Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe
Resource
win10v2004-20240426-en
General
-
Target
32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe
-
Size
4.1MB
-
MD5
66d70e5f88d34091c21978f0bf70930b
-
SHA1
4f9ed440c66a6da03fadab9b90441fa7f014e331
-
SHA256
32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430
-
SHA512
3dd1eedbe61e3b63589cf82715e31149422c418a5cb9430f2dc3e3fa2392cc2863920854b492cc8be6ae545b63f59e3d0fdc5947857f81a9a87618576e237f9b
-
SSDEEP
98304:YcO3d23DP4WvcTQUVFyLidGODnX7vlp0fAiBu1UOo5GU75c1WMsxMj:YcO3d2wQ4Q8FyLwnXJ+AxvtU75c1jsa
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/2752-2-0x0000000004BD0000-0x00000000054BB000-memory.dmp family_glupteba behavioral1/memory/2752-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2752-115-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/2752-156-0x0000000004BD0000-0x00000000054BB000-memory.dmp family_glupteba behavioral1/memory/904-206-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/2752-213-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3168-215-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-218-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-221-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-224-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-227-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-230-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-233-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-236-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-239-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-242-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-245-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-248-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral1/memory/3168-251-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5080 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3168 csrss.exe 4528 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe File created C:\Windows\rss\csrss.exe 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe -
pid Process 216 powershell.exe 5108 powershell.exe 2964 powershell.exe 4528 powershell.exe 1384 powershell.exe 5104 powershell.exe 4208 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4844 schtasks.exe 4292 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2964 powershell.exe 2964 powershell.exe 2752 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 2752 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 4528 powershell.exe 4528 powershell.exe 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 1384 powershell.exe 1384 powershell.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 4208 powershell.exe 4208 powershell.exe 4208 powershell.exe 216 powershell.exe 216 powershell.exe 216 powershell.exe 5108 powershell.exe 5108 powershell.exe 5108 powershell.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 3168 csrss.exe 3168 csrss.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 3168 csrss.exe 3168 csrss.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe 4528 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2964 powershell.exe Token: SeDebugPrivilege 2752 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Token: SeImpersonatePrivilege 2752 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 1384 powershell.exe Token: SeDebugPrivilege 5104 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 216 powershell.exe Token: SeDebugPrivilege 5108 powershell.exe Token: SeSystemEnvironmentPrivilege 3168 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2964 2752 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 87 PID 2752 wrote to memory of 2964 2752 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 87 PID 2752 wrote to memory of 2964 2752 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 87 PID 904 wrote to memory of 4528 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 96 PID 904 wrote to memory of 4528 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 96 PID 904 wrote to memory of 4528 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 96 PID 904 wrote to memory of 4444 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 98 PID 904 wrote to memory of 4444 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 98 PID 4444 wrote to memory of 5080 4444 cmd.exe 100 PID 4444 wrote to memory of 5080 4444 cmd.exe 100 PID 904 wrote to memory of 1384 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 101 PID 904 wrote to memory of 1384 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 101 PID 904 wrote to memory of 1384 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 101 PID 904 wrote to memory of 5104 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 105 PID 904 wrote to memory of 5104 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 105 PID 904 wrote to memory of 5104 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 105 PID 904 wrote to memory of 3168 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 107 PID 904 wrote to memory of 3168 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 107 PID 904 wrote to memory of 3168 904 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 107 PID 3168 wrote to memory of 4208 3168 csrss.exe 109 PID 3168 wrote to memory of 4208 3168 csrss.exe 109 PID 3168 wrote to memory of 4208 3168 csrss.exe 109 PID 3168 wrote to memory of 216 3168 csrss.exe 114 PID 3168 wrote to memory of 216 3168 csrss.exe 114 PID 3168 wrote to memory of 216 3168 csrss.exe 114 PID 3168 wrote to memory of 5108 3168 csrss.exe 118 PID 3168 wrote to memory of 5108 3168 csrss.exe 118 PID 3168 wrote to memory of 5108 3168 csrss.exe 118 PID 3168 wrote to memory of 4528 3168 csrss.exe 122 PID 3168 wrote to memory of 4528 3168 csrss.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe"C:\Users\Admin\AppData\Local\Temp\32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe"C:\Users\Admin\AppData\Local\Temp\32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:5080
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4844
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4292
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD518a572cb45dcb5375fb7e99ad3121744
SHA1594db4785d2f9d715822099a028800f4ee9d7fd6
SHA2563db5e46cd7fed019c9d0b819d3f4af82b7b1de370c31d8910dbaa5ebd44f2b0d
SHA51265e383195c52aacb43262d23a840788b2e6f5df8dfeab532ab50a93ef315c37f825104c9a41d98615eb0d5abcb0f74b8c0e96d58aaf0c8d45020c329e96b0cfb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d31806904f08881c67bdc9f400e0d7ea
SHA18b35fe81a37a757d7e742db1a360dcb0ea5d431f
SHA256022cf1c849adc771f36e6533584722c13e16d595da3727a8482535b35f0736d8
SHA512d86404ab9e89f1782c2a95472dba7f9565d511d9e14aa34f8edeac48da1bdc4b28e98aaf5fe511c4d3736788b10bfb7eb0d6de543ea0752f99227352e0e6fcc3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD574648605ce2cd4fbf1deebcea31c3784
SHA1b7e64465cdccb1f03f5147219ec8e0bed2932e78
SHA2564339e492b0de9fd1ce43a387e1748a010ada7ad9bc9eaffde1a1796bcf0b15fb
SHA5123bf8a43e42ff87161f71c4587128c09b0d4382e2eada466027ca1ee81416c6dc4e7b9c2c4ae690580b12dd532585ed7e2c354df6ba3cf5164dfea198916a2658
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5aa5d3e26c2f589b8132b8b7b111803d8
SHA1b3f47a898671395a0155dd2c41f715e1a7c3dd96
SHA25633c9b3478982289a0c44edf6fddb136d4a9d72c1193db89963f600c489e2b351
SHA512311b49ac842e59a725f77f9871f2648c9e4900c610e4a731aef716894e6d70585e51b4b9d57f5f5d76b81f5bf4206adea7602f8ea3e4dbd6917caa7116da8dbe
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55fcf6325c9403147b248f8d3063102d0
SHA13cea7137acd69505fad334665f567ee7712f81b3
SHA25668327fe2cda622e88998c9ba049b7abd3a2b0499cd994dfa5fd3bd9a2b3181e8
SHA512a3364887bd112d294a5a15aa4a272c0b9e08dfd56e9fb6c0704c7fdc54e51e33483f70ddd525e60dae311e49d0375453a5183000368a179a02c5ced33e1e699b
-
Filesize
4.1MB
MD566d70e5f88d34091c21978f0bf70930b
SHA14f9ed440c66a6da03fadab9b90441fa7f014e331
SHA25632144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430
SHA5123dd1eedbe61e3b63589cf82715e31149422c418a5cb9430f2dc3e3fa2392cc2863920854b492cc8be6ae545b63f59e3d0fdc5947857f81a9a87618576e237f9b