Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 09:00
Static task
static1
Behavioral task
behavioral1
Sample
5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe
Resource
win7-20240508-en
General
-
Target
5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe
-
Size
4.1MB
-
MD5
983f78a4179867e5818b73db3e5e8b1d
-
SHA1
aeeaa70a50f085930e3a5f6dbc381b199282fa15
-
SHA256
5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d
-
SHA512
3e47961b20fba86879f682a63aa75ae9e008a80663421e490c1aafe0d806a8c8e978eed92c4b2103803fd4193d6bf81427046ec014c2ee7f7e86cc2e08e8c2f6
-
SSDEEP
98304:gvCQaDBnSWO/B+XxjapSyZlG1PnsYHdaWgIg92gsnC3bzMZh6P1+:gvC3DFSWO/BjYGk1PnXHoWWZ1za6N+
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/2892-2-0x0000000004650000-0x0000000004F3B000-memory.dmp family_glupteba behavioral2/memory/2892-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2892-57-0x0000000004650000-0x0000000004F3B000-memory.dmp family_glupteba behavioral2/memory/2892-55-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2892-56-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3884-134-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-219-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-220-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-221-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-222-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-223-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-224-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-225-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-226-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-227-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-228-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-229-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-230-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba behavioral2/memory/2108-231-0x0000000000400000-0x0000000002365000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3292 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2108 csrss.exe 812 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe File created C:\Windows\rss\csrss.exe 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe -
pid Process 1444 powershell.exe 1492 powershell.exe 812 powershell.exe 2556 powershell.exe 2988 powershell.exe 3832 powershell.exe 2028 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 664 2892 WerFault.exe 84 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3668 schtasks.exe 3164 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1444 powershell.exe 1444 powershell.exe 2892 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 2892 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 1492 powershell.exe 1492 powershell.exe 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 812 powershell.exe 812 powershell.exe 2556 powershell.exe 2556 powershell.exe 2988 powershell.exe 2988 powershell.exe 3832 powershell.exe 3832 powershell.exe 2028 powershell.exe 2028 powershell.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 2108 csrss.exe 2108 csrss.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 2108 csrss.exe 2108 csrss.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe 812 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1444 powershell.exe Token: SeDebugPrivilege 2892 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Token: SeImpersonatePrivilege 2892 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe Token: SeDebugPrivilege 1492 powershell.exe Token: SeDebugPrivilege 812 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 2988 powershell.exe Token: SeDebugPrivilege 3832 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeSystemEnvironmentPrivilege 2108 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2892 wrote to memory of 1444 2892 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 87 PID 2892 wrote to memory of 1444 2892 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 87 PID 2892 wrote to memory of 1444 2892 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 87 PID 3884 wrote to memory of 1492 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 100 PID 3884 wrote to memory of 1492 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 100 PID 3884 wrote to memory of 1492 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 100 PID 3884 wrote to memory of 4856 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 104 PID 3884 wrote to memory of 4856 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 104 PID 4856 wrote to memory of 3292 4856 cmd.exe 106 PID 4856 wrote to memory of 3292 4856 cmd.exe 106 PID 3884 wrote to memory of 812 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 107 PID 3884 wrote to memory of 812 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 107 PID 3884 wrote to memory of 812 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 107 PID 3884 wrote to memory of 2556 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 109 PID 3884 wrote to memory of 2556 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 109 PID 3884 wrote to memory of 2556 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 109 PID 3884 wrote to memory of 2108 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 111 PID 3884 wrote to memory of 2108 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 111 PID 3884 wrote to memory of 2108 3884 5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe 111 PID 2108 wrote to memory of 2988 2108 csrss.exe 112 PID 2108 wrote to memory of 2988 2108 csrss.exe 112 PID 2108 wrote to memory of 2988 2108 csrss.exe 112 PID 2108 wrote to memory of 3832 2108 csrss.exe 117 PID 2108 wrote to memory of 3832 2108 csrss.exe 117 PID 2108 wrote to memory of 3832 2108 csrss.exe 117 PID 2108 wrote to memory of 2028 2108 csrss.exe 120 PID 2108 wrote to memory of 2028 2108 csrss.exe 120 PID 2108 wrote to memory of 2028 2108 csrss.exe 120 PID 2108 wrote to memory of 812 2108 csrss.exe 122 PID 2108 wrote to memory of 812 2108 csrss.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe"C:\Users\Admin\AppData\Local\Temp\5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe"C:\Users\Admin\AppData\Local\Temp\5469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3292
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3668
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4500
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:812
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3164
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 8322⤵
- Program crash
PID:664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2892 -ip 28921⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD521f5ccb90761e10e8520d4c69980cbc4
SHA1ae1da0b0878cdcc67e4d25af5302768dff20d428
SHA25618c3fd725843a61815ffc62d435890110dad5ce47cfa2258c5af3769dc768ce4
SHA512689342ab69f5a15d69838e6bbe82e24915ecdbe717c167865fa9194d97b28f0153b8f77a992a599de48aa5e3a927fbbd384ed8c2ff6fe9fe5dc37ca9534c7597
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5441aac0f4dd39c20e3f459144c8624ba
SHA1284d125ffef645586ad86fcec818e0bed9f84b89
SHA2563e7b3d2f746c8679e837b68d810155c4785a0f2594629d3d84bb6d3c1e4ad985
SHA5124269f1eb6708ce150e607e43b4e057d5191f4c944790d9317f3dbadfb7480a89508932086d6fd96bd508729ced33f610822d11dff45c9bd9c2efdb3112fce01a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a2875e128f75ed4f6bea47e0ac4825d0
SHA1840a45c164d38a6d9430a498e885c7bad75b7515
SHA256b2d847e8a8b9b17c1158376c5331a17ac4ff371c066ed04184b53832e87177ee
SHA5129eae37a2a24e9bbb9d4ef5c65b780fc86ac4dab27a1a41d7f349347cc6fdd52624a08ca234b548626d9de53cce0923d5848c7b77e65bb7d8f28cc35c0ceff09e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b504145947e6f1655bb7df65dd97e727
SHA193bbe7d747d24f34bf2f3b42812d5c319b5148c6
SHA256f95457665c099ba062c2604157a5dabc39994cad8d7283d91259fc8578f537ee
SHA512833c8755317e335bcd5c13430f6c95e245d3411017c28479835b9084780ce93c18ce2b6c25abc4863d90a40a3b98c488490ef6f92e16eb5f7a74e5206a90448d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD519ec5c0628f5846d234dea2a05032f43
SHA1c22fd6caee88dcb5c5ba6467cd988582aba67c31
SHA256c8590ac2f4d467ada86855e257ba170e99f2848b434844becc9a659d6d089f2e
SHA5124207d6810add0842af0fe403c849b5770d27e51d8f4eca7ab2361452d2cc908078bec4d7d443ff7d29f0e38a4381ab7db17e131b5a344eb0bffbe5bb445f0478
-
Filesize
4.1MB
MD5983f78a4179867e5818b73db3e5e8b1d
SHA1aeeaa70a50f085930e3a5f6dbc381b199282fa15
SHA2565469493967b62a9d55e0e0f7895df32d37e909aa77a7ca7ec6bade23c17b649d
SHA5123e47961b20fba86879f682a63aa75ae9e008a80663421e490c1aafe0d806a8c8e978eed92c4b2103803fd4193d6bf81427046ec014c2ee7f7e86cc2e08e8c2f6