Analysis
-
max time kernel
58s -
max time network
125s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-05-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe
Resource
win10v2004-20240508-en
General
-
Target
eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe
-
Size
4.1MB
-
MD5
d2f354fc3e499c505ac0ce1df085e7eb
-
SHA1
007997d9e795d538a55f758501290c71179d382b
-
SHA256
eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958
-
SHA512
140c2c4dbf004ca893088af820d4fd6d440c78b069d32d7d9e3fd13aa40d75d5ec9709407f7e7e9a1f7f031c5b30a825432cc15f9193d428878ff348ef266a2e
-
SSDEEP
98304:UhY2qRRjR1paGoDMO/b2fpl9vUYBzPUd5cvaqxgKnFtiaJ:qYlRLXY4O+pXvrLaqWuc4
Malware Config
Signatures
-
Glupteba payload 10 IoCs
resource yara_rule behavioral2/memory/3496-2-0x0000000004E10000-0x00000000056FB000-memory.dmp family_glupteba behavioral2/memory/3496-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3496-4-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3496-55-0x0000000004E10000-0x00000000056FB000-memory.dmp family_glupteba behavioral2/memory/3496-54-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4716-56-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3496-81-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4716-128-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4920-142-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4920-206-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4156 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 4920 csrss.exe 1552 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe File created C:\Windows\rss\csrss.exe eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe -
pid Process 4332 powershell.exe 2264 powershell.exe 3724 powershell.exe 400 powershell.exe 2952 powershell.exe 3924 powershell.exe 4984 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4120 schtasks.exe 4900 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 3924 powershell.exe 3924 powershell.exe 3496 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 3496 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4984 powershell.exe 4984 powershell.exe 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 4332 powershell.exe 4332 powershell.exe 2264 powershell.exe 2264 powershell.exe 3724 powershell.exe 3724 powershell.exe 400 powershell.exe 400 powershell.exe 2952 powershell.exe 2952 powershell.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 4920 csrss.exe 4920 csrss.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 4920 csrss.exe 4920 csrss.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe 1552 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3924 powershell.exe Token: SeDebugPrivilege 3496 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Token: SeImpersonatePrivilege 3496 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeDebugPrivilege 4332 powershell.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeDebugPrivilege 3724 powershell.exe Token: SeDebugPrivilege 400 powershell.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeSystemEnvironmentPrivilege 4920 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3496 wrote to memory of 3924 3496 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 82 PID 3496 wrote to memory of 3924 3496 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 82 PID 3496 wrote to memory of 3924 3496 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 82 PID 4716 wrote to memory of 4984 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 87 PID 4716 wrote to memory of 4984 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 87 PID 4716 wrote to memory of 4984 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 87 PID 4716 wrote to memory of 2112 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 89 PID 4716 wrote to memory of 2112 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 89 PID 2112 wrote to memory of 4156 2112 cmd.exe 91 PID 2112 wrote to memory of 4156 2112 cmd.exe 91 PID 4716 wrote to memory of 4332 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 92 PID 4716 wrote to memory of 4332 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 92 PID 4716 wrote to memory of 4332 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 92 PID 4716 wrote to memory of 2264 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 94 PID 4716 wrote to memory of 2264 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 94 PID 4716 wrote to memory of 2264 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 94 PID 4716 wrote to memory of 4920 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 96 PID 4716 wrote to memory of 4920 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 96 PID 4716 wrote to memory of 4920 4716 eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe 96 PID 4920 wrote to memory of 3724 4920 csrss.exe 97 PID 4920 wrote to memory of 3724 4920 csrss.exe 97 PID 4920 wrote to memory of 3724 4920 csrss.exe 97 PID 4920 wrote to memory of 400 4920 csrss.exe 102 PID 4920 wrote to memory of 400 4920 csrss.exe 102 PID 4920 wrote to memory of 400 4920 csrss.exe 102 PID 4920 wrote to memory of 2952 4920 csrss.exe 105 PID 4920 wrote to memory of 2952 4920 csrss.exe 105 PID 4920 wrote to memory of 2952 4920 csrss.exe 105 PID 4920 wrote to memory of 1552 4920 csrss.exe 107 PID 4920 wrote to memory of 1552 4920 csrss.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe"C:\Users\Admin\AppData\Local\Temp\eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Users\Admin\AppData\Local\Temp\eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe"C:\Users\Admin\AppData\Local\Temp\eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4156
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4900
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4040
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4120
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD588efcc74439b6565f8ce96622772d5a2
SHA1bf02e0fec37420d5360ca80a4fa57c534004fefe
SHA2563ba5ef88c7ac041d641de01d0c6fa5df2b0751ad535658211c15a1400d4d2d04
SHA51206696933932bf741c3350589f34ea43493528ea0eb3ecdb550e12a328873ebe3779e89c351b501dc784d5449e4516d8cd7b58c8914314c0f9cd5c4eb88229869
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD552ecaac89725a4901e9def4dc9a0294a
SHA1aedbabd9422060cc24490814b588ac7dea52de12
SHA256151e758cc08c42a61638b1cbb3dabe209ee6ebca3d68631a686b111d58b0646e
SHA5123963967daeccb5300818d30fd8fdd45cf170dd6393741eb327cf55a2566863d3c61925ddd2c97f6afd06086b889863ea42e7c26a833d050d53f04e5a0c02b158
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ac5b54cef2e48ad981435313ce88edb8
SHA119c5319eda99aaf6fbfd5f310435064184a5320e
SHA256dd3e82507d58487c3d79fa30523fb6df500768a93d73b519a9da61b702f50da9
SHA51238aadfff35618f87f96e047f071dec8febc685fdd1de4e116f206172549d91b72379f55d5dd5de94a2d0cb27f5b614f0686d3dd6c6c9a5731c69e49930ccbcc1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55609c0a4fe0ba6706e41e0f5e3630235
SHA145044c0bbeca431a77bd183201b9c5ed653e4182
SHA256015e981409211b12e0c4648c62350b89a595cde4bbb0ed0b3b0debe15fd83c71
SHA512ea0d21f33818585302c1497061b68266d9d3f42dac1fe32c3d9d7c454c071c47b4b937ae2e74eea5577f5838c77358179968bfb06a61110f01cde9bf0a99e80f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52b1eb441c2df47827661e95dc9e2bd5f
SHA1f0f13188b258ffe8413bb216f94416e9592d597f
SHA256b2ef7b048e21c9d56fe1a8cad1c70723a59478edc00227c62acda2b5932f2b7c
SHA512d8a65effedfe5399c2b6d732ceb6816137c5d71be8438c90ea9b6e2da487e9c224f1fa0585482ffea639ae05c1a403f962822f37aeffdfdddf5404353f45bff1
-
Filesize
4.1MB
MD5d2f354fc3e499c505ac0ce1df085e7eb
SHA1007997d9e795d538a55f758501290c71179d382b
SHA256eed9f937216227541ed707afd84d0c775fa0cd67a151b829c5c715c7dd445958
SHA512140c2c4dbf004ca893088af820d4fd6d440c78b069d32d7d9e3fd13aa40d75d5ec9709407f7e7e9a1f7f031c5b30a825432cc15f9193d428878ff348ef266a2e