Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/05/2024, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe
Resource
win10v2004-20240226-en
General
-
Target
aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe
-
Size
4.1MB
-
MD5
ff1d79559e6abe3ef9637ad3e5377c5f
-
SHA1
b0304d4b3bd6cf83525c331dc289fad3e0fab652
-
SHA256
aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f
-
SHA512
18464759beea38bd2b2ab353932e6e55ce0f0d6147b81019d472e9d6aec4633f14e476d1437b2f3fa8b9bdc747f590ee5bcf3f77d5df269a8227b1996db02558
-
SSDEEP
98304:AvzBhIm6zIE7SIO2RhCG9zRnSMmyRgCXxFQG9cm:WzBhDcIv8bCGbNmyXXxFQGym
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/1788-2-0x0000000002E40000-0x000000000372B000-memory.dmp family_glupteba behavioral2/memory/1788-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1788-76-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1788-98-0x0000000002E40000-0x000000000372B000-memory.dmp family_glupteba behavioral2/memory/4060-119-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4060-199-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-200-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-212-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-217-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-220-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-224-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-228-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-232-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-237-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-240-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-244-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-248-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4164-252-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2212 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 4164 csrss.exe 1064 injector.exe 240 windefender.exe 380 windefender.exe -
resource yara_rule behavioral2/memory/240-206-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000200000002aa47-205.dat upx behavioral2/memory/380-208-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/240-210-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/380-214-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/380-222-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/380-234-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe File created C:\Windows\rss\csrss.exe aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2724 sc.exe -
pid Process 228 powershell.exe 2828 powershell.exe 2192 powershell.exe 3624 powershell.exe 412 powershell.exe 5072 powershell.exe 3060 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1364 schtasks.exe 3748 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1892 = "Russia TZ 3 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2322 = "Sakhalin Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-222 = "Alaskan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-891 = "Morocco Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 228 powershell.exe 228 powershell.exe 1788 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 1788 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 2828 powershell.exe 2828 powershell.exe 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 2192 powershell.exe 2192 powershell.exe 3624 powershell.exe 3624 powershell.exe 412 powershell.exe 412 powershell.exe 5072 powershell.exe 5072 powershell.exe 3060 powershell.exe 3060 powershell.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 4164 csrss.exe 4164 csrss.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 4164 csrss.exe 4164 csrss.exe 1064 injector.exe 1064 injector.exe 4164 csrss.exe 4164 csrss.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe 1064 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 228 powershell.exe Token: SeDebugPrivilege 1788 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Token: SeImpersonatePrivilege 1788 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 2192 powershell.exe Token: SeDebugPrivilege 3624 powershell.exe Token: SeDebugPrivilege 412 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeDebugPrivilege 3060 powershell.exe Token: SeSystemEnvironmentPrivilege 4164 csrss.exe Token: SeSecurityPrivilege 2724 sc.exe Token: SeSecurityPrivilege 2724 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1788 wrote to memory of 228 1788 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 79 PID 1788 wrote to memory of 228 1788 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 79 PID 1788 wrote to memory of 228 1788 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 79 PID 4060 wrote to memory of 2828 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 84 