Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe
Resource
win10v2004-20240508-en
General
-
Target
12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe
-
Size
4.1MB
-
MD5
67ad062ceab2b28cf8e9ef8c9c11c3cb
-
SHA1
5c22a3851a0eecfc12f9dd9cd02a0be10f2c5471
-
SHA256
12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c
-
SHA512
c1b43fcb4dd0796dffd9af03345517df93d6615604f7842833310ec90f9c334ec4da090457c92541e00d81814184115670de25d2bb8bb57bcc698f0f51488d85
-
SSDEEP
98304:ocO3d23DP4WvcTQUVFyLidGODnX7vlp0fAiBu1UOo5GU75c1WMsxB4:ocO3d2wQ4Q8FyLwnXJ+AxvtU75c1js8
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/3244-2-0x0000000004B40000-0x000000000542B000-memory.dmp family_glupteba behavioral1/memory/3244-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3244-105-0x0000000004B40000-0x000000000542B000-memory.dmp family_glupteba behavioral1/memory/3244-103-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3684-131-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3244-169-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4356-208-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-218-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-226-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-229-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-232-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-235-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-238-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-241-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-244-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-247-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-250-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-253-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/4356-256-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 468 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 4356 csrss.exe 3556 injector.exe 4972 windefender.exe 5092 windefender.exe -
resource yara_rule behavioral1/files/0x0007000000023424-217.dat upx behavioral1/memory/4972-220-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/5092-222-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/4972-224-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/5092-227-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/5092-233-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe File created C:\Windows\rss\csrss.exe 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4472 sc.exe -
pid Process 3032 powershell.exe 3496 powershell.exe 980 powershell.exe 4084 powershell.exe 512 powershell.exe 4068 powershell.exe 2888 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1132 schtasks.exe 4160 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2571 = "Turks and Caicos Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-122 = "SA Pacific Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-81 = "Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 512 powershell.exe 512 powershell.exe 3244 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 3244 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 4068 powershell.exe 4068 powershell.exe 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 2888 powershell.exe 2888 powershell.exe 3032 powershell.exe 3032 powershell.exe 3496 powershell.exe 3496 powershell.exe 980 powershell.exe 980 powershell.exe 4084 powershell.exe 4084 powershell.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 4356 csrss.exe 4356 csrss.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 4356 csrss.exe 4356 csrss.exe 3556 injector.exe 3556 injector.exe 4356 csrss.exe 4356 csrss.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 512 powershell.exe Token: SeDebugPrivilege 3244 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Token: SeImpersonatePrivilege 3244 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe Token: SeDebugPrivilege 4068 powershell.exe Token: SeDebugPrivilege 2888 powershell.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 3496 powershell.exe Token: SeDebugPrivilege 980 powershell.exe Token: SeDebugPrivilege 4084 powershell.exe Token: SeSystemEnvironmentPrivilege 4356 csrss.exe Token: SeSecurityPrivilege 4472 sc.exe Token: SeSecurityPrivilege 4472 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3244 wrote to memory of 512 3244 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 84 PID 3244 wrote to memory of 512 3244 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 84 PID 3244 wrote to memory of 512 3244 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 84 PID 3684 wrote to memory of 4068 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 94 