Analysis
-
max time kernel
14s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/05/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe
Resource
win10v2004-20240426-en
General
-
Target
95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe
-
Size
4.1MB
-
MD5
f3f1ea24c7557fd69b44b32d848b7aa6
-
SHA1
f18c7bcbb3231c8147bb799f2e8d1b46bcf30acb
-
SHA256
95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1
-
SHA512
7b32346d7bb6fe4465b611e3b615a9a9061d767c4fe67136f988902f0a8e6d694a0d5e2459719387345f8704ac39b6807ae7e58921011c9add028633bc23a710
-
SSDEEP
98304:kl9GTbLtL99uWlQGfUFGGhNMfnjCzwWu2csDCx3z+tX:JT3oWlQMUAMlWxj+tX
Malware Config
Signatures
-
Glupteba payload 4 IoCs
resource yara_rule behavioral2/memory/5104-2-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba behavioral2/memory/5104-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5104-96-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/5104-98-0x0000000002E30000-0x000000000371B000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1192 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1348 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe File created C:\Windows\rss\csrss.exe 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe -
pid Process 236 powershell.exe 2864 powershell.exe 3004 powershell.exe 2280 powershell.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3004 powershell.exe 3004 powershell.exe 5104 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 5104 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 2280 powershell.exe 2280 powershell.exe 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 236 powershell.exe 236 powershell.exe 2864 powershell.exe 2864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 5104 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Token: SeImpersonatePrivilege 5104 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 236 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 5104 wrote to memory of 3004 5104 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 82 PID 5104 wrote to memory of 3004 5104 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 82 PID 5104 wrote to memory of 3004 5104 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 82 PID 3316 wrote to memory of 2280 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 87 PID 3316 wrote to memory of 2280 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 87 PID 3316 wrote to memory of 2280 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 87 PID 3316 wrote to memory of 5084 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 89 PID 3316 wrote to memory of 5084 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 89 PID 5084 wrote to memory of 1192 5084 cmd.exe 91 PID 5084 wrote to memory of 1192 5084 cmd.exe 91 PID 3316 wrote to memory of 236 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 92 PID 3316 wrote to memory of 236 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 92 PID 3316 wrote to memory of 236 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 92 PID 3316 wrote to memory of 2864 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 94 PID 3316 wrote to memory of 2864 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 94 PID 3316 wrote to memory of 2864 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 94 PID 3316 wrote to memory of 1348 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 96 PID 3316 wrote to memory of 1348 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 96 PID 3316 wrote to memory of 1348 3316 95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe"C:\Users\Admin\AppData\Local\Temp\95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe"C:\Users\Admin\AppData\Local\Temp\95d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1192
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:236
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
PID:1348
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c951c79a2ae10d7a0752916e2070186e
SHA12684429dfa2a749e98fe257f32260e354de1b1b1
SHA2561a54805b48878d93a59f69e287c54d6f35d091515531dab1133b3659f189fdf5
SHA512eda92de22080f888f90459272c29a4e8af59254b516d25020ee0a7918a9b610bf4330921f4fcc886292b57a832101cfa6442554ecf30dd50544be12bc89af617
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD528acbd7a0b571467e295018381333868
SHA1fb0b599a074c801914331e8277fca37c1e38ae8e
SHA2560b367a5d21e56464c178ba89303ae05d9c829c81f995c2749902195c8341a1b9
SHA512cc26fb71eca6992533dc71d3fc9f0b40df335d7d1b057e1f48703bb845b4cf38994569e1e7fa0eab1c246793c1a46342c4b9899fa3c9ca9aa79219afc6c1d682
-
Filesize
4.1MB
MD5f3f1ea24c7557fd69b44b32d848b7aa6
SHA1f18c7bcbb3231c8147bb799f2e8d1b46bcf30acb
SHA25695d1a8a93f18e1da9b7dc25215409c2c7244cef17a9c7ab5c7bfa5c4cb7611c1
SHA5127b32346d7bb6fe4465b611e3b615a9a9061d767c4fe67136f988902f0a8e6d694a0d5e2459719387345f8704ac39b6807ae7e58921011c9add028633bc23a710