Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-05-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe
Resource
win10v2004-20240508-en
General
-
Target
9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe
-
Size
4.1MB
-
MD5
bf481bf8e5872aa66da25ad7babfc266
-
SHA1
ad41865f30d1b765f97084ef8aaf3d7b59533227
-
SHA256
9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650
-
SHA512
bd2f0bd2161cd97d02ead970620198f5018de89ccd37b9be6d4c971fdb2e647a23de950be50c42f0c86f2c57cb8e1c1b160f3ce5b9b8d448f950ab8b2f22f12b
-
SSDEEP
98304:4cO3d23DP4WvcTQUVFyLidGODnX7vlp0fAiBu1UOo5GU75c1WMsxE:4cO3d2wQ4Q8FyLwnXJ+AxvtU75c1jsm
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/72-2-0x0000000004DE0000-0x00000000056CB000-memory.dmp family_glupteba behavioral2/memory/72-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/72-77-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/72-109-0x0000000004DE0000-0x00000000056CB000-memory.dmp family_glupteba behavioral2/memory/2720-124-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/72-136-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3000-200-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-210-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-213-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-216-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-219-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-222-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-226-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-228-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-231-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-234-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-237-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-240-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3000-243-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4640 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 3000 csrss.exe 5040 injector.exe 3728 windefender.exe 2660 windefender.exe -
resource yara_rule behavioral2/files/0x000200000002a9d6-204.dat upx behavioral2/memory/3728-205-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3728-209-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2660-212-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2660-218-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rss 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe File created C:\Windows\rss\csrss.exe 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3832 sc.exe -
pid Process 2872 powershell.exe 2408 powershell.exe 2452 powershell.exe 2100 powershell.exe 3836 powershell.exe 768 powershell.exe 3296 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1148 schtasks.exe 932 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1932 = "Russia TZ 11 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2872 = "Magallanes Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3836 powershell.exe 3836 powershell.exe 72 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 72 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 768 powershell.exe 768 powershell.exe 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 3296 powershell.exe 3296 powershell.exe 2872 powershell.exe 2872 powershell.exe 2408 powershell.exe 2408 powershell.exe 2452 powershell.exe 2452 powershell.exe 2100 powershell.exe 2100 powershell.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 3000 csrss.exe 3000 csrss.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 3000 csrss.exe 3000 csrss.exe 5040 injector.exe 5040 injector.exe 3000 csrss.exe 3000 csrss.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe 5040 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3836 powershell.exe Token: SeDebugPrivilege 72 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Token: SeImpersonatePrivilege 72 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe Token: SeDebugPrivilege 768 powershell.exe Token: SeDebugPrivilege 3296 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2408 powershell.