Analysis
-
max time kernel
58s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe
Resource
win7-20240419-en
General
-
Target
16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe
-
Size
4.1MB
-
MD5
909891c9ab1e5e345f7be572488780fc
-
SHA1
269bc722b52983327051bbaa189199733a7ed09f
-
SHA256
16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a
-
SHA512
cefd20dd80cfe0dfd701d6c3237d8993b367b829894fc49c49c225f995cfb24cfbc645ee5b55f47a45be7b59eff5665ca7729677f6dcef0fd2ca8dfd53b6b7fe
-
SSDEEP
98304:MxfL9oyIkrku4AJMBJNRxIbk0RddEjk9Pc8cg301s2mGvq:6RrVrv4XbNRWhj2o9k8f3CspGvq
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/792-2-0x0000000004CA0000-0x000000000558B000-memory.dmp family_glupteba behavioral2/memory/792-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/792-4-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/792-28-0x0000000004CA0000-0x000000000558B000-memory.dmp family_glupteba behavioral2/memory/792-34-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/792-61-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/792-59-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1036-100-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/1036-139-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2508-207-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2508-225-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2508-235-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2508-237-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2508-239-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2508-241-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2508-243-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2508-245-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2508-247-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2508-249-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1084 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2508 csrss.exe -
resource yara_rule behavioral2/files/0x0008000000023282-228.dat upx behavioral2/memory/3220-229-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1736-232-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3220-234-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1736-236-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1736-240-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1736-246-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe File created C:\Windows\rss\csrss.exe 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4976 sc.exe -
pid Process 1832 powershell.exe 3392 powershell.exe 3272 powershell.exe 4652 powershell.exe 2220 powershell.exe 1520 powershell.exe 4400 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1612 schtasks.exe 4548 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1832 powershell.exe 1832 powershell.exe 792 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 792 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 3392 powershell.exe 3392 powershell.exe 3392 powershell.exe 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 3272 powershell.exe 3272 powershell.exe 3272 powershell.exe 4652 powershell.exe 4652 powershell.exe 4652 powershell.exe 2220 powershell.exe 2220 powershell.exe 2220 powershell.exe 1520 powershell.exe 1520 powershell.exe 1520 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1832 powershell.exe Token: SeDebugPrivilege 792 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Token: SeImpersonatePrivilege 792 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe Token: SeDebugPrivilege 3392 powershell.exe Token: SeDebugPrivilege 3272 powershell.exe Token: SeDebugPrivilege 4652 powershell.exe Token: SeDebugPrivilege 2220 powershell.exe Token: SeDebugPrivilege 1520 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 792 wrote to memory of 1832 792 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 91 PID 792 wrote to memory of 1832 792 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 91 PID 792 wrote to memory of 1832 792 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 91 PID 1036 wrote to memory of 3392 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 100 PID 1036 wrote to memory of 3392 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 100 PID 1036 wrote to memory of 3392 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 100 PID 1036 wrote to memory of 1016 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 104 PID 1036 wrote to memory of 1016 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 104 PID 1016 wrote to memory of 1084 1016 cmd.exe 106 PID 1016 wrote to memory of 1084 1016 cmd.exe 106 PID 1036 wrote to memory of 3272 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 107 PID 1036 wrote to memory of 3272 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 107 PID 1036 wrote to memory of 3272 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 107 PID 1036 wrote to memory of 4652 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 109 PID 1036 wrote to memory of 4652 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 109 PID 1036 wrote to memory of 4652 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 109 PID 1036 wrote to memory of 2508 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 112 PID 1036 wrote to memory of 2508 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 112 PID 1036 wrote to memory of 2508 1036 16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe 112 PID 2508 wrote to memory of 2220 2508 csrss.exe 113 PID 2508 wrote to memory of 2220 2508 csrss.exe 113 PID 2508 wrote to memory of 2220 2508 csrss.exe 113 PID 2508 wrote to memory of 1520 2508 csrss.exe 118 PID 2508 wrote to memory of 1520 2508 csrss.exe 118 PID 2508 wrote to memory of 1520 2508 csrss.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe"C:\Users\Admin\AppData\Local\Temp\16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe"C:\Users\Admin\AppData\Local\Temp\16df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a.bin.bin.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1084
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1612
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:1732
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4548
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:3220
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:2108
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:4976
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3768 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:1832
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1736
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52f092933fa663328e92af1e2fba1cd11
SHA1c87389fcff6845591f656bdc495b3800b891fd9e
SHA2562c8cab4c6b1d4ce1a9d3507732b8245bc7666b0e01cedde7be37d0ef22e9e7a1
SHA512ae93d24723a0901961ccf1c8a1637df9d7fcbf4878e083e6f997d54d55bd142c4353d61e366fd4956795ead0e6aa86d7d225ae4c6166a5627184b27c6f4fa153
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD544a8852f65d1236f9b521b2c15dddcef
SHA1ca18e3bc761a38a45cb7ed09c85c8754df10f61d
SHA256a227a30ba2e762edfb414c8d2403f44bb2cc1b12f88e84b19d5af71de2e5f9b2
SHA512e65cc174cb031be0fd973402bc64d825ced949e67f0dc62332dcbcd773d67a09d9044d87d824b168d92ec950df9db7fda3134ed5df9952c90e828b5b86602baa
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5228bbd35b0668d5b46268170f6fb65de
SHA16478309d7e692e458300d7ad82911197e8fedd36
SHA25669bf30094db116afeab5da011c3d8ea9862ed83905b96838713b9cfd3b69dfe4
SHA5127b1d5b09216a3043061f6a9db67af697f985da37d0600cc1de0ef5eecf36123dd586586cb8aed26654de499b23541ec54c9a35ecd18dd6d8e9ab1e1e9f913f51
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5817714bc69b6ff68b0f78a14610e1ce0
SHA17921803cdd6f7c7931070a20ccc4b3b8407f547d
SHA2566ef2be41a7cc7a1ceb31639998baec2c234a66081594efaa49c9c7347a3b759c
SHA5127d917f72116d42ac4091737a9c90888ac05708ea7c1caa010785bcee6c74e195376e5e2014a26fc94f44b980353a5b61cb0b05a66be60456917fbb2656d029c5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD578c1aa211800eed780b5e825eea3ce47
SHA1735fea5050b86c169c3bbdd730634b490faa5be6
SHA256a69fce73825c63b42eef20f34b85fdba0f105d4d4704c45d1938188d4fe34cf8
SHA5120ddd678ce454334346e4c4d857972c2969b0f9d2c98ccba54e0ff31f80fe21cadad2c703d7b20dabacd44d8c4e3ea216aa3237a39c4cdc68d97533f0f0548040
-
Filesize
4.1MB
MD5909891c9ab1e5e345f7be572488780fc
SHA1269bc722b52983327051bbaa189199733a7ed09f
SHA25616df0afe5a4c87a2668bdec21c752d5c1f9d922d2ccb02341063692540f3875a
SHA512cefd20dd80cfe0dfd701d6c3237d8993b367b829894fc49c49c225f995cfb24cfbc645ee5b55f47a45be7b59eff5665ca7729677f6dcef0fd2ca8dfd53b6b7fe
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec