Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe
Resource
win10v2004-20240508-en
General
-
Target
1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe
-
Size
4.1MB
-
MD5
0366f0d71bcb6b15a8dc310635ec2435
-
SHA1
e3c53e619ded72c0eec7b88d01baedeac47a5ed8
-
SHA256
1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096
-
SHA512
f12eddb4b6ac5c056c2052a453abe364369bcb85a24fabd8583f2837289bb532d5855d00bcc36223a6111513d30032abc7775d3806cfc5729a487f15b1f7d8bd
-
SSDEEP
98304:Q557or8YMdWV8xcrChUIDCoHczW4WQrxCgsiGsm1N9Zshd41TTimZ:Q5w86GcrCCoczCJiGXN9ZshdAimZ
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral1/memory/1544-2-0x0000000002E80000-0x000000000376B000-memory.dmp family_glupteba behavioral1/memory/1544-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1544-57-0x0000000002E80000-0x000000000376B000-memory.dmp family_glupteba behavioral1/memory/1544-82-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1208-112-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-192-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-194-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-196-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-199-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-200-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-202-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-204-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-207-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-208-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-210-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-212-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-215-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4180-216-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2828 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 4180 csrss.exe 1896 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe File created C:\Windows\rss\csrss.exe 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe -
pid Process 3304 powershell.exe 3732 powershell.exe 5060 powershell.exe 3864 powershell.exe 2096 powershell.exe 3224 powershell.exe 4892 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1496 schtasks.exe 3768 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3864 powershell.exe 3864 powershell.exe 1544 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 1544 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 2096 powershell.exe 2096 powershell.exe 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 4892 powershell.exe 4892 powershell.exe 3304 powershell.exe 3304 powershell.exe 3732 powershell.exe 3732 powershell.exe 5060 powershell.exe 5060 powershell.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 4180 csrss.exe 4180 csrss.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 4180 csrss.exe 4180 csrss.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe 1896 injector.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3864 powershell.exe Token: SeDebugPrivilege 1544 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Token: SeImpersonatePrivilege 1544 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe Token: SeDebugPrivilege 2096 powershell.exe Token: SeDebugPrivilege 4892 powershell.exe Token: SeDebugPrivilege 3304 powershell.exe Token: SeDebugPrivilege 3732 powershell.exe Token: SeDebugPrivilege 5060 powershell.exe Token: SeSystemEnvironmentPrivilege 4180 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1544 wrote to memory of 3864 1544 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 87 PID 1544 wrote to memory of 3864 1544 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 87 PID 1544 wrote to memory of 3864 1544 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 87 PID 1208 wrote to memory of 2096 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 98 PID 1208 wrote to memory of 2096 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 98 PID 1208 wrote to memory of 2096 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 98 PID 1208 wrote to memory of 2616 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 101 PID 1208 wrote to memory of 2616 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 101 PID 2616 wrote to memory of 2828 2616 cmd.exe 103 PID 2616 wrote to memory of 2828 2616 cmd.exe 103 PID 1208 wrote to memory of 3224 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 104 PID 1208 wrote to memory of 3224 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 104 PID 1208 wrote to memory of 3224 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 104 PID 1208 wrote to memory of 4892 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 106 PID 1208 wrote to memory of 4892 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 106 PID 1208 wrote to memory of 4892 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 106 PID 1208 wrote to memory of 4180 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 108 PID 1208 wrote to memory of 4180 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 108 PID 1208 wrote to memory of 4180 1208 1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe 108 PID 4180 wrote to memory of 3304 4180 csrss.exe 109 PID 4180 wrote to memory of 3304 4180 csrss.exe 109 PID 4180 wrote to memory of 3304 4180 csrss.exe 109 PID 4180 wrote to memory of 3732 4180 csrss.exe 115 PID 4180 wrote to memory of 3732 4180 csrss.exe 115 PID 4180 wrote to memory of 3732 4180 csrss.exe 115 PID 4180 wrote to memory of 5060 4180 csrss.exe 117 PID 4180 wrote to memory of 5060 4180 csrss.exe 117 PID 4180 wrote to memory of 5060 4180 csrss.exe 117 PID 4180 wrote to memory of 1896 4180 csrss.exe 119 PID 4180 wrote to memory of 1896 4180 csrss.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe"C:\Users\Admin\AppData\Local\Temp\1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe"C:\Users\Admin\AppData\Local\Temp\1fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2828
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:3224
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1496
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4824
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f881ab32f8339c17350a17c6f2482abe
SHA10eef4236c9575eb19a980f434a347cd48049607d
SHA2568a2b212c55b8e4d1aff2eb79bd2900ba6f1e59601d7fdb6000b1a20c8fa13e6c
SHA51291f136873a334814f5844b88ceda21c111389e429601387aa8a638d4c73b7b940eec988c77d4e6eab86ba42f63c0569988a3bcc1ad71c82a09c450ee0aee7ed1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD547d01339be1df753a03cabf46a62a3ac
SHA1ff655a95fea30b62712fa61d84711f687c286003
SHA256f938e21b993f2b933b70db60b608e938540372ca794ad57994dd30ac44569e6e
SHA51252b2e3b6ef4f022e0f4adc4f6d989260b57e718cb3b82df6980970ddcd0ea687f4fe839c0580c7c0446a6c998fba1a88372d6f68b55bea44c5b58a8f6b7ac1f3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ff9a0dd0be6b93747809791fb60eec3e
SHA1609ec09adaaaf0191eee472ce3b28139cb32802c
SHA256cccf1f6c4b2f7be7d8e3f444e29059465f909e98fce2e109fd72132ec7702441
SHA51276e3ee7b78757c844d2b5eae4558a6a9db959a57f6f7bd7d559f9f1795c354ca2dc545cd8cfeb5e0e79da5cef1f26f1ee23689d95769828d232de4c4287cf9d9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57cf5f789ad2548e073190d5d0fc34b08
SHA1316a23718dda91dbd95f854e6378812d02f6fe94
SHA2565eb08abe21552381736a956a00ae8c1761ee6d85561fd4ecc8540f3a38e3ea58
SHA512441403dca15b85a67d038d1d4b105960f6090d04c7bfd569ace8f0b809db821bd3396e2cbf320f9439cd15a012a4c266e9e48b73b5f0bd161ffc0fb39fc7a0dc
-
Filesize
4.1MB
MD50366f0d71bcb6b15a8dc310635ec2435
SHA1e3c53e619ded72c0eec7b88d01baedeac47a5ed8
SHA2561fac81c43a34dfe91d46277cb2522cb1b0cd335741926a20f8681babf54cf096
SHA512f12eddb4b6ac5c056c2052a453abe364369bcb85a24fabd8583f2837289bb532d5855d00bcc36223a6111513d30032abc7775d3806cfc5729a487f15b1f7d8bd