PID 4060 wrote to memory of 2828 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 84 PID 4060 wrote to memory of 2828 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 84 PID 4060 wrote to memory of 1472 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 86 PID 4060 wrote to memory of 1472 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 86 PID 1472 wrote to memory of 2212 1472 cmd.exe 88 PID 1472 wrote to memory of 2212 1472 cmd.exe 88 PID 4060 wrote to memory of 2192 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 89 PID 4060 wrote to memory of 2192 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 89 PID 4060 wrote to memory of 2192 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 89 PID 4060 wrote to memory of 3624 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 91 PID 4060 wrote to memory of 3624 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 91 PID 4060 wrote to memory of 3624 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 91 PID 4060 wrote to memory of 4164 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 93 PID 4060 wrote to memory of 4164 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 93 PID 4060 wrote to memory of 4164 4060 aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe 93 PID 4164 wrote to memory of 412 4164 csrss.exe 94 PID 4164 wrote to memory of 412 4164 csrss.exe 94 PID 4164 wrote to memory of 412 4164 csrss.exe 94 PID 4164 wrote to memory of 5072 4164 csrss.exe 100 PID 4164 wrote to memory of 5072 4164 csrss.exe 100 PID 4164 wrote to memory of 5072 4164 csrss.exe 100 PID 4164 wrote to memory of 3060 4164 csrss.exe 102 PID 4164 wrote to memory of 3060 4164 csrss.exe 102 PID 4164 wrote to memory of 3060 4164 csrss.exe 102 PID 4164 wrote to memory of 1064 4164 csrss.exe 104 PID 4164 wrote to memory of 1064 4164 csrss.exe 104 PID 240 wrote to memory of 4072 240 windefender.exe 110 PID 240 wrote to memory of 4072 240 windefender.exe 110 PID 240 wrote to memory of 4072 240 windefender.exe 110 PID 4072 wrote to memory of 2724 4072 cmd.exe 111 PID 4072 wrote to memory of 2724 4072 cmd.exe 111 PID 4072 wrote to memory of 2724 4072 cmd.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe"C:\Users\Admin\AppData\Local\Temp\aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe"C:\Users\Admin\AppData\Local\Temp\aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2212
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1364
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4148
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1064
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3748
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:380
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ef8bc47d8558ed86dd3573fa98092774
SHA124fb1125f41be1bb7ec616115f5eef84e2840b46
SHA256f46affc26b48c4881b4075d45a726c6b3c56a7cd9163a3fcd92505f0df979a5a
SHA51270fe9f75a4fb3ae80903587ff6ac0de67ddb009b5dc618b5004d7ee42ee4b7f9bb89607e03564c7dcc7f155cae49f866580d24b48e67cd14a80e76ac83748995
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d52804a9946a47a280e550a80b4c87f5
SHA104fa8f7fc447fa2ad1ea0ea282f0149d46e3e209
SHA256bff37bbc2be1505ee86062c246b5ab061985b18d9ce656766e0012c1ff543de9
SHA51286ed0d579d812b802f0384346f81d88ecd641967fcf194f33c39b648b121a12f653e0e7363a4c76df934f78532eb3cfa6c0d90383ad91262fb9ff4e16fc36f08
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD571fad5f8d206403f77c84d6146157429
SHA1409f978b5b6d7049b17cb583213f147116f2c760
SHA256258fc0604a05e9ca729278c4db4887ee076267ca6a94b82b2f25c29eba933611
SHA5121d24f703877f24f5a75c52f3d46983af3801937bf2c2256c3637cf042f596a2cb565332d4438790d504803e27bb33d63ca4d341dd941f87113ec5dffd3627e6f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD534def07f3a878c25c3d36a817db9ebd1
SHA14028242c1d8912fc3b45a6d3a61e9ac64658b792
SHA25640b7e7bf1f1075ebd46df94c789490a720c8f86ca08d2c444bd67d71d852e8b2
SHA51227ba057a13c85d4168b10656ea5c01b632f9a647f95c5ae15f1dc03e6b4dd363a3425dc9492685ce0cb9ce7ebdaa43947e1d979cf70fccb64457889686ddc7cb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5666e77b03fe8cd5fd572228d7a6027f0
SHA19defcefa59858ff4b2c5a403c71e1c6eee4189c0
SHA256007051482bcdc9621a0e1a6f7d449e65e5e7c9431e77c39ec44b48d863e383c9
SHA512a7bbdaace6b22f0c2513864ab7febf4fd984b368da3bede368b719e4225f4a0a1529858f4ae49c22f95708bd0833a2ab75770a50e19f2a41e11622eccd41b2c2
-
Filesize
4.1MB
MD5ff1d79559e6abe3ef9637ad3e5377c5f
SHA1b0304d4b3bd6cf83525c331dc289fad3e0fab652
SHA256aced0843663e7fb4e1f5011794213d53569aadc5b84d963b7321ddc4839edf3f
SHA51218464759beea38bd2b2ab353932e6e55ce0f0d6147b81019d472e9d6aec4633f14e476d1437b2f3fa8b9bdc747f590ee5bcf3f77d5df269a8227b1996db02558
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec