Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe
Resource
win7-20240221-en
General
-
Target
9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe
-
Size
4.1MB
-
MD5
b1bccbb9a72165c7f6571e7f8f7af7f4
-
SHA1
179ebdc9957e6150071b091fc6a0d70e2cbf91fd
-
SHA256
9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f
-
SHA512
d722315fa7b3b2e79587e7a744692b70dac9da65f9b3477dedfc147ad9bac558d0d94b46c86485413cbb0561881b70d7eb34f2b4094f94d40e72d7ce3957d954
-
SSDEEP
98304:8xfL9oyIkrku4AJMBJNRxIbk0RddEjk9Pc8cg301s2mGvJ:qRrVrv4XbNRWhj2o9k8f3CspGvJ
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/1792-2-0x0000000004BA0000-0x000000000548B000-memory.dmp family_glupteba behavioral2/memory/1792-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1792-58-0x0000000004BA0000-0x000000000548B000-memory.dmp family_glupteba behavioral2/memory/1792-57-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1792-55-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1328-135-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-220-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-229-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-231-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-233-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-235-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-237-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-239-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-241-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-243-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-245-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-247-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-249-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3212-251-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4792 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 3212 csrss.exe 5048 injector.exe 3324 windefender.exe 5112 windefender.exe -
resource yara_rule behavioral2/files/0x0008000000023428-223.dat upx behavioral2/memory/3324-225-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/5112-227-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3324-228-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/5112-230-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/5112-234-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/5112-240-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe File created C:\Windows\rss\csrss.exe 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1084 sc.exe -
pid Process 5088 powershell.exe 1376 powershell.exe 5048 powershell.exe 4232 powershell.exe 1400 powershell.exe 672 powershell.exe 3352 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3988 schtasks.exe 4692 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2871 = "Magallanes Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-491 = "India Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2391 = "Aleutian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3352 powershell.exe 3352 powershell.exe 1792 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1792 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 5088 powershell.exe 5088 powershell.exe 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 1376 powershell.exe 1376 powershell.exe 5048 powershell.exe 5048 powershell.exe 4232 powershell.exe 4232 powershell.exe 1400 powershell.exe 1400 powershell.exe 672 powershell.exe 672 powershell.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 3212 csrss.exe 3212 csrss.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 3212 csrss.exe 3212 csrss.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 3212 csrss.exe 3212 csrss.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe 5048 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3352 powershell.exe Token: SeDebugPrivilege 1792 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Token: SeImpersonatePrivilege 1792 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe Token: SeDebugPrivilege 5088 powershell.exe Token: SeDebugPrivilege 1376 powershell.exe Token: SeDebugPrivilege 5048 powershell.exe Token: SeDebugPrivilege 4232 powershell.exe Token: SeDebugPrivilege 1400 powershell.exe Token: SeDebugPrivilege 672 powershell.exe Token: SeSystemEnvironmentPrivilege 3212 csrss.exe Token: SeSecurityPrivilege 1084 sc.exe Token: SeSecurityPrivilege 1084 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1792 wrote to memory of 3352 1792 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 84 PID 1792 wrote to memory of 3352 1792 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 84 PID 1792 wrote to memory of 3352 1792 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 84 PID 1328 wrote to