Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/05/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe
Resource
win10v2004-20240426-en
General
-
Target
9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe
-
Size
4.1MB
-
MD5
93a658296b4be3d4d5126a60a487d1f9
-
SHA1
9b12347718392de4cd89a917ffcf3a4155d66abd
-
SHA256
9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511
-
SHA512
4f62fe67cc299b8e9874effc112c9dd293ea74cf41f104a60e0345953345a3f535e32c51bb9391ded44357e10f2e804d23971e973f0cccd2edfdac87e9c2c152
-
SSDEEP
98304:wvzBhIm6zIE7SIO2RhCG9zRnSMmyRgCXxFQG9cJ:GzBhDcIv8bCGbNmyXXxFQGyJ
Malware Config
Signatures
-
Glupteba payload 13 IoCs
resource yara_rule behavioral2/memory/3912-2-0x0000000002FA0000-0x000000000388B000-memory.dmp family_glupteba behavioral2/memory/3912-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3912-73-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3912-75-0x0000000002FA0000-0x000000000388B000-memory.dmp family_glupteba behavioral2/memory/720-135-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1544-195-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1544-205-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1544-214-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1544-223-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1544-233-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1544-242-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1544-250-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1544-259-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4556 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1544 csrss.exe -
resource yara_rule behavioral2/memory/1868-200-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2492-201-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1868-203-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2492-212-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2492-230-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe File created C:\Windows\rss\csrss.exe 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4960 sc.exe -
pid Process 4084 powershell.exe 4260 powershell.exe 2372 powershell.exe 2268 powershell.exe 4968 powershell.exe 1444 powershell.exe 2776 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4256 schtasks.exe 2440 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-112 = "Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 powershell.exe 2268 powershell.exe 3912 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 3912 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 4968 powershell.exe 4968 powershell.exe 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 1444 powershell.exe 1444 powershell.exe 2776 powershell.exe 2776 powershell.exe 4084 powershell.exe 4084 powershell.exe 4260 powershell.exe 4260 powershell.exe 2372 powershell.exe 2372 powershell.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2268 powershell.exe Token: SeDebugPrivilege 3912 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Token: SeImpersonatePrivilege 3912 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe Token: SeDebugPrivilege 4968 powershell.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 4084 powershell.exe Token: SeDebugPrivilege 4260 powershell.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeSecurityPrivilege 4960 sc.exe Token: SeSecurityPrivilege 4960 sc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3912 wrote to memory of 2268 3912 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 83 PID 3912 wrote to memory of 2268 3912 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 83 PID 3912 wrote to memory of 2268 3912 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 83 PID 720 wrote to memory of 4968 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 88 PID 720 wrote to memory of 4968 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 88 PID 720 wrote to memory of 4968 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 88 PID 720 wrote to memory of 2272 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 90 PID 720 wrote to memory of 2272 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 90 PID 2272 wrote to memory of 4556 2272 cmd.exe 92 PID 2272 wrote to memory of 4556 2272 cmd.exe 92 PID 720 wrote to memory of 1444 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 93 PID 720 wrote to memory of 1444 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 93 PID 720 wrote to memory of 1444 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 93 PID 720 wrote to memory of 2776 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 95 PID 720 wrote to memory of 2776 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 95 PID 720 wrote to memory of 2776 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 95 PID 720 wrote to memory of 1544 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 97 PID 720 wrote to memory of 1544 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 97 PID 720 wrote to memory of 1544 720 9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe 97 PID 1868 wrote to memory of 3660 1868 windefender.exe 114 PID 1868 wrote to memory of 3660 1868 windefender.exe 114 PID 1868 wrote to memory of 3660 1868 windefender.exe 114 PID 3660 wrote to memory of 4960 3660 cmd.exe 115 PID 3660 wrote to memory of 4960 3660 cmd.exe 115 PID 3660 wrote to memory of 4960 3660 cmd.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe"C:\Users\Admin\AppData\Local\Temp\9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe"C:\Users\Admin\AppData\Local\Temp\9f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4556
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2440
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3244
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Suspicious behavior: EnumeratesProcesses
PID:788
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4256
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Modifies data under HKEY_USERS
PID:2492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52e63c980ce4f8a0e2f6119fe1d812e70
SHA1958f163f4d3e9e334f848e38b6dd56c0bced6137
SHA256aa26ec28e3861f7b121143caf7bc5a4921333995bad83ff799b9f561e5d76d9c
SHA512b1bbc31c544a8c57d0006e526b8df195a90791dba1c1f06e9b53edab089c2a3de98e1b91ca8556ca1ab82e74616dc5821b53d23050d811473c594ba07c6f402d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD501b9bed1e7e92a32aea997f6c67f7e3f
SHA1b9cf3e1047c93061242c2afb48bdaf4958e72a6c
SHA2566edcd6fb23cfa8c3438dc447441432f5ddecb9549ac19bc9f323d6b5f0e2c197
SHA512520abf12a878f6aab38242203d991d3d70b99beda9512a6c9da29f7e0234b54c47d6fa1969f7069a3db2bfe33ec1a66a6813a63296cc57a93ea2dc575fa719b6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c68d1ef69d6772966800c0e62c348734
SHA1a18cf4b6027ac0b8f87b4b1437276079ff97b84d
SHA2569e63096638d2276aac5a85e1b947c17a58f8ce04a2b4d96f7e36aada3aeb4aaa
SHA5124552a1837909a0928f8a5a52a47efe8763d05d7f77a3b1afef4d4c2c037bb0e7069e66277e89c2e818fd19ba6163ec982e3d8873fd6bd4249c47a030336b6fa8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54d6f95213b4f6302a3f3db583e59ba22
SHA1ccad5dcfaa938b6e10eb01b6996c144942eb96aa
SHA256fa7b21423972903a06c77d0fdecfc4bc8c1bfdcaf2c5f81c59ac768a95239acd
SHA5126133a666ac2c82e8f5e47e257737ba55168c8ac811b470c4bbb9cc41445a30dcfeef6bb89e68b46e40d318f56241fb04077f530ddec056867d1daed1d0f6d03e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53b3a19b783d7810c89a2b9234241ab19
SHA1c71743dce027233ac4210d12a0c965769a2e2624
SHA25621059c1d3087895102be3fe8a1b0709ad4f78534f65791400015e1718b92ac45
SHA5123c69b74d151d5083006c769c2a59b4ff8d649c1896ac087d0af30b551b8a4b34a77cd7bda6c3be0e9540288a1c78309782973e457496a5adb2a19b7956b14c7f
-
Filesize
4.1MB
MD593a658296b4be3d4d5126a60a487d1f9
SHA19b12347718392de4cd89a917ffcf3a4155d66abd
SHA2569f5be7f86f25bf7f8816718238bd9788a07d27116ebf5435bbe18e81fd982511
SHA5124f62fe67cc299b8e9874effc112c9dd293ea74cf41f104a60e0345953345a3f535e32c51bb9391ded44357e10f2e804d23971e973f0cccd2edfdac87e9c2c152