Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-05-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe
Resource
win10v2004-20240426-en
General
-
Target
32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe
-
Size
4.1MB
-
MD5
66d70e5f88d34091c21978f0bf70930b
-
SHA1
4f9ed440c66a6da03fadab9b90441fa7f014e331
-
SHA256
32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430
-
SHA512
3dd1eedbe61e3b63589cf82715e31149422c418a5cb9430f2dc3e3fa2392cc2863920854b492cc8be6ae545b63f59e3d0fdc5947857f81a9a87618576e237f9b
-
SSDEEP
98304:YcO3d23DP4WvcTQUVFyLidGODnX7vlp0fAiBu1UOo5GU75c1WMsxMj:YcO3d2wQ4Q8FyLwnXJ+AxvtU75c1jsa
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/3308-2-0x0000000004D50000-0x000000000563B000-memory.dmp family_glupteba behavioral2/memory/3308-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3308-89-0x0000000004D50000-0x000000000563B000-memory.dmp family_glupteba behavioral2/memory/3308-87-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3916-124-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3308-147-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3312-200-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-202-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-204-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-206-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-208-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-210-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-212-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-214-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-216-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-218-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-220-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-222-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba behavioral2/memory/3312-224-0x0000000000400000-0x0000000002B08000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1828 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3312 csrss.exe 2412 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe File created C:\Windows\rss\csrss.exe 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe -
pid Process 852 powershell.exe 2996 powershell.exe 1048 powershell.exe 2096 powershell.exe 2144 powershell.exe 4920 powershell.exe 4788 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1180 schtasks.exe 5084 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 852 powershell.exe 852 powershell.exe 3308 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 3308 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 2996 powershell.exe 2996 powershell.exe 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 1048 powershell.exe 1048 powershell.exe 2096 powershell.exe 2096 powershell.exe 2144 powershell.exe 2144 powershell.exe 4920 powershell.exe 4920 powershell.exe 4788 powershell.exe 4788 powershell.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 3312 csrss.exe 3312 csrss.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 3312 csrss.exe 3312 csrss.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe 2412 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 852 powershell.exe Token: SeDebugPrivilege 3308 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Token: SeImpersonatePrivilege 3308 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe Token: SeDebugPrivilege 2996 powershell.exe Token: SeDebugPrivilege 1048 powershell.exe Token: SeDebugPrivilege 2096 powershell.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 4920 powershell.exe Token: SeDebugPrivilege 4788 powershell.exe Token: SeSystemEnvironmentPrivilege 3312 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3308 wrote to memory of 852 3308 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 81 PID 3308 wrote to memory of 852 3308 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 81 PID 3308 wrote to memory of 852 3308 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 81 PID 3916 wrote to memory of 2996 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 86 PID 3916 wrote to memory of 2996 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 86 PID 3916 wrote to memory of 2996 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 86 PID 3916 wrote to memory of 1276 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 88 PID 3916 wrote to memory of 1276 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 88 PID 1276 wrote to memory of 1828 1276 cmd.exe 90 PID 1276 wrote to memory of 1828 1276 cmd.exe 90 PID 3916 wrote to memory of 1048 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 91 PID 3916 wrote to memory of 1048 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 91 PID 3916 wrote to memory of 1048 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 91 PID 3916 wrote to memory of 2096 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 93 PID 3916 wrote to memory of 2096 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 93 PID 3916 wrote to memory of 2096 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 93 PID 3916 wrote to memory of 3312 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 95 PID 3916 wrote to memory of 3312 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 95 PID 3916 wrote to memory of 3312 3916 32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe 95 PID 3312 wrote to memory of 2144 3312 csrss.exe 96 PID 3312 wrote to memory of 2144 3312 csrss.exe 96 PID 3312 wrote to memory of 2144 3312 csrss.exe 96 PID 3312 wrote to memory of 4920 3312 csrss.exe 101 PID 3312 wrote to memory of 4920 3312 csrss.exe 101 PID 3312 wrote to memory of 4920 3312 csrss.exe 101 PID 3312 wrote to memory of 4788 3312 csrss.exe 104 PID 3312 wrote to memory of 4788 3312 csrss.exe 104 PID 3312 wrote to memory of 4788 3312 csrss.exe 104 PID 3312 wrote to memory of 2412 3312 csrss.exe 106 PID 3312 wrote to memory of 2412 3312 csrss.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe"C:\Users\Admin\AppData\Local\Temp\32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe"C:\Users\Admin\AppData\Local\Temp\32144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1828
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1180
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:940
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:5084
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ecabc8e96db7f016bcbbe73a44dd516a
SHA13a917c120c54e2f0138903c57f9bbbf017bfcfc6
SHA256474d4bf32a0d8411fd682726d7bf0f308fbee30da406edccfed262286a3f79be
SHA512e3833e4dbec0726a722f22683d3dbd8f029ccf7c2821e394b4c8abf93ac320ff48bc480966f74b7cbfa2be18e4fcce4c5fa4068269a9ad94e3330e3702626287
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52edcdc5f534c9b1bb17429363559fc10
SHA142861d9f651868e5ab47a6dac2548c310b54e054
SHA256e9ba1f9bfb9797fab1967b9a498cf18353e3f193fd82367fd6fe085bbe6be4e3
SHA5121b9199c89db8b590e2848555f5d26023bedbd30e7970afb08777f18a6cf9bc81278d874b2818ddc10885dee28464971b0f751336d7d13eb1521a3c81a4f5ecc7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e89f6995aa696eda94821917f1fa3a05
SHA1e65a540a1051c9d38f2704bd56e01b619240b861
SHA25625120c7e0dcb1114ace8f68e4d089dee5eea509adc4954c8d8c990a9940df321
SHA512e2d0c678e877edaa929cf6e0740aec17ea28606945a05fbd0ad2deabff7e673764654f49af2982f7fb0a388ec3be1155085e2a1a3f12085386792e7f72f99d68
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56db4d4863bb1c4aa010bf26ed6321d9b
SHA1702da860a74148bb7cd2b40d4097a51c060ede05
SHA25633d69e3c5ec9d44b1e5eb52be450b3ca7c6f10025799a3e181f70e8fd4c484f6
SHA512dcd5928ba77371b911dfa312bc3b43cc0a3e0e25cb054be15d15497e15ba6d6bc37dfe58d9ddd97fab0454f8dabde4473f3aecc0f79b4be01d1319472e0c6ebc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50acf5b0f111376fb1bc0223307708fcc
SHA1dabe95050f2e677032c096d334e519a19bc348d4
SHA256fe1b77b802bf489f46d347155624611ebd7765cad0a8ed73f0c569e2cd95100f
SHA5126aac8fc9a4134ee75c12d81077a24cee8020f1edc54f9033c1daca87cf11c1e09bc47397707f47030b3772179233ed0eafeb430deff5a464c337ab83f10be48c
-
Filesize
4.1MB
MD566d70e5f88d34091c21978f0bf70930b
SHA14f9ed440c66a6da03fadab9b90441fa7f014e331
SHA25632144afe2f1eed5830db36a119df61b1a9b610ede5c15acae277e51ebd75e430
SHA5123dd1eedbe61e3b63589cf82715e31149422c418a5cb9430f2dc3e3fa2392cc2863920854b492cc8be6ae545b63f59e3d0fdc5947857f81a9a87618576e237f9b