memory of 5088 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 92 PID 1328 wrote to memory of 5088 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 92 PID 1328 wrote to memory of 5088 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 92 PID 1328 wrote to memory of 3600 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 97 PID 1328 wrote to memory of 3600 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 97 PID 3600 wrote to memory of 4792 3600 cmd.exe 99 PID 3600 wrote to memory of 4792 3600 cmd.exe 99 PID 1328 wrote to memory of 1376 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 101 PID 1328 wrote to memory of 1376 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 101 PID 1328 wrote to memory of 1376 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 101 PID 1328 wrote to memory of 5048 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 103 PID 1328 wrote to memory of 5048 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 103 PID 1328 wrote to memory of 5048 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 103 PID 1328 wrote to memory of 3212 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 106 PID 1328 wrote to memory of 3212 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 106 PID 1328 wrote to memory of 3212 1328 9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe 106 PID 3212 wrote to memory of 4232 3212 csrss.exe 107 PID 3212 wrote to memory of 4232 3212 csrss.exe 107 PID 3212 wrote to memory of 4232 3212 csrss.exe 107 PID 3212 wrote to memory of 1400 3212 csrss.exe 116 PID 3212 wrote to memory of 1400 3212 csrss.exe 116 PID 3212 wrote to memory of 1400 3212 csrss.exe 116 PID 3212 wrote to memory of 672 3212 csrss.exe 118 PID 3212 wrote to memory of 672 3212 csrss.exe 118 PID 3212 wrote to memory of 672 3212 csrss.exe 118 PID 3212 wrote to memory of 5048 3212 csrss.exe 120 PID 3212 wrote to memory of 5048 3212 csrss.exe 120 PID 3324 wrote to memory of 2676 3324 windefender.exe 127 PID 3324 wrote to memory of 2676 3324 windefender.exe 127 PID 3324 wrote to memory of 2676 3324 windefender.exe 127 PID 2676 wrote to memory of 1084 2676 cmd.exe 128 PID 2676 wrote to memory of 1084 2676 cmd.exe 128 PID 2676 wrote to memory of 1084 2676 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe"C:\Users\Admin\AppData\Local\Temp\9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe"C:\Users\Admin\AppData\Local\Temp\9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4792
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3988
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2980
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4692
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5afc772d7bc18a0e07e8f332e939d42f3
SHA1f7e8b58dd3b534c2f23b3c690538cf206852b671
SHA25655032620cf0a52b05a3e3f3334ffecac0bb4d456e5ac202b9b9f29264c1eb151
SHA512a8dbc6a251a8a3fe4345f7eda17c16c9fa3a54987a754cc0c5241658fef310f79bc01056acfe3d00e3b6c855297b297da2e4f973ec508bdb1cfaa441c3d1b103
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ff629334366b9c565933fdecda45c4fb
SHA1b5ce4de85aa960552ab8c19d62e7bcce264a1879
SHA25643cd4313b6fecea4eb7bac0acefec818daed8390d17c34e10299ef19c93ceff8
SHA51206072dc8cfb9bda4e055f7aaa3b6882858319ce4fc64eaa4ef263dd468dac8821f7b40f7102058869079ac5589c03cdb07917d7761ceed1a7593ce6e697b285e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD578e81d18abfbf1cc2ceb250c9a8e25db
SHA192a99ee4e67f0b3a6f15d117a6729caf0f341694
SHA2569e1ad598a9e5c6b8f5a3940b2a7dcd9a2ffc75b8094878c85c1a1be1ec84f75c
SHA5124616dd583a24a25f81abbc896f95fab48ad862b866930ce6db19539371338fd59a89e76e15857c70f3c534ed807ee69bf41b21c7cc1481c14fd634973c1537d1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5462177cd449a7b0bb24790dde6b6cc85
SHA151f84b57c290d23cbf7ece459668b9577aedafdf
SHA256533eb4973bc41ddda6c0cf59e6893ea5d849935bb5930f75cb720605f51244e9
SHA5120e9353b8de12b6db411aadf179f11fe9bc096e3694e44bb6e93dd53733471a433a3440da56610bc22bf2d759046f79a965b442676b35f9f3c78b9535f3ff70e6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fab01657b1af9487c66a610a3d28618d
SHA16a5adc7cd16782babb68e2a8cdfbe08b880ea8d5
SHA256a1b50b849c1f00eab9437c75ebe95ce7bccadae5b08555d7ace005d42c0a717e
SHA5122320e8275e261845f0e9071633a3dde2fae529b80182bf15944ece098a597515390ce4b0412cdbf97526960539543d2ffa0705448193a90c43f91216469af790
-
Filesize
4.1MB
MD5b1bccbb9a72165c7f6571e7f8f7af7f4
SHA1179ebdc9957e6150071b091fc6a0d70e2cbf91fd
SHA2569c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f
SHA512d722315fa7b3b2e79587e7a744692b70dac9da65f9b3477dedfc147ad9bac558d0d94b46c86485413cbb0561881b70d7eb34f2b4094f94d40e72d7ce3957d954
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec