Analysis
-
max time kernel
21s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-05-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe
Resource
win10v2004-20240426-en
General
-
Target
ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe
-
Size
4.1MB
-
MD5
8af9bd8e585788333de4a08052840441
-
SHA1
5dcd65fdc2d68d203d7e8d576be6dfba44ec31fa
-
SHA256
ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7
-
SHA512
e7cf6ef133d970407c9debaf7ce53e44572a3dae5c2b9f3c6c101cf7d0c5b447733ba7ce9a5a91a69b1c40c3fbfcf4d2578b75fae8ff76868a2fdb145ba66ac1
-
SSDEEP
98304:8rbgSYZm0VZ47d2LjXdY+WeqK35WW/TEhU3Gu22Q:8rcnZFqd2LRPP3hYhQZQ
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/2460-2-0x00000000045B0000-0x0000000004E9B000-memory.dmp family_glupteba behavioral2/memory/2460-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2460-99-0x00000000045B0000-0x0000000004E9B000-memory.dmp family_glupteba behavioral2/memory/2460-97-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2460-148-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1624-147-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-200-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-213-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-217-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-221-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-224-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-228-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-232-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-237-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-241-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-245-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-248-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-252-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba behavioral2/memory/2572-257-0x0000000000400000-0x0000000002361000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4588 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2572 csrss.exe -
resource yara_rule behavioral2/memory/3944-207-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000200000002aa5e-208.dat upx behavioral2/memory/3944-211-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1376-209-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1376-215-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1376-223-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe File created C:\Windows\rss\csrss.exe ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3740 sc.exe -
pid Process 4796 powershell.exe 3944 powershell.exe 2532 powershell.exe 4928 powershell.exe 1656 powershell.exe 2576 powershell.exe 3348 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 804 schtasks.exe 2384 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4796 powershell.exe 4796 powershell.exe 2460 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 2460 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 3944 powershell.exe 3944 powershell.exe 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 2532 powershell.exe 2532 powershell.exe 4928 powershell.exe 4928 powershell.exe 1656 powershell.exe 1656 powershell.exe 2576 powershell.exe 2576 powershell.exe 3348 powershell.exe 3348 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4796 powershell.exe Token: SeDebugPrivilege 2460 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Token: SeImpersonatePrivilege 2460 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe Token: SeDebugPrivilege 3944 powershell.exe Token: SeDebugPrivilege 2532 powershell.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 3348 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2460 wrote to memory of 4796 2460 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 81 PID 2460 wrote to memory of 4796 2460 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 81 PID 2460 wrote to memory of 4796 2460 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 81 PID 1624 wrote to memory of 3944 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 86 PID 1624 wrote to memory of 3944 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 86 PID 1624 wrote to memory of 3944 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 86 PID 1624 wrote to memory of 5044 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 88 PID 1624 wrote to memory of 5044 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 88 PID 5044 wrote to memory of 4588 5044 cmd.exe 90 PID 5044 wrote to memory of 4588 5044 cmd.exe 90 PID 1624 wrote to memory of 2532 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 91 PID 1624 wrote to memory of 2532 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 91 PID 1624 wrote to memory of 2532 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 91 PID 1624 wrote to memory of 4928 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 93 PID 1624 wrote to memory of 4928 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 93 PID 1624 wrote to memory of 4928 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 93 PID 1624 wrote to memory of 2572 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 95 PID 1624 wrote to memory of 2572 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 95 PID 1624 wrote to memory of 2572 1624 ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe 95 PID 2572 wrote to memory of 1656 2572 csrss.exe 96 PID 2572 wrote to memory of 1656 2572 csrss.exe 96 PID 2572 wrote to memory of 1656 2572 csrss.exe 96 PID 2572 wrote to memory of 2576 2572 csrss.exe 102 PID 2572 wrote to memory of 2576 2572 csrss.exe 102 PID 2572 wrote to memory of 2576 2572 csrss.exe 102 PID 2572 wrote to memory of 3348 2572 csrss.exe 104 PID 2572 wrote to memory of 3348 2572 csrss.exe 104 PID 2572 wrote to memory of 3348 2572 csrss.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe"C:\Users\Admin\AppData\Local\Temp\ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe"C:\Users\Admin\AppData\Local\Temp\ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4588
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:804
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1232
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:1512
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2384
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:3944
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:4112
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3740
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56c72e692a84ef9e8b7a6d59233257eca
SHA14f91fd47d3466c88c7034d59817c96542d7ebf59
SHA256064ee408f84641500799ec99738426ea6fc2d92c603eeb9eea9a2ff968672ba6
SHA5125e723fc73b532c1ee0bb90a28089f2181519d02936e7cb2eb240cbb28e5111bed04bdd9218d4784b0ea4f73cd4845daf5a958d5cdc4eb413e4434cc1748badeb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56ce0b901e6d02116dd804ab25b205e1a
SHA10fdb4d48fbe82fe382a14163a30bd39c7934c855
SHA256610c23a6079d5beac4096aacd26feee2acb7738cbf873523edd73781e6a87b18
SHA51212e7dc7e84cec7ed7378cb74443f0a6e00b2c488b843904e76819e0eba50fb4c7f26770e3095a91588c53ef69d571a4dc083fe2f3a4c2e14dc3170802de3d760
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5517dc99b91b0d1a90d02decc95669b6c
SHA122a23f47a683d2edde86448175f7063da88e4ca5
SHA256fb378f2a2fd6a1082e3afc6c41d926c9897d5a3e0ef167527f2daac070c98b21
SHA5120ed9a0b32d4255fa220d5510a737861feacd46607b5fc28992174d011e34deab7611e50c1cc093b05131eb0e50d38aa4670001e5cde7ca159215859bc643e34d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD522765d5cb178028af0090b7a086db093
SHA18af0bd521f3bf188c15be949d0e407831b8367d5
SHA2560dcdfc8004886a3fcceb840409e597c25842e65111095cb1819814613a2e1236
SHA512536cbb6ba883a0063d5f5e6364d6eac4e224b898aae67a5c69eb134829f929e406d0a580dde77191918a64c2474a390ec0f64aadf69e8c3b6500f2e834805366
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e3398e90fc7c12bdd3a18fc297fff2d7
SHA1ac9448c527d0d1684bf9ab1291c6234f47ec9343
SHA2563736f2bb92867b2e89aa3b6ed5d488f69f56fedda85e979de4ecfef5257536e7
SHA5127fdbaf2fb1c92fc4c531a807a47e3c8f362a91ac76804c473525aafb6e0e7ea6d9de743a2d14b51b9b71240c580892803217596784a9dd60514df30646463552
-
Filesize
4.1MB
MD58af9bd8e585788333de4a08052840441
SHA15dcd65fdc2d68d203d7e8d576be6dfba44ec31fa
SHA256ab482b36b4e2bdf8e017fd33d0be43e1e0aa1ea3eb82894870aeb166627259f7
SHA512e7cf6ef133d970407c9debaf7ce53e44572a3dae5c2b9f3c6c101cf7d0c5b447733ba7ce9a5a91a69b1c40c3fbfcf4d2578b75fae8ff76868a2fdb145ba66ac1
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec