pictures\CZxiSEoP3PjM72YzVC9Tyray.exe"C:\Users\Admin\Pictures\CZxiSEoP3PjM72YzVC9Tyray.exe"4⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:312
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4296
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
-
-
C:\Users\Admin\Pictures\0JSfwqirhNNqXfxzexRUrGPh.exe"C:\Users\Admin\Pictures\0JSfwqirhNNqXfxzexRUrGPh.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Users\Admin\Pictures\0JSfwqirhNNqXfxzexRUrGPh.exe"C:\Users\Admin\Pictures\0JSfwqirhNNqXfxzexRUrGPh.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:2140
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4160
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3344 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3604
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵PID:3948
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
PID:4272
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1940
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:672
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
PID:1580
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Command and Scripting Interpreter: PowerShell
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:3280
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:8
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:2288
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:3716
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:4140
-
-
-
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1404 -ip 14041⤵PID:404
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5a130e321fa0cee0e227989c5dc15844e
SHA17e830356d8ee689aabc7d2d7bc4a4959c3d23a57
SHA2562d0d949cbaa6728c5c23342295337bd5d23ce86e0598faba2164b1bb40597fd9
SHA51288aec66d30da86dcf8ef53b8a2642d7531d556d7175433fced4797a2862d310401d01d780ef6eed0ec0a4023e96e91e27e1a438000ddfe8492b4fc3eea899b02
-
Filesize
21KB
MD56bfae7494efe76105ad7b486bd5175f9
SHA162a83139affd351b0cbc6e3c8816f19986978af4
SHA2565088f3a642609b58c86cf328e902882fbe55e9f0e5fe566aba88fa99cefadc56
SHA512e60f1e06ddde84cad4c6fbece8dfed07a954adfae946b7f563741b0df0a0bd011ba0e2c29cf21452d601333749dc604e73fb5e795eefa4047bfe032d5a86fa1c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5b362b9a7dedac4411ef9438e6bd45eb9
SHA1dc9f977e8a23e37fa13e58c8b7a338b62547014e
SHA256c82854903a473ebb43550162eebe1ba409fb95bc94e622c57d2e7a7cd7a3338e
SHA512ffa785b451279fd0606b7590fb33f12d4b19e0fd3869de2329be143c77cbcd188f4d9b5ef0b77a6e396083269a7f5a86fe62223c9b22db79c548bbdd2fdb84b2
-
Filesize
3KB
MD5dd992a4331f85961da337a2a67ff0399
SHA10b471308f3637c4af303192e7c775e3cbdda04df
SHA25683292cc2a77e508c370cc05ae9b9b58dde860e88c88fdd07b02ad3667bcdcccd
SHA512482483fd3b6bfeea79955d48d8039b7ff8f808a4c5b5f5d739775832d077ae290807544f8fc7ed5f156822c0040ff875dda7b2f743607c199d645d9df4d13db6
-
Filesize
226KB
MD5c4b38f17b16a0b545d989a5e7f192308
SHA17325ba75f76855f332e840d595cadc591ea220af
SHA25645072f942cb27587d1815a9c079c066c85ac313fe1388fd61dd69c77bdc68b4b
SHA512ca30aa925c6bec667fa4aceda9918d9e7c1ddee1fb7eded4ee266f6f6ae2d3e2fea7070049dc28540615832fc2e60e2821aabc839f468d446b44e082558ef041
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
4.1MB
MD5d55b5ef96c5ec431ddb9baeac60272f4
SHA1e1744f8a4b1433746d91972388f2af6b26fa841d
SHA256ada79f56b84a94f7870b9ac7c425494358863e30609bd18baf0229d3e55388da
SHA5128b3b57fc9a22476ddfcce95aed99ebda03a7021c306daa6fdad898e56fe8bb6c4932d46a0e53deaea0e807552b3598b27a69bc359bd907bd75bfd1575bfa565d