PID 3684 wrote to memory of 4068 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 94 PID 3684 wrote to memory of 4068 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 94 PID 3684 wrote to memory of 3112 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 97 PID 3684 wrote to memory of 3112 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 97 PID 3112 wrote to memory of 468 3112 cmd.exe 99 PID 3112 wrote to memory of 468 3112 cmd.exe 99 PID 3684 wrote to memory of 2888 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 100 PID 3684 wrote to memory of 2888 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 100 PID 3684 wrote to memory of 2888 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 100 PID 3684 wrote to memory of 3032 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 103 PID 3684 wrote to memory of 3032 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 103 PID 3684 wrote to memory of 3032 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 103 PID 3684 wrote to memory of 4356 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 105 PID 3684 wrote to memory of 4356 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 105 PID 3684 wrote to memory of 4356 3684 12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe 105 PID 4356 wrote to memory of 3496 4356 csrss.exe 106 PID 4356 wrote to memory of 3496 4356 csrss.exe 106 PID 4356 wrote to memory of 3496 4356 csrss.exe 106 PID 4356 wrote to memory of 980 4356 csrss.exe 112 PID 4356 wrote to memory of 980 4356 csrss.exe 112 PID 4356 wrote to memory of 980 4356 csrss.exe 112 PID 4356 wrote to memory of 4084 4356 csrss.exe 114 PID 4356 wrote to memory of 4084 4356 csrss.exe 114 PID 4356 wrote to memory of 4084 4356 csrss.exe 114 PID 4356 wrote to memory of 3556 4356 csrss.exe 116 PID 4356 wrote to memory of 3556 4356 csrss.exe 116 PID 4972 wrote to memory of 4140 4972 windefender.exe 124 PID 4972 wrote to memory of 4140 4972 windefender.exe 124 PID 4972 wrote to memory of 4140 4972 windefender.exe 124 PID 4140 wrote to memory of 4472 4140 cmd.exe 125 PID 4140 wrote to memory of 4472 4140 cmd.exe 125 PID 4140 wrote to memory of 4472 4140 cmd.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe"C:\Users\Admin\AppData\Local\Temp\12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe"C:\Users\Admin\AppData\Local\Temp\12a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:468
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1132
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2988
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4160
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59afa1a26a7c33c10e302686509113bda
SHA11294b092150cb77912e1b9e1f1218234eb345f65
SHA2567869fb3b621e8ed120340b034dcc254d4ae9ecbf29296ca33783040963c2a415
SHA5125ea8989e1572f6cf680d01d59a4cab152a09c6e4069f1474da1520dfaa497c171469d0f7c553bb1e85764109b122f4a0e28e9a82a23c282baf24ef64337db9c1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59d6e6d8f64bd8062c45c54b7111f6375
SHA1bdc7633219b9c5e4c2a3af24e7beb8d931e0932c
SHA2561a95039bc9bb48a8d61c83f1d4d540d6fb78dc665893e319c5f29e9eafdb292d
SHA5125048d8b9f66ac68c26cb09a8e818a7e670f3277b7c4e066a5db4c87b0243b256063bcdbf668377b022b2c25fdd79bf438fb4d0a2f3bdb3e7ad70f3681f82864d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51276ee2eec15665207ce04a3ac772200
SHA1ad75c23157618f544d8e764427d858b4a4892b79
SHA25682252472203aa7ca39de0437922a417913c1c0f931618ed193db0424f259beaa
SHA512344cfdfcd5cd95c906abe576e69142f26677bd1a34bc666b176a406c3c1edd2d556d662950752c195a518d0ecc6e274ab63ec14718ffddf1c75b8af758238b1c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54b6cd29669417a15ff21eeee9462a3f7
SHA1ea52c73bc5c6223dfe1b56656b1359abded214db
SHA256a97b8a82bd07a503e0a0edbce4971cfc65d1079592de38d781a1e443be207177
SHA5126585e7c7a685eb4d9644ad98abca7ce2d78d7f889ff12d04733508b92b487656e028c4f815bf665bb775dacda2f0153ac9aa57ea33b8d9290ba00c85c11ef232
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD597b7aaa480954a5dc011f3eca897d6d2
SHA123fb0d8005034a8d2300c0e823a2652325ce93b6
SHA2562d3df9aedb1cf921f72d9df2fd4b74c5d47d923a2d111ca4fb23f02e8342c2c5
SHA5123219aa8cf5fe90c7a18404ea080d354e638b9f0e683c4ed71aaf3d5c95619a36306c758c4772d00f886f02a566a9555420224256c96badf317ba9268db28ec1c
-
Filesize
4.1MB
MD567ad062ceab2b28cf8e9ef8c9c11c3cb
SHA15c22a3851a0eecfc12f9dd9cd02a0be10f2c5471
SHA25612a3487df014e565f5df619cbc0304ba6ddaff7deaf6ec707ef5d10eeefbac7c
SHA512c1b43fcb4dd0796dffd9af03345517df93d6615604f7842833310ec90f9c334ec4da090457c92541e00d81814184115670de25d2bb8bb57bcc698f0f51488d85
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec