Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-05-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe
Resource
win10v2004-20240508-en
General
-
Target
5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe
-
Size
4.1MB
-
MD5
983f78a4179867e5818b73db3e5e8b1d
-
SHA1
aeeaa70a50f085930e3a5f6dbc381b199282fa15
-
SHA256
5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d
-
SHA512
3e47961b20fba86879f682a63aa75ae9e008a80663421e490c1aafe0d806a8c8e978eed92c4b2103803fd4193d6bf81427046ec014c2ee7f7e86cc2e08e8c2f6
-
SSDEEP
98304:gvCQaDBnSWO/B+XxjapSyZlG1PnsYHdaWgIg92gsnC3bzMZh6P1+:gvC3DFSWO/BjYGk1PnXHoWWZ1za6N+
Malware Config
Signatures
-
Glupteba payload 20 IoCs
resource yara_rule behavioral2/memory/4904-2-0x0000000004570000-0x0000000004E5B000-memory.dmp family_glupteba behavioral2/memory/4904-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4904-53-0x0000000004570000-0x0000000004E5B000-memory.dmp family_glupteba behavioral2/memory/4904-54-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4904-51-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2064-121-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2064-128-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-199-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-206-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-207-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-208-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-209-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-210-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-211-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-212-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-213-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-214-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-215-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-216-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/5096-217-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1016 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 5096 csrss.exe 1880 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe File created C:\Windows\rss\csrss.exe 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe -
pid Process 3192 powershell.exe 1596 powershell.exe 344 powershell.exe 1076 powershell.exe 440 powershell.exe 4116 powershell.exe 500 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1020 schtasks.exe 4044 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4116 powershell.exe 4116 powershell.exe 4904 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 4904 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 500 powershell.exe 500 powershell.exe 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 3192 powershell.exe 3192 powershell.exe 1596 powershell.exe 1596 powershell.exe 344 powershell.exe 344 powershell.exe 1076 powershell.exe 1076 powershell.exe 440 powershell.exe 440 powershell.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 5096 csrss.exe 5096 csrss.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 5096 csrss.exe 5096 csrss.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe 1880 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4116 powershell.exe Token: SeDebugPrivilege 4904 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Token: SeImpersonatePrivilege 4904 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Token: SeDebugPrivilege 500 powershell.exe Token: SeDebugPrivilege 3192 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 344 powershell.exe Token: SeDebugPrivilege 1076 powershell.exe Token: SeDebugPrivilege 440 powershell.exe Token: SeSystemEnvironmentPrivilege 5096 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4116 4904 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 81 PID 4904 wrote to memory of 4116 4904 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 81 PID 4904 wrote to memory of 4116 4904 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 81 PID 2064 wrote to memory of 500 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 87 PID 2064 wrote to memory of 500 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 87 PID 2064 wrote to memory of 500 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 87 PID 2064 wrote to memory of 3184 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 89 PID 2064 wrote to memory of 3184 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 89 PID 3184 wrote to memory of 1016 3184 cmd.exe 91 PID 3184 wrote to memory of 1016 3184 cmd.exe 91 PID 2064 wrote to memory of 3192 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 92 PID 2064 wrote to memory of 3192 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 92 PID 2064 wrote to memory of 3192 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 92 PID 2064 wrote to memory of 1596 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 94 PID 2064 wrote to memory of 1596 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 94 PID 2064 wrote to memory of 1596 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 94 PID 2064 wrote to memory of 5096 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 96 PID 2064 wrote to memory of 5096 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 96 PID 2064 wrote to memory of 5096 2064 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 96 PID 5096 wrote to memory of 344 5096 csrss.exe 97 PID 5096 wrote to memory of 344 5096 csrss.exe 97 PID 5096 wrote to memory of 344 5096 csrss.exe 97 PID 5096 wrote to memory of 1076 5096 csrss.exe 103 PID 5096 wrote to memory of 1076 5096 csrss.exe 103 PID 5096 wrote to memory of 1076 5096 csrss.exe 103 PID 5096 wrote to memory of 440 5096 csrss.exe 105 PID 5096 wrote to memory of 440 5096 csrss.exe 105 PID 5096 wrote to memory of 440 5096 csrss.exe 105 PID 5096 wrote to memory of 1880 5096 csrss.exe 107 PID 5096 wrote to memory of 1880 5096 csrss.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe"C:\Users\Admin\AppData\Local\Temp\5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe"C:\Users\Admin\AppData\Local\Temp\5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:500
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1016
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:344
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1020
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2380
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5566b086a7a357dd6d0dbd0361a510534
SHA16c35a232fc839a02cf9ead01899199e649dcfbce
SHA2563ac085c68584b64f5547aed904e1cd7e72c85b55e6ecccf0ce61a365347da868
SHA5123fdd2608ab47f9a4d54c7873f9663347f9598329e9e532780753b38ac89eee5754f3b80a219b4f03fda22b463550fad900ba90c941dfe029f425c1deafab01e4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5781c6dc0ba994f0236a5ec2e9d50845a
SHA1c1853a6c1f8abb3e2d9df156f7f219d3a9792a3c
SHA25644623fbcc5c0dade42d13d74856004d7439e7717355b27751ad0f4abcc24be29
SHA512d51d5aed5c0914ef3e31e0b4e0bd780fa21df90bc96660148f0d98e49db875a5e9811e11a8fb7bf397b0d22b9957c3f8f375358d85e65e484d311b5d0278c997
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50a6ff9033c2451c4e42cce0d6e465544
SHA11e70975a502a0b685347368838e8a5fd13f9d47c
SHA25625e840a1eae677b73f8a30d937ce9f773636df24128c90b20f8d459ca75e7b76
SHA512d0feb143770e110b584206890fcc4ac852231030b107603959831d3088182831b45f5830b80a9c441a40292b92b627f9d54acaed73c5827ca9e90911d36e3a1b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50fa8a00f4202005c5e6e9cc463256888
SHA1059104e81f867b18fd7757cfc9a49dfe7924451d
SHA2562dda3bf8ab0232c0210310b64eb23a1569fbe7a6d9847e7858965a6cb2c7e3a1
SHA512e334ca7d51fa1930d783311ae9b8276294be5e793b9c6991c76de7231e5e903fdbc4cd45c17eb9adf2a155b958508f1b68ee62e26eee3ce2adb0d7a6ef570e0a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57f5649da685877e1e9c4f9b00e10eb9d
SHA10245a61cb2ef0af96c24f4181531a53214e376bf
SHA2569eb140295ef543f2b74ba9486c335b30b32d280b46fa153448ac1877d831c3e4
SHA51206e0741a6884a713a2d081978a38a9e293abb369ca89d22582e15c5d4afce7ca5b446c9e52e2bbc6def777f76ccda4b131657c7e97eacd7cb99766c6bcd14942
-
Filesize
4.1MB
MD5983f78a4179867e5818b73db3e5e8b1d
SHA1aeeaa70a50f085930e3a5f6dbc381b199282fa15
SHA2565469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d
SHA5123e47961b20fba86879f682a63aa75ae9e008a80663421e490c1aafe0d806a8c8e978eed92c4b2103803fd4193d6bf81427046ec014c2ee7f7e86cc2e08e8c2f6