Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-05-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe
Resource
win10v2004-20240426-en
General
-
Target
6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe
-
Size
4.1MB
-
MD5
0e584fd684e8f11ea10266f7aba96d59
-
SHA1
0da99d990bdde6613d7b95667b55ad1fae50f09d
-
SHA256
6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097
-
SHA512
84a77aafb698e30bee3dd01192bc5715e948a844dd9260894f087f6baebbe80d58acba0e450ec1befa68c1e7cf96d9373ca2dc6bc61c6adee8075ce308463186
-
SSDEEP
98304:cd7tSzSG1TEQyj2soCVZzfOSLUhtCaFAX/iUIATxmmpvA2aCdQuFREnErz:+RMSLQaVNfPUP9FaqUIATxXaCdFFREnG
Malware Config
Signatures
-
Glupteba payload 18 IoCs
resource yara_rule behavioral2/memory/4500-2-0x0000000004DD0000-0x00000000056BB000-memory.dmp family_glupteba behavioral2/memory/4500-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4500-9-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4500-54-0x0000000004DD0000-0x00000000056BB000-memory.dmp family_glupteba behavioral2/memory/4500-55-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4500-56-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2792-66-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2792-115-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2792-133-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3156-165-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3156-211-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3156-223-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3156-227-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3156-231-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3156-235-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3156-239-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3156-243-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3156-247-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1084 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 3156 csrss.exe 2100 injector.exe 2240 windefender.exe 4200 windefender.exe -
resource yara_rule behavioral2/files/0x000200000002a9c1-214.dat upx behavioral2/memory/2240-215-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4200-218-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2240-220-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4200-225-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4200-232-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4312 sc.exe -
pid Process 3504 powershell.exe 4932 powershell.exe 3784 powershell.exe 2384 powershell.exe 424 powershell.exe 4388 powershell.exe 3196 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2104 schtasks.exe 3316 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-342 = "Egypt Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1892 = "Russia TZ 3 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1412 = "Syria Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2384 powershell.exe 2384 powershell.exe 4500 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 4500 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 424 powershell.exe 424 powershell.exe 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 4388 powershell.exe 4388 powershell.exe 3196 powershell.exe 3196 powershell.exe 3504 powershell.exe 3504 powershell.exe 4932 powershell.exe 4932 powershell.exe 3784 powershell.exe 3784 powershell.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 3156 csrss.exe 3156 csrss.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 3156 csrss.exe 3156 csrss.exe 2100 injector.exe 2100 injector.exe 3156 csrss.exe 3156 csrss.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe 2100 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2384 powershell.exe Token: SeDebugPrivilege 4500 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Token: SeImpersonatePrivilege 4500 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe Token: SeDebugPrivilege 424 powershell.exe Token: SeDebugPrivilege 4388 powershell.exe Token: SeDebugPrivilege 3196 powershell.exe Token: SeDebugPrivilege 3504 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 3784 powershell.exe Token: SeSystemEnvironmentPrivilege 3156 csrss.exe Token: SeSecurityPrivilege 4312 sc.exe Token: SeSecurityPrivilege 4312 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4500 wrote to memory of 2384 4500 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 82 PID 4500 wrote to memory of 2384 4500 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 82 PID 4500 wrote to memory of 2384 4500 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 82 PID 2792 wrote to memory of 424 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 87 PID 2792 wrote to memory of 424 