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
368KB
MD55af092dba0ea0929354397630215b41a
SHA1fd605744f6d4f629e22e7a2fb370c8da4dc21d83
SHA2569abf357befc1310b1960a5a976866438d916ab066aeb15cc43a9713b29bf300e
SHA5125e16cae0240a1de45bc474c53bb00ca720fb030c66dac7e74c762e137e5b2361f9e0a89399d39b4b0d9b38b3bb18a49fc10176ec1afe1c54bc1c5d5583e01ab9
-
Filesize
4.1MB
MD5f6a39cd537cec35ae05b5615702c0125
SHA13b8bf4e10848eb7a05d9c85c588af194bb02df4c
SHA25636d0a6d463a523e3644575a513c96ed6833b87d1c4efc579d89b2261b226f7b6
SHA51259e3148b1fe69e657708eac51db39a8b50b12e52190d792a0ea691c174c46ef85908bc62d9f0a20d1bdaf017d98de07643c755816bd9f294257ab9a3cc45443b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5742e97f20a71a63e5ca6ab32e3e95dd4
SHA172cf4f998e76b0b000711038f2f6be3d428050ce
SHA2561b8696a88656a6bbda4bf22269c22c7b3bd6d8a7f7673013f4e4593a6fc6a2a0
SHA512b70c72d0f20b00736d3f931834dd8b53e805ddc2f4a37a22aaf43b4150ac9a79bc6572feb52d32a31bc475473238baa066d4009743eb192550b9c584fcd27085
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD512b13fd7216d8aaeb8c8d786827ccdcd
SHA1efe025b2ad67ea0bd4a192a0d6109e9727486dfb
SHA25612c9006535f84bcf8d437d30705f0a921ccbd043f11317418ff5f67428e5a0e4
SHA51264b13bbe92a625925dbd4197c5be8d410168a6f5c25a70d64c192831a9b6d9626e6d5e1d034c3f171b0d0e4a125eb434b6bed3e024535916182179666fc7cb19
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58d080aee000e233e107510bd02a32f2e
SHA1a895818a2609d037a610c7e99feefbc322eef40c
SHA256311488301fb6e31ae6791ddecc015cc5790cca00bdf79f2477686efceb43f837
SHA5129bc9e590c4f4b3b17b4180cd9578a1547aa17568b7f4e33e3f1da610bbc2f103903942ca91dbabc87d027e7408cc2fc74873126103d30d9bc4bf2e41b43fa4a8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c7e2ea9a4fb5c196484704884c09f30d
SHA1fcd4291407d3838748aa936fbc80f4f7d68d1d2a
SHA25668157599446334278b5f99710cf73cad4d69ab0f6918547d091a5c47b170ede0
SHA5120e7265b07bd90c88389393514779a24db9036e37df7bb6507df6c75bf1fc35fc5dd3e51269f5fbcdff723e4c7388a9b7c52dab817a9cdc5bf115d93977cefd8c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50acce2677ffc34db6b75e62e303d5747
SHA16aed6fcbb65d8699d4c04e8b350e0cb6c461d92d
SHA256febb954e790aaf6263cc3ca20cd4fa51601db6c836f4e1b70c6884276c866ff6
SHA512e7c4bd65b255001b2a8291e55b040a162d0a80de66e4416fde44afef10529d71294f3e6c64f2fe1a990b149069d58a1bdd84e531f2d6aeaead0a2e7b4634137b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD579e464ec0f05b962f17d914baf519565
SHA1901e494aacb9a19fe7a60428287be179e70f7843
SHA25631f42c6a5654c8f029b1a403744e0ee85e4d0cd044c560eb6fcd708154c557cf
SHA512df62c38a235374be5112396556d3c108efb5141d30f7dfbc069ee47d5fe751525ded2b9bed71b0196abfff7822d753feffe1f11dc10ebe921b188d817b7add3a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d1aa3ff3e9232e3df42e727056cba384
SHA10860a07756ea3d4ccf53f60c4cdb6eb8a24f0fbb
SHA25690333b8ced78f83668feef7ffea9a9dfaf4512b9f8082b4ba88952c3c2af9640
SHA512ba503dc2d3ff012bb3f48d1dd89302baa2dfd5e31e58d540adc148ac75dbccfc800dfc08e703cfab7953a4ce658f3e67142c5c0a8f69aa7650211be8cdab6461
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54230a1c3afeff5a3765e523edbef8172
SHA19b6b52cab98456dddcb14ca00e46083819a2f0ee
SHA25685d9d45e8a73c2241c1bf527042825ca84ac6d36296e8b6908d440aaabe87927
SHA51265c1bd867407d4bd3dc4227b030388a80784450e14368f27310bb191804507bfac2f63eef7343f7954e9427dc700e6d8c875c3abd4d2235209ab942fb3af215a
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec