Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-05-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe
Resource
win10v2004-20240426-en
General
-
Target
3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe
-
Size
4.1MB
-
MD5
ddb0778b4f2761b16b391ef2fb2acfdf
-
SHA1
3dc0e8215f2962d3cd4ab95dc5cd7a8aa773ebc0
-
SHA256
3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966
-
SHA512
1d65b22f61e79037596684deceec318c00b46c6f6bed47ddc9cb9c85625e940ae15b27578753cd618ca21e4dcfcdbf21a6a0643cd2edc9c5b4d0db9a8ccf7eed
-
SSDEEP
98304:KZ3eWnmCP3Day+MGMrrH7Rp/OOmeNALbhxcJ3GFuqO9B+e2R0FJP:QufQJ+wrvRp/OL3LVxY3GFuq2BkwJP
Malware Config
Signatures
-
Glupteba payload 20 IoCs
resource yara_rule behavioral2/memory/784-2-0x0000000004CE0000-0x00000000055CB000-memory.dmp family_glupteba behavioral2/memory/784-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/784-52-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/784-51-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/784-54-0x0000000004CE0000-0x00000000055CB000-memory.dmp family_glupteba behavioral2/memory/4472-122-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4472-128-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-199-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-206-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-216-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-218-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-220-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-222-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-224-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-226-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-228-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-230-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-232-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-234-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/332-236-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4312 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 332 csrss.exe 3160 injector.exe 4700 windefender.exe 680 windefender.exe -
resource yara_rule behavioral2/files/0x000200000002aa23-209.dat upx behavioral2/memory/4700-210-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/680-213-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4700-215-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/680-217-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/680-221-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4992 sc.exe -
pid Process 868 powershell.exe 3796 powershell.exe 3700 powershell.exe 4604 powershell.exe 4088 powershell.exe 2100 powershell.exe 2152 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2844 4472 WerFault.exe 86 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4412 schtasks.exe 2612 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2892 = "Sudan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-772 = "Montevideo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-384 = "Namibia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2491 = "Aus Central W. Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 powershell.exe 2100 powershell.exe 784 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 784 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 2152 powershell.exe 2152 powershell.exe 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 868 powershell.exe 868 powershell.exe 3796 powershell.exe 3796 powershell.exe 3700 powershell.exe 3700 powershell.exe 4604 powershell.exe 4604 powershell.exe 4088 powershell.exe 4088 powershell.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 332 csrss.exe 332 csrss.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 332 csrss.exe 332 csrss.exe 3160 injector.exe 3160 injector.exe 332 csrss.exe 332 csrss.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe 3160 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2100 powershell.exe Token: SeDebugPrivilege 784 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Token: SeImpersonatePrivilege 784 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeDebugPrivilege 868 powershell.exe Token: SeDebugPrivilege 3796 powershell.exe Token: SeDebugPrivilege 3700 powershell.exe Token: SeDebugPrivilege 4604 powershell.exe Token: SeDebugPrivilege 4088 powershell.exe Token: SeSystemEnvironmentPrivilege 332 csrss.exe Token: SeSecurityPrivilege 4992 sc.exe Token: SeSecurityPrivilege 4992 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 784 wrote to memory of 2100 784 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 81 PID 784 wrote to memory of 2100 784 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 81 PID 784 wrote to memory of 2100 784 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 81 PID 4472 wrote to