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 87 PID 2792 wrote to memory of 424 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 87 PID 2792 wrote to memory of 4084 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 89 PID 2792 wrote to memory of 4084 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 89 PID 4084 wrote to memory of 1084 4084 cmd.exe 91 PID 4084 wrote to memory of 1084 4084 cmd.exe 91 PID 2792 wrote to memory of 4388 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 92 PID 2792 wrote to memory of 4388 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 92 PID 2792 wrote to memory of 4388 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 92 PID 2792 wrote to memory of 3196 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 94 PID 2792 wrote to memory of 3196 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 94 PID 2792 wrote to memory of 3196 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 94 PID 2792 wrote to memory of 3156 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 96 PID 2792 wrote to memory of 3156 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 96 PID 2792 wrote to memory of 3156 2792 6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe 96 PID 3156 wrote to memory of 3504 3156 csrss.exe 97 PID 3156 wrote to memory of 3504 3156 csrss.exe 97 PID 3156 wrote to memory of 3504 3156 csrss.exe 97 PID 3156 wrote to memory of 4932 3156 csrss.exe 102 PID 3156 wrote to memory of 4932 3156 csrss.exe 102 PID 3156 wrote to memory of 4932 3156 csrss.exe 102 PID 3156 wrote to memory of 3784 3156 csrss.exe 105 PID 3156 wrote to memory of 3784 3156 csrss.exe 105 PID 3156 wrote to memory of 3784 3156 csrss.exe 105 PID 3156 wrote to memory of 2100 3156 csrss.exe 107 PID 3156 wrote to memory of 2100 3156 csrss.exe 107 PID 2240 wrote to memory of 4856 2240 windefender.exe 113 PID 2240 wrote to memory of 4856 2240 windefender.exe 113 PID 2240 wrote to memory of 4856 2240 windefender.exe 113 PID 4856 wrote to memory of 4312 4856 cmd.exe 114 PID 4856 wrote to memory of 4312 4856 cmd.exe 114 PID 4856 wrote to memory of 4312 4856 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe"C:\Users\Admin\AppData\Local\Temp\6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe"C:\Users\Admin\AppData\Local\Temp\6eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:424
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1084
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3316
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1180
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2104
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4200
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5565fb909ab6875a4d6a6c57b226cf4d9
SHA1bbdd82db5c970d5137320b720acba46108401c9a
SHA25678eab49ae072bda67f1a29d940c3eae11a6117c2f7ca9978ab80dd338b068c93
SHA5127b1a22c43e493b228a81f3c29d86bb4b1bb2e3e8517b5bbd97be84c20c7c90f70ed06b821e13bb1ee502ff2aad50b462d81285b41dc308a9b436e114c30ee22d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a3485e20768ab2576735ee7e8f19af4d
SHA1192eab9cdc82e30d4fa505ace0bde9b0afd169c1
SHA256dc664080305b6113fd07adeff914c01fb2a33ae7297984ea613469c487a8d837
SHA51260193b37212ef2d23597bb7b7d31b0251f097ad8e457f27cdfe640f221e42e259265cb5cca04ae2b8b9eb2fb1723d35a145e84e293ab78462127dce32284fadb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5af3a90f28cfcff424bed6abdb5972650
SHA15293eb10a578736c7b55c83ab3f2a917ebe6681f
SHA25673f5b64307b9f25cd3cd6584d835d0441f8ff02ef996b658d98b9e4f20204521
SHA5121e834ae84953cb63fdbcec55e239d7a4f30b09ff24befea2b3a8ec5830300aba6e211b1b9e6ce7a66addc1e08d3029b59432353662d95a4cdb683eafb8fb19ba
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58671be6cd7540c595644880c61504f14
SHA1c562d6e7a2475954e70f1549c967b3aafe387a61
SHA256efc3dff726078494ea259fe0578b52ec85d27fe42328c3bea57b47f73cd34b70
SHA512b3834a05cb6dd320a34d606e6c923e488007baf5fb766d1bb4126a553109ef8f408c2e93e4a6a8091eb6cb7cac6857c708fc83fbfedc283d6a39d6cda448a5d0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD509d68284c7143b97d507a45207bcc032
SHA150eff1c66cd998a58a5eac9115191585c164928d
SHA25612ce97787c27f084c7c20dac825edde599fca76bd71c503b99df809c73edf0c1
SHA5120bca96c898888a226f4516eac85c0f3184601b2f96d85acec10794391157bad652f38cd3cf7c6ff52c305c41963d93c10b83d92d9a0c53bb5650f583ec65f349
-
Filesize
4.1MB
MD50e584fd684e8f11ea10266f7aba96d59
SHA10da99d990bdde6613d7b95667b55ad1fae50f09d
SHA2566eb8942c2cb356c7e1062e2cc583eddc47c227b07845c8e5b22f5acfa57b2097
SHA51284a77aafb698e30bee3dd01192bc5715e948a844dd9260894f087f6baebbe80d58acba0e450ec1befa68c1e7cf96d9373ca2dc6bc61c6adee8075ce308463186
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec