Analysis
-
max time kernel
18s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe
Resource
win10v2004-20240426-en
General
-
Target
1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe
-
Size
4.1MB
-
MD5
4ac5f78cc5bed1faf441d3d8c0929294
-
SHA1
d483460ee061d2cd73b6dfd3e364a8dd74d0941f
-
SHA256
1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b
-
SHA512
23a07e6de32edc44f28d6b34799d73418d83357f83b1f640c0d348ab4b9b09de7ee050ada00c0addf513af7a181eefb39421ec01d649f00deea9c1b83179cdcd
-
SSDEEP
98304:TMIwCeNIp7mrmH39JW0ckvUhqbUgu0QDk0l0y/C/U00fVU15PAv:TBwCmIp7Ci3XwSxbLu0E0yeIUT4v
Malware Config
Signatures
-
Glupteba payload 16 IoCs
resource yara_rule behavioral1/memory/3128-2-0x0000000004BF0000-0x00000000054DB000-memory.dmp family_glupteba behavioral1/memory/3128-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3128-55-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/3128-106-0x0000000004BF0000-0x00000000054DB000-memory.dmp family_glupteba behavioral1/memory/4300-213-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-220-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-231-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-234-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-237-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-240-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-243-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-246-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-249-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-252-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-255-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral1/memory/4300-258-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4144 netsh.exe -
resource yara_rule behavioral1/files/0x000d000000023428-224.dat upx behavioral1/memory/4816-229-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2132-228-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4816-225-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2132-232-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2132-238-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/2132-247-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4980 sc.exe -
pid Process 2396 powershell.exe 5068 powershell.exe 5084 powershell.exe 4104 powershell.exe 5076 powershell.exe 820 powershell.exe 1944 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 656 schtasks.exe 4500 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 820 powershell.exe 820 powershell.exe 3128 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 3128 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 1944 powershell.exe 1944 powershell.exe 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 2396 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 820 powershell.exe Token: SeDebugPrivilege 3128 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Token: SeImpersonatePrivilege 3128 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 2396 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3128 wrote to memory of 820 3128 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 94 PID 3128 wrote to memory of 820 3128 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 94 PID 3128 wrote to memory of 820 3128 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 94 PID 5104 wrote to memory of 1944 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 100 PID 5104 wrote to memory of 1944 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 100 PID 5104 wrote to memory of 1944 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 100 PID 5104 wrote to memory of 3236 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 102 PID 5104 wrote to memory of 3236 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 102 PID 3236 wrote to memory of 4144 3236 cmd.exe 104 PID 3236 wrote to memory of 4144 3236 cmd.exe 104 PID 5104 wrote to memory of 2396 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 105 PID 5104 wrote to memory of 2396 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 105 PID 5104 wrote to memory of 2396 5104 1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe"C:\Users\Admin\AppData\Local\Temp\1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe"C:\Users\Admin\AppData\Local\Temp\1c2fac992dfc7bc48272670505386656982f55e19e6433dd70eefd77cf6d473b.exe"2⤵
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4144
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:5068
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:4300
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:5084
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:656
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1816
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4104
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:972
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4500
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:4816
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4944
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4980
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD586a6121a18467fcdf7948e0ed721d042
SHA132bafabe11864d8308e470e08cfa60189b12f8cf
SHA2569b8808fd850e31666df31663e7343389f99d4a82fa583aa0eda4fc045421b819
SHA512ed56ae51650a98f808fc83f17293cd469ef4c17e23869c8e5e909f147b7f98cca3d1eea9022adba238f081a128f186389dacc173f6a039d30f3b0f9bd4f8feef
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b05dee0a5d269d1e66dd2827b0e659e9
SHA1d77c717c78eb58418d966810c10083980f4bafea
SHA256455718dfb10daf51ec6d7b4d23a0f4d08e505519d5146034bb6063351a4cc5d2
SHA512b1cad297f6e84ad555da0621ed7b35e3da2f72584f15f6bddbd1c4d6dc3ef299e65ca477a62a126532434da5c24e56bac5fb93a43ee4086afee941207f4bacb6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5801839912405f5a787c20a4cd6c74036
SHA17398aa7082f8b455e151acde65ab0a963b71477b
SHA256612ae4b1b461777bced0672c4e5668e2879aa3d60fd63eb704750dbf8f9afd66
SHA51284f6c5c14575078530fb2c05fdc567fa447b6b2f628c3783528009004d83898a4dd835dd1a86dd143b1f89eeb843cb80766a3d43ab9cb928dd06ac465b9751e5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51ba0e66d7b5ecbab79c587aa728599a9
SHA1df84e699d4f9b511c6f890fc197fabafc102b54c
SHA256ad7364910ab957aa32e2b7ce5fa5e855e7f11694f98d6afe29c3fa12d53fb673
SHA512789305077c547e781c6c749755b5ef01705dc63bb2f9153f1b89fa280df84c2795582735558957863af6374c695522a9864ee8700d244cbab661e91acc3bc2e8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5dc5e4bd755b6ef3195898fb20b551647
SHA12721a9be2f79c123e1ef57e90ab3fc593d823ba6
SHA256b3570ed78b5723a76a5eb62eb17f898bf98be111f92300395ca1bf80c8591beb
SHA512456f5db284ca6a34ee7d2c684f226cc8cc6fa6b413fa7c507ef3a796e2f96213058b07fd3d1be34fc8dcfe25c49b99ce3fdccf0a4488316f3c64dc4892954b48
-
Filesize
3.6MB
MD53f30cd252a0c5561ca191bf39cc076b3
SHA127b769deaee7f2ad739fdaed31a5b7cf4536710f
SHA2565b0dbed7a3aef2cd28f62198cc05175dd790c10b3c61f7af9c979182e6550cae
SHA512ad92b2d5b9aad6dfced765a0d60f2dbc3124f51dfb5249c4b15f7a829a6f4628ac429901db626b3f9805edc7a1118ac0ed6aabda86e35ce95637c6f87bc37a96
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec