Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe
Resource
win10v2004-20240508-en
General
-
Target
09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe
-
Size
4.1MB
-
MD5
b88142eaf5baa7e6c537db605ec9966a
-
SHA1
993b87d06dd65f14d99cc858a08b95f350b93af6
-
SHA256
09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc
-
SHA512
b30191420729927557ad1a0b0fa3378881940a07da0008969ebeeaa5e1dd8f254c4a34e44bb74be41bb31aa34d75820d4133cb6c37b5c8fed9805f82f1284882
-
SSDEEP
98304:zmSOHuT7egJLhRTCVEkOCdqjiWtSbuAFmh92D:z0ObLh9WfG/tSdes
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/2316-2-0x00000000047D0000-0x00000000050BB000-memory.dmp family_glupteba behavioral1/memory/2316-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2316-54-0x00000000047D0000-0x00000000050BB000-memory.dmp family_glupteba behavioral1/memory/2316-56-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2316-53-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/3356-133-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-219-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-220-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-221-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-222-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-223-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-224-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-225-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-226-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-227-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-228-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-229-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-230-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/2252-231-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3384 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2252 csrss.exe 3064 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe File opened for modification C:\Windows\rss 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe -
pid Process 4696 powershell.exe 4216 powershell.exe 2640 powershell.exe 2840 powershell.exe 664 powershell.exe 4356 powershell.exe 4372 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3136 schtasks.exe 3444 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4356 powershell.exe 4356 powershell.exe 2316 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 2316 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 4372 powershell.exe 4372 powershell.exe 4372 powershell.exe 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 4696 powershell.exe 4696 powershell.exe 4696 powershell.exe 4216 powershell.exe 4216 powershell.exe 4216 powershell.exe 2640 powershell.exe 2640 powershell.exe 2640 powershell.exe 2840 powershell.exe 2840 powershell.exe 2840 powershell.exe 664 powershell.exe 664 powershell.exe 664 powershell.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 2252 csrss.exe 2252 csrss.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 2252 csrss.exe 2252 csrss.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe 3064 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4356 powershell.exe Token: SeDebugPrivilege 2316 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Token: SeImpersonatePrivilege 2316 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe Token: SeDebugPrivilege 4372 powershell.exe Token: SeDebugPrivilege 4696 powershell.exe Token: SeDebugPrivilege 4216 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 664 powershell.exe Token: SeSystemEnvironmentPrivilege 2252 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2316 wrote to memory of 4356 2316 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 92 PID 2316 wrote to memory of 4356 2316 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 92 PID 2316 wrote to memory of 4356 2316 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 92 PID 3356 wrote to memory of 4372 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 104 PID 3356 wrote to memory of 4372 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 104 PID 3356 wrote to memory of 4372 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 104 PID 3356 wrote to memory of 3728 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 108 PID 3356 wrote to memory of 3728 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 108 PID 3728 wrote to memory of 3384 3728 cmd.exe 110 PID 3728 wrote to memory of 3384 3728 cmd.exe 110 PID 3356 wrote to memory of 4696 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 111 PID 3356 wrote to memory of 4696 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 111 PID 3356 wrote to memory of 4696 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 111 PID 3356 wrote to memory of 4216 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 114 PID 3356 wrote to memory of 4216 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 114 PID 3356 wrote to memory of 4216 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 114 PID 3356 wrote to memory of 2252 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 116 PID 3356 wrote to memory of 2252 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 116 PID 3356 wrote to memory of 2252 3356 09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe 116 PID 2252 wrote to memory of 2640 2252 csrss.exe 117 PID 2252 wrote to memory of 2640 2252 csrss.exe 117 PID 2252 wrote to memory of 2640 2252 csrss.exe 117 PID 2252 wrote to memory of 2840 2252 csrss.exe 122 PID 2252 wrote to memory of 2840 2252 csrss.exe 122 PID 2252 wrote to memory of 2840 2252 csrss.exe 122 PID 2252 wrote to memory of 664 2252 csrss.exe 125 PID 2252 wrote to memory of 664 2252 csrss.exe 125 PID 2252 wrote to memory of 664 2252 csrss.exe 125 PID 2252 wrote to memory of 3064 2252 csrss.exe 127 PID 2252 wrote to memory of 3064 2252 csrss.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe"C:\Users\Admin\AppData\Local\Temp\09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe"C:\Users\Admin\AppData\Local\Temp\09ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3384
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3136
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2748
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3444
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4020,i,6593821857742176458,13646536021844995125,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:81⤵PID:1660
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5506b1e5aff09e6d2e4663510a446cfa8
SHA178c355ffd434c43731ae6a6194a53ee124c033c7
SHA2568c950afa6c5118dad7993ce9b4cd2329521675197b76083c581d989ee981c12f
SHA512c58b8a3b412ca65502241595bc25f7ffa46b591530873d9351b024e3f2179917b7ff8ccb791aa9e05061dd22d12dc3677860952bcb55b85cd20db4d17dd5d698
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e77be24ddcdb864f024c109601ac7eb9
SHA189baaeb11199b63f6964d6510d83ad9c07b26f99
SHA25654d02f0d4d32677ad02f848d6cb28e6e44fe1dc76679f847e65fef2744af4801
SHA512d95d8706083ff0411951028b6401caf1eab8a35ee1872228fc0b5502f2e8fa2f4618912400a9511669c782377c0b79dd422410863f74aead8f7cf3a09c583c78
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b9a5b39a7e7cd5366ad088b41fd9a512
SHA12ca6b46bf6da0fd73eca459fd73ae33d591ecbe5
SHA2562c37747088b6284dd06ac49966d4f8d3c46c77e0b29603199a724b23628602ca
SHA512cd96908a7d173df65242aa3146c75f6940996fa12fe52b9bf2b41e37a401387d0b025fe161993eda387879866857c8f9b716150c41ea6f317f32d12ad9fcdb75
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ec9d50ae04c03975090200f6c3841e4a
SHA17a9b156c0d31ef4e92c04daec242ff2645644e49
SHA2567d2b7c32d2ae84586215af6abf5df7ad09ea1ffe0c9d898be6e67a3bc23a1def
SHA5124224b8812733fb270a38b4c3fe921b94f2a97f00d047b3788769a7787938dbf2651a07eef53c8b80cc93623a3d1643f0e19defa8d5cefad0a8a429d1240770e9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ebf9230d8ad894cf50dd270eeebf7829
SHA1a4510603bd202d52eb2fd9afac9745e5fac64208
SHA2569faa6f92af3095d388e2e4f68d80969c3b759fa5173313ef1d967bb68c9d3f40
SHA512ac41e575355b66d859771f1cc938857ba882bd7719e503f8def2417f885f0ef802714aa891ac904613ba1d9d689240e1273299493c4d61135232ae156a893c81
-
Filesize
4.1MB
MD5b88142eaf5baa7e6c537db605ec9966a
SHA1993b87d06dd65f14d99cc858a08b95f350b93af6
SHA25609ce87d0be43cd78c49db505ee59b33bfe233d1a380dcce7efc77102b0c411dc
SHA512b30191420729927557ad1a0b0fa3378881940a07da0008969ebeeaa5e1dd8f254c4a34e44bb74be41bb31aa34d75820d4133cb6c37b5c8fed9805f82f1284882