Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-05-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe
Resource
win10v2004-20240426-en
General
-
Target
017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe
-
Size
4.1MB
-
MD5
69fe44102f5667f05e19def5a5e21baa
-
SHA1
77534ede9077782076529fd10663b9475b006a65
-
SHA256
017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f
-
SHA512
aa3603673afb37c7bf9f5f93ceec24f3d240ceab8d632ce173b4674321f3ff422138216f12cc60d98b83ecaded649b6d5e129b74874765178af50102f25f7785
-
SSDEEP
98304:yZ3eWnmCP3Day+MGMrrH7Rp/OOmeNALbhxcJ3GFuqO9B+e2R0FJR:YufQJ+wrvRp/OL3LVxY3GFuq2BkwJR
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/1696-2-0x0000000004CA0000-0x000000000558B000-memory.dmp family_glupteba behavioral2/memory/1696-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1696-44-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1696-45-0x0000000004CA0000-0x000000000558B000-memory.dmp family_glupteba behavioral2/memory/1696-43-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1732-121-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-193-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-196-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-202-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-208-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-214-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-223-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-232-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-241-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-250-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-259-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-268-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-277-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4780-286-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1960 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 4780 csrss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe File created C:\Windows\rss\csrss.exe 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe -
pid Process 2500 powershell.exe 4964 powershell.exe 4336 powershell.exe 3564 powershell.exe 2584 powershell.exe 564 powershell.exe 3692 powershell.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4508 2500 WerFault.exe 81 2388 1696 WerFault.exe 78 1708 1732 WerFault.exe 89 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 568 schtasks.exe 4828 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2500 powershell.exe 2500 powershell.exe 1696 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 1696 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 4964 powershell.exe 4964 powershell.exe 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 4336 powershell.exe 4336 powershell.exe 3564 powershell.exe 3564 powershell.exe 2584 powershell.exe 2584 powershell.exe 564 powershell.exe 564 powershell.exe 3692 powershell.exe 3692 powershell.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe 1692 injector.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2500 powershell.exe Token: SeDebugPrivilege 1696 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Token: SeImpersonatePrivilege 1696 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe Token: SeDebugPrivilege 4964 powershell.exe Token: SeDebugPrivilege 4336 powershell.exe Token: SeDebugPrivilege 3564 powershell.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 564 powershell.exe Token: SeDebugPrivilege 3692 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2500 1696 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 81 PID 1696 wrote to memory of 2500 1696 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 81 PID 1696 wrote to memory of 2500 1696 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 81 PID 1732 wrote to memory of 4964 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 92 PID 1732 wrote to memory of 4964 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 92 PID 1732 wrote to memory of 4964 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 92 PID 1732 wrote to memory of 3436 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 94 PID 1732 wrote to memory of 3436 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 94 PID 3436 wrote to memory of 1960 3436 cmd.exe 96 PID 3436 wrote to memory of 1960 3436 cmd.exe 96 PID 1732 wrote to memory of 4336 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 97 PID 1732 wrote to memory of 4336 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 97 PID 1732 wrote to memory of 4336 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 97 PID 1732 wrote to memory of 3564 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 99 PID 1732 wrote to memory of 3564 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 99 PID 1732 wrote to memory of 3564 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 99 PID 1732 wrote to memory of 4780 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 101 PID 1732 wrote to memory of 4780 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 101 PID 1732 wrote to memory of 4780 1732 017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe"C:\Users\Admin\AppData\Local\Temp\017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 25003⤵
- Program crash
PID:4508
-
-
-
C:\Users\Admin\AppData\Local\Temp\017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe"C:\Users\Admin\AppData\Local\Temp\017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1960
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:568
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:276
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 9003⤵
- Program crash
PID:1708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 9282⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2500 -ip 25001⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1696 -ip 16961⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1732 -ip 17321⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55d61a5078fea6c453118d0dacba45347
SHA169e320ab23da578ab99bb870d6b5ab5b3de1b647
SHA256a3ae407cde8d983aff743632521be7c214cd29bbef8921b634792673894e57c9
SHA5122cc02e30d15392fd510db98183494da3e45c84c0f998f04b7b3dc2b16a163963de0c932fbf3c20535c0a372c78d4347cea27f8cc0af2797200313a6763e62cc3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52bfa5ee7e3e32393f4ff5e11acb4ef21
SHA1cfa9cffb28245e0e565da3a9f94ea86e1952c2ef
SHA2561f288c36b9ed59edc4e6826c2494ef1aafd19935d11e8b7ca52a0e63d7b59398
SHA51241a8d65281c1e3c7874040644131a24600279fb5f44817a62d9b2a97b78a4f2788b4baa9b51c83091c52ae7b0bd76e82b94f003f1fede44884fb5e8f36058365
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD535843cc1acc2a465b3c1ffb927af1e3a
SHA1dfc07d1b5f186372946e4248eaa4dfd81bc78fcf
SHA25675b7c0a9063ab4dd2f95d5ff056a4e1914c838bf879af8a70887e85a2365bd5b
SHA51274a6addefa294fcadbd7d0ac1a8b70c7b8fbb72bef68e9abb7e88b8932534623d4b5cd2e279ba079bed9100422ed023ad5d5f196bb9a1673837a29bb7871c862
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD566dc4c0701cfdf538869ead8899dc468
SHA103d602b8d29c4638550e002e48eb893e04a59cf4
SHA25677da32d5c7abdca05f3911b58f9362a12c4535df933ab066647e5841290817d4
SHA5120849b3a9613569ddf9256d1d0d471e77f36fc1c4a181fee1645140e0f44c207201ecf3033b3b9a1a9f143a0fa18f3da4db0304a7d9def3ec4b025722c9a40dfb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59ac630fac9701b95dfcf8cca093b17a2
SHA1dbb2cb86024fb546af35db1eb4e6bbf082fe5cf1
SHA2561d94a5fc5dba9102c134e2a4b1a24c1452db8956ab63453ea051eb21415eb472
SHA512390cbbd2e7e81b908ae7a826cadef91ed7ceada7d48f6af28eae8196de31c5b00aac541deb26c3a626a62758bcaf8f2dd5e099f5a125b8dc66b264a5a0f2ee65
-
Filesize
4.1MB
MD569fe44102f5667f05e19def5a5e21baa
SHA177534ede9077782076529fd10663b9475b006a65
SHA256017659c15b3364b7b452f49175a2f5161a60c9f12ad03a3782d67094cab9c61f
SHA512aa3603673afb37c7bf9f5f93ceec24f3d240ceab8d632ce173b4674321f3ff422138216f12cc60d98b83ecaded649b6d5e129b74874765178af50102f25f7785