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 2100 powershell.exe Token: SeSystemEnvironmentPrivilege 3000 csrss.exe Token: SeSecurityPrivilege 3832 sc.exe Token: SeSecurityPrivilege 3832 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 72 wrote to memory of 3836 72 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 82 PID 72 wrote to memory of 3836 72 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 82 PID 72 wrote to memory of 3836 72 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 82 PID 2720 wrote to memory of 768 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 87 PID 2720 wrote to memory of 768 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 87 PID 2720 wrote to memory of 768 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 87 PID 2720 wrote to memory of 440 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 89 PID 2720 wrote to memory of 440 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 89 PID 440 wrote to memory of 4640 440 cmd.exe 91 PID 440 wrote to memory of 4640 440 cmd.exe 91 PID 2720 wrote to memory of 3296 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 92 PID 2720 wrote to memory of 3296 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 92 PID 2720 wrote to memory of 3296 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 92 PID 2720 wrote to memory of 2872 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 94 PID 2720 wrote to memory of 2872 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 94 PID 2720 wrote to memory of 2872 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 94 PID 2720 wrote to memory of 3000 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 96 PID 2720 wrote to memory of 3000 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 96 PID 2720 wrote to memory of 3000 2720 9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe 96 PID 3000 wrote to memory of 2408 3000 csrss.exe 97 PID 3000 wrote to memory of 2408 3000 csrss.exe 97 PID 3000 wrote to memory of 2408 3000 csrss.exe 97 PID 3000 wrote to memory of 2452 3000 csrss.exe 102 PID 3000 wrote to memory of 2452 3000 csrss.exe 102 PID 3000 wrote to memory of 2452 3000 csrss.exe 102 PID 3000 wrote to memory of 2100 3000 csrss.exe 105 PID 3000 wrote to memory of 2100 3000 csrss.exe 105 PID 3000 wrote to memory of 2100 3000 csrss.exe 105 PID 3000 wrote to memory of 5040 3000 csrss.exe 107 PID 3000 wrote to memory of 5040 3000 csrss.exe 107 PID 3728 wrote to memory of 4224 3728 windefender.exe 113 PID 3728 wrote to memory of 4224 3728 windefender.exe 113 PID 3728 wrote to memory of 4224 3728 windefender.exe 113 PID 4224 wrote to memory of 3832 4224 cmd.exe 114 PID 4224 wrote to memory of 3832 4224 cmd.exe 114 PID 4224 wrote to memory of 3832 4224 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe"C:\Users\Admin\AppData\Local\Temp\9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:72 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe"C:\Users\Admin\AppData\Local\Temp\9c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4640
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1148
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:932
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2660
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD575209208aa99420b141b36aa94a4ba9f
SHA108a48bda700790e3bd9f8ee0465771c9a817a7e5
SHA256e5c2697a78f0241ae81a0df426c671386879bfcfdb9c05e03c855c87c28cd519
SHA512d141e5f99504d4b31f7b839d67cf07664fa353d36fce0882e39880e8c3315cecbf3495bd12d3da9cdd2b3e2893ddbda250e7dfdc046c1b390d0e526afee1ff46
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a35d7eb1690f7ee74ae72d3d95633c4e
SHA1d9c4cc9ba161a06e9f4aed01fd5699f9923cc08e
SHA25649ca47a61d3b9e45fad9dd01be873c203986e22b5fa8edb4b536cef79c0d2366
SHA512dfc4fd4afe47014b34a70db4f4bccda277ed4249ff3a62f0b69a39d4722d397093051136b801867a9a65dc34d7ef27f26afd6b0016b08b0ec65cc6cd74fc898e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5360283f39e63586f9dca0cdb25658bfd
SHA19524996cae97b5eee2d113012df875a314eb0fda
SHA25689462d3ec0db785060bba26384b0d3c28ccfaf3e1db7c6e4ff18af4467d52c3c
SHA512377cc61b3bd4fad85a06c4a164bbc7cf50dc6d1179eb9d9e7ba369d68bbe7fe4014650e547b8a29ae17c6fc5f9cf01d7505f547bfbd171876d2bb697696c221c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ea236a4728be72827e5f29d96a39d1ed
SHA19860ae8d58604bb77437ee58dd9795c68a73118a
SHA2567a0b40b3a0a0f059ea8721c520cd45e5af3b0f815ff6ae365003f66639c329d0
SHA512230716a8f93ae6c1f5c76118bfb06faf8c0ff4413a22fd2890063535349221df3684fa636c142a1967e4646650fddc9e1ef7f3c12909107ae2ebf16a27e23fce
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5794f51c0a99d377bd9ade30743acb28d
SHA1897df4044406e2649cef2b5f050c2cc384f950e9
SHA2562b3842364aa0483753730847e126754524fac8de65f44d0dd64220ca099b7ed7
SHA51243befa7cb52999ac84d2fd5a432ad21dfadf3c23d5ac27a60a4c07b8b94b53333f9c60f8e68dd0f934fbb8501acb8d6221373d539ed2e0a76dd07bbd15ba5a51
-
Filesize
4.1MB
MD5bf481bf8e5872aa66da25ad7babfc266
SHA1ad41865f30d1b765f97084ef8aaf3d7b59533227
SHA2569c396089f62e002e725a9e374544c62f7bfbc3cf600b38e0daa1326ac9c1c650
SHA512bd2f0bd2161cd97d02ead970620198f5018de89ccd37b9be6d4c971fdb2e647a23de950be50c42f0c86f2c57cb8e1c1b160f3ce5b9b8d448f950ab8b2f22f12b
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec