Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-05-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe
Resource
win10v2004-20240508-en
General
-
Target
558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe
-
Size
4.1MB
-
MD5
4859a99b80e9ad16171b6847d5c4b5b1
-
SHA1
d5c41a9f040d85489e34a6904d7147fdb753a41c
-
SHA256
558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf
-
SHA512
afd1d9c804174f173798eff312653b5303166b891db98ca2d182e075f75ea3ecb3c4ecfd17ff8a354f2d4aebe25838c78502191a6685f2cfbf9c7cd62aa456e8
-
SSDEEP
98304:YcO3d23DP4WvcTQUVFyLidGODnX7vlp0fAiBu1UOo5GU75c1WMsxW:YcO3d2wQ4Q8FyLwnXJ+AxvtU75c1jsE
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/2820-2-0x0000000004C60000-0x000000000554B000-memory.dmp family_glupteba behavioral2/memory/2820-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2820-125-0x0000000004C60000-0x000000000554B000-memory.dmp family_glupteba behavioral2/memory/2820-124-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/2560-146-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/2820-172-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1788-195-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-204-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-207-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-210-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-213-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-216-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-219-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-222-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-225-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-228-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-231-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-234-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/1788-237-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2040 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 1788 csrss.exe 3720 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe File created C:\Windows\rss\csrss.exe 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe -
pid Process 3044 powershell.exe 2400 powershell.exe 2036 powershell.exe 2116 powershell.exe 2924 powershell.exe 4404 powershell.exe 5012 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4832 schtasks.exe 3176 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2924 powershell.exe 2924 powershell.exe 2820 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 2820 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 4404 powershell.exe 4404 powershell.exe 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 5012 powershell.exe 5012 powershell.exe 3044 powershell.exe 3044 powershell.exe 2400 powershell.exe 2400 powershell.exe 2036 powershell.exe 2036 powershell.exe 2116 powershell.exe 2116 powershell.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 1788 csrss.exe 1788 csrss.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 1788 csrss.exe 1788 csrss.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe 3720 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 2820 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Token: SeImpersonatePrivilege 2820 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe Token: SeDebugPrivilege 4404 powershell.exe Token: SeDebugPrivilege 5012 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 2036 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeSystemEnvironmentPrivilege 1788 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2924 2820 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 80 PID 2820 wrote to memory of 2924 2820 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 80 PID 2820 wrote to memory of 2924 2820 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 80 PID 2560 wrote to memory of 4404 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 86 PID 2560 wrote to memory of 4404 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 86 PID 2560 wrote to memory of 4404 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 86 PID 2560 wrote to memory of 1956 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 88 PID 2560 wrote to memory of 1956 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 88 PID 1956 wrote to memory of 2040 1956 cmd.exe 90 PID 1956 wrote to memory of 2040 1956 cmd.exe 90 PID 2560 wrote to memory of 5012 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 91 PID 2560 wrote to memory of 5012 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 91 PID 2560 wrote to memory of 5012 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 91 PID 2560 wrote to memory of 3044 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 93 PID 2560 wrote to memory of 3044 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 93 PID 2560 wrote to memory of 3044 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 93 PID 2560 wrote to memory of 1788 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 95 PID 2560 wrote to memory of 1788 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 95 PID 2560 wrote to memory of 1788 2560 558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe 95 PID 1788 wrote to memory of 2400 1788 csrss.exe 96 PID 1788 wrote to memory of 2400 1788 csrss.exe 96 PID 1788 wrote to memory of 2400 1788 csrss.exe 96 PID 1788 wrote to memory of 2036 1788 csrss.exe 101 PID 1788 wrote to memory of 2036 1788 csrss.exe 101 PID 1788 wrote to memory of 2036 1788 csrss.exe 101 PID 1788 wrote to memory of 2116 1788 csrss.exe 104 PID 1788 wrote to memory of 2116 1788 csrss.exe 104 PID 1788 wrote to memory of 2116 1788 csrss.exe 104 PID 1788 wrote to memory of 3720 1788 csrss.exe 106 PID 1788 wrote to memory of 3720 1788 csrss.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe"C:\Users\Admin\AppData\Local\Temp\558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe"C:\Users\Admin\AppData\Local\Temp\558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2040
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3176
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3720
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5df10dd7d0149319d5d2516da9cfcb647
SHA1b8157ca533653fa540dd246d5ff0366bc0a8e3ce
SHA256de301af4eb48e3038e79bfd5a3e859115be5952e2370c9a6e9f0fcc704007483
SHA51229ab077659a7caa32c4988f2baa8533a0f4b5473d922e5d5f2fd27027841001f83cbf5d6a5141d2c580678fd532b1f3b1200b55ed626cd8ba11f7e0d9d17daa1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e92347206fa857e7ed91addcf26e5c28
SHA101c077f6836a0e171723d5a0d13c4a331fdafe18
SHA2567dae4b30464bae564bc519d588d0b5eaed8b5655f5cf3b6c0cdd1cdf7641b83e
SHA512c51019d963b811af4f40134ade19209c5254d4510e4a1b859eac4dfba0c766c5553e0825e3d0b5eafbeb236174d4bc275308b2ba9013300d48010537a09eeb19
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55c275b6a6d70766fa76f75d9b392ac6e
SHA1519be50e5550129ccd2c46e4434c58b26a054fe2
SHA2566c53bf537bf3fea3cf06db29a91a7529dfc83f8640235649a0d06dc1bf64ccdb
SHA512e012c76f79c456c7b0ea86a0c4f2103cf7d7727fe0e8efef8ac557a1e03f1b713aa63414014a41dac2a5a05ded206290ca79ac04fd0b4f39970c5d2fd07e141d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d715b16a5e2fd31663fe00cadf10c6ac
SHA1c086666939fdbc4430e53e21260c237fb4b593bb
SHA2569840127f8474905297b57577bdb9579668822026c8fe93ba1b36f0b9db89804f
SHA512a30dac479722a937494310c6fe833955bf32159e0974e412116fed0fe98588d1d9ff82dcc9d62508951897b84a87892b63d400637ee3bce30a9f0a6102a1c884
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD519eadc914bd7f32c4f3eef6fe108ebc6
SHA1a4b275d2a1f3ad90e527a2e5e4bee9eff6fb5815
SHA256e28ac0ec3d0f6e210d24e0789d95c081b92230a263ec31eb8aa16e0cb6dd67ef
SHA5126921b4f473b49756dbf55e934ac34b0ceec1089d3be40ecd5be665a7e642b7c651cb5f0b41cd338cd1d40a6e521cfa9163f5c773d177867c7bbc99691ddeabf9
-
Filesize
4.1MB
MD54859a99b80e9ad16171b6847d5c4b5b1
SHA1d5c41a9f040d85489e34a6904d7147fdb753a41c
SHA256558aed649fa013e3508b626886c906f2e83d964a943b235a1bd78359e06aa3cf
SHA512afd1d9c804174f173798eff312653b5303166b891db98ca2d182e075f75ea3ecb3c4ecfd17ff8a354f2d4aebe25838c78502191a6685f2cfbf9c7cd62aa456e8