Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-05-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe
Resource
win10v2004-20240508-en
General
-
Target
acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe
-
Size
4.1MB
-
MD5
5e6e88e6229170d173cf47fcf6e9a790
-
SHA1
29bb92ebf3f571adcca130328b3a6747e6d2b2c2
-
SHA256
acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140
-
SHA512
d87a44287d1d90a42b4926217deb19398b2eb4d85cd5dc3b1b799ccbf1f9fa261d542ea5c9f6345b04b8a1d1a18b9b2a0243e212ebdb25bf9224c3791c4028f1
-
SSDEEP
49152:9KSHQE6bCrQt9J2m6qYk0f+BzgqdGFArOOO8EeNSlBbqHPgo81vjAIlxiZQJw/:91wCr5kG+hEArjFEeNSldQg15xmh/
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/2028-2-0x0000000004D60000-0x000000000564B000-memory.dmp family_glupteba behavioral2/memory/2028-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2028-90-0x0000000004D60000-0x000000000564B000-memory.dmp family_glupteba behavioral2/memory/2028-89-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/2028-138-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3708-137-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-203-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-206-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-209-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-212-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-215-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-218-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-221-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-224-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-227-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-230-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-233-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-236-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1628-239-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1504 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1628 csrss.exe 2980 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe File created C:\Windows\rss\csrss.exe acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe -
pid Process 1212 powershell.exe 1944 powershell.exe 3936 powershell.exe 4792 powershell.exe 888 powershell.exe 3996 powershell.exe 2988 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4800 schtasks.exe 4472 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 powershell.exe 2988 powershell.exe 2028 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 2028 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 1212 powershell.exe 1212 powershell.exe 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 1944 powershell.exe 1944 powershell.exe 3936 powershell.exe 3936 powershell.exe 4792 powershell.exe 4792 powershell.exe 888 powershell.exe 888 powershell.exe 3996 powershell.exe 3996 powershell.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 1628 csrss.exe 1628 csrss.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 1628 csrss.exe 1628 csrss.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe 2980 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2988 powershell.exe Token: SeDebugPrivilege 2028 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Token: SeImpersonatePrivilege 2028 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe Token: SeDebugPrivilege 1212 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 3936 powershell.exe Token: SeDebugPrivilege 4792 powershell.exe Token: SeDebugPrivilege 888 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeSystemEnvironmentPrivilege 1628 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2988 2028 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 78 PID 2028 wrote to memory of 2988 2028 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 78 PID 2028 wrote to memory of 2988 2028 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 78 PID 3708 wrote to memory of 1212 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 83 PID 3708 wrote to memory of 1212 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 83 PID 3708 wrote to memory of 1212 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 83 PID 3708 wrote to memory of 3676 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 85 PID 3708 wrote to memory of 3676 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 85 PID 3676 wrote to memory of 1504 3676 cmd.exe 87 PID 3676 wrote to memory of 1504 3676 cmd.exe 87 PID 3708 wrote to memory of 1944 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 88 PID 3708 wrote to memory of 1944 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 88 PID 3708 wrote to memory of 1944 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 88 PID 3708 wrote to memory of 3936 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 90 PID 3708 wrote to memory of 3936 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 90 PID 3708 wrote to memory of 3936 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 90 PID 3708 wrote to memory of 1628 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 92 PID 3708 wrote to memory of 1628 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 92 PID 3708 wrote to memory of 1628 3708 acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe 92 PID 1628 wrote to memory of 4792 1628 csrss.exe 93 PID 1628 wrote to memory of 4792 1628 csrss.exe 93 PID 1628 wrote to memory of 4792 1628 csrss.exe 93 PID 1628 wrote to memory of 888 1628 csrss.exe 99 PID 1628 wrote to memory of 888 1628 csrss.exe 99 PID 1628 wrote to memory of 888 1628 csrss.exe 99 PID 1628 wrote to memory of 3996 1628 csrss.exe 101 PID 1628 wrote to memory of 3996 1628 csrss.exe 101 PID 1628 wrote to memory of 3996 1628 csrss.exe 101 PID 1628 wrote to memory of 2980 1628 csrss.exe 103 PID 1628 wrote to memory of 2980 1628 csrss.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe"C:\Users\Admin\AppData\Local\Temp\acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe"C:\Users\Admin\AppData\Local\Temp\acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1504
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4800
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4472
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58e39b2c345cc188f6da740b1c78b3753
SHA186f2bdb9a27e27ee6c4d9f827bb8709159eee897
SHA2563a0d356f863218325ce9fbf1bab96315b598b32572b864d8d86113881ffadb02
SHA5126e4025140510df5f0dcd9c22a1097e8b92f8e405ed28d40d46958892aad4bae8e48f57755a9cddc86cc4b24862f32c10262a8b6d6aff302804b18668ebf88418
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fbae38538e91e31ca848f47e79d963f5
SHA17419f2bfe65f9983247b71726cd3521492b179bb
SHA25636f2129a6754dff9bbc7f86d95a85ea1e3298e6e217cc0749300ed79b2c91247
SHA51250796ebd9a59ee8ad9a5f4e8bb62bd2df862de9ca3612267771ee854dea3d5a622c5d4e3cea4daa6aba1e0f9da7dea2155bda4438e4bde60350901f3ddf83b9a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b94e52b797cec26cc9828f0255c61d5f
SHA181b1a0c93e7390cfa2a1df114bb4e72243f5579d
SHA2560db1761031108865385c67a888fbc28b9ad6bac636ae46a1d48e9bf41992692e
SHA51279a2ecaee9dd02c6b54f7e1738cf2a27ed63808bb020481fd66dbc0083c3f780026161f4255e7471b178c9705ba6bc9549a1fdfd7cc351f23a0a6697fe090a49
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD570dea91d1a513310c83da7a5228b5f74
SHA133268a6aa92fc71408527af876779ad1d29334c3
SHA256352340678e109e8fdcd11a90f982e3eb71752f9d2dfea9c9b86706715229be1b
SHA512829f3ca793162bb85156ef39fe11b4b076d980bb3b6014477b40ed1bbfa6736580308934293208ddac5a19b6a5e32cb5c1b45ed487ab23d70e3e35050e51bf41
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5eee34bd59ffe28e4b749ce55e38fbe69
SHA159f7e9756b48272e0723da0b64f5f5c8703a02f3
SHA256396bd5c3246350d2de41d37e3a8324e23592dfa7a087ffd8f23d78a248ba5d91
SHA512b985d920e0db61cf29cac30b818cfbb87af67e25647252d4855fded148bb0ac69844e46d54fed999a373c9a07403ca2f9456e457c5172ca35c12db5f4b5c9441
-
Filesize
4.1MB
MD55e6e88e6229170d173cf47fcf6e9a790
SHA129bb92ebf3f571adcca130328b3a6747e6d2b2c2
SHA256acd4bc93214ae8e9ef722c8e9943186907f5b66e734e8c914ac9be9e45f4c140
SHA512d87a44287d1d90a42b4926217deb19398b2eb4d85cd5dc3b1b799ccbf1f9fa261d542ea5c9f6345b04b8a1d1a18b9b2a0243e212ebdb25bf9224c3791c4028f1