memory of 2152 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 87 PID 4472 wrote to memory of 2152 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 87 PID 4472 wrote to memory of 2152 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 87 PID 4472 wrote to memory of 2188 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 89 PID 4472 wrote to memory of 2188 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 89 PID 2188 wrote to memory of 4312 2188 cmd.exe 91 PID 2188 wrote to memory of 4312 2188 cmd.exe 91 PID 4472 wrote to memory of 868 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 92 PID 4472 wrote to memory of 868 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 92 PID 4472 wrote to memory of 868 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 92 PID 4472 wrote to memory of 3796 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 94 PID 4472 wrote to memory of 3796 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 94 PID 4472 wrote to memory of 3796 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 94 PID 4472 wrote to memory of 332 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 96 PID 4472 wrote to memory of 332 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 96 PID 4472 wrote to memory of 332 4472 3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe 96 PID 332 wrote to memory of 3700 332 csrss.exe 100 PID 332 wrote to memory of 3700 332 csrss.exe 100 PID 332 wrote to memory of 3700 332 csrss.exe 100 PID 332 wrote to memory of 4604 332 csrss.exe 106 PID 332 wrote to memory of 4604 332 csrss.exe 106 PID 332 wrote to memory of 4604 332 csrss.exe 106 PID 332 wrote to memory of 4088 332 csrss.exe 108 PID 332 wrote to memory of 4088 332 csrss.exe 108 PID 332 wrote to memory of 4088 332 csrss.exe 108 PID 332 wrote to memory of 3160 332 csrss.exe 110 PID 332 wrote to memory of 3160 332 csrss.exe 110 PID 4700 wrote to memory of 2492 4700 windefender.exe 116 PID 4700 wrote to memory of 2492 4700 windefender.exe 116 PID 4700 wrote to memory of 2492 4700 windefender.exe 116 PID 2492 wrote to memory of 4992 2492 cmd.exe 117 PID 2492 wrote to memory of 4992 2492 cmd.exe 117 PID 2492 wrote to memory of 4992 2492 cmd.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe"C:\Users\Admin\AppData\Local\Temp\3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe"C:\Users\Admin\AppData\Local\Temp\3a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4312
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4412
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2612
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 6803⤵
- Program crash
PID:2844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4472 -ip 44721⤵PID:3508
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54add8b6e82f5c9bb81329e9ce639a1e9
SHA12d7f82f8acff7d6592feb8ed4303248fddcdf502
SHA256946d2b3d92f349516cf62b695e67dd5dc05c2cecf9a36bc1df1f6ae241bd3466
SHA512b55c1b4a5f78963eb63f02db47d9bfe728fcc8d2b6938519b1ec9a790aa0f6ea1ba418fb87ec4c65dab39c60a9338043e62d5fbe7abc7fc1face3c794472b16f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5094da7ce207f06c273f4358db7e4dd49
SHA1211b385ea6be1f9e4c7e972e50a7f479eef4e82a
SHA256cdea91c4f24083b02fc303426063948c98a5786c077006670bf8a890a3aa0308
SHA5127bc88127d71d6160b511b6878840eb9e6928156ee08fc1171e05f280f687058bf0cecbc6409c7bb906b47047a15bfea972c525d91a82bc9142495a0e2479b1e3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55ea7d00fb4463a3e32d9af727935b8d4
SHA1d3150a2627301f42f826edd9c257b2f50ac69950
SHA256eecd12ecca0549967de40e844178a8f071b9f321a3ad8af9a25eb3e8e1145267
SHA512ef0266c13eb82d9df2bc050e10f4e65b7d9eb06dff27acb36dc00f07035d7e2cdc06e0e69e9e08776d9ae8eb717507caf6bf18ee1cbe13cb2a22fbf0119776f9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ea7ffae334a26861d6b0bf64b41bbe47
SHA146e8560bc385b8611ecb0e169727215d2a303580
SHA2563496509bc096130dedaabdc26267fc2c69656ce0f283c2021c2d4fb7d2bb5549
SHA51203633258d05d248cfac1d167978c49fb6532c84522501957472307659f07aea489bcfedf7c07f39b91617e6e4d5fc9b8930f02114fdbe928db0ba8962ec22df4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54c4c7963d7b212915aeed6edb23b2a84
SHA10fa827829203f6cac0298c5373e32e89aadcc400
SHA25616c612d99968d1b1d52f13cc0cfd6339960a660e9b94d86fc2690d28ea2eda0a
SHA512b2de80e88121b9dc4ca836b2d75923a3c9f7800cdc5566010aa105a3e1cf5823f66461a59253556c2f15995610d5f6a9e67b0176697c595d81df6d1f2e0516fd
-
Filesize
4.1MB
MD5ddb0778b4f2761b16b391ef2fb2acfdf
SHA13dc0e8215f2962d3cd4ab95dc5cd7a8aa773ebc0
SHA2563a3c3c401472f53b4b0846739d3016d83599c4dd3eb8541446418fa723d78966
SHA5121d65b22f61e79037596684deceec318c00b46c6f6bed47ddc9cb9c85625e940ae15b27578753cd618ca21e4dcfcdbf21a6a0643cd2edc9c5b4d0db9a8ccf7eed
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec