Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe
Resource
win10v2004-20240426-en
General
-
Target
81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe
-
Size
4.1MB
-
MD5
cb6a29e08314289f9331972b48abf960
-
SHA1
44fab7c4febffeed8f0a677fbfed75f0fa941db2
-
SHA256
81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e
-
SHA512
06ccc47678e0a177ef0a395113327420c8f9638a07682913d9d9835ab1acccd3c4e2d51515d3441e3bf4d75f6f38e2a8f2435026ebb7dd53cc929998fca8a7c2
-
SSDEEP
98304:Wk/C6baF9NNXYvR+SQPyohxfWe3/GY9pAEj6j:Wn6bazjovoyoHfX3/GYHk
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/3584-2-0x0000000004500000-0x0000000004DEB000-memory.dmp family_glupteba behavioral1/memory/3584-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3584-47-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3584-48-0x0000000004500000-0x0000000004DEB000-memory.dmp family_glupteba behavioral1/memory/3584-46-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3352-131-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-214-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-223-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-225-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-227-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-229-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-231-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-233-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-235-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-237-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-239-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-241-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-243-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral1/memory/3036-245-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3592 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 3036 csrss.exe 3920 injector.exe 1360 windefender.exe 404 windefender.exe -
resource yara_rule behavioral1/files/0x000800000002342b-217.dat upx behavioral1/memory/1360-218-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/404-222-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1360-221-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/404-224-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/404-228-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1880 sc.exe -
pid Process 3252 powershell.exe 4844 powershell.exe 4300 powershell.exe 400 powershell.exe 2680 powershell.exe 2468 powershell.exe 516 powershell.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3116 516 WerFault.exe 85 1836 3584 WerFault.exe 81 1284 3352 WerFault.exe 93 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4340 schtasks.exe 3536 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-365 = "Middle East Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 powershell.exe 516 powershell.exe 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3252 powershell.exe 3252 powershell.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 4844 powershell.exe 4844 powershell.exe 4300 powershell.exe 4300 powershell.exe 400 powershell.exe 400 powershell.exe 2680 powershell.exe 2680 powershell.exe 2468 powershell.exe 2468 powershell.exe 2468 powershell.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3036 csrss.exe 3036 csrss.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3036 csrss.exe 3036 csrss.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3036 csrss.exe 3036 csrss.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe 3920 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 516 powershell.exe Token: SeDebugPrivilege 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Token: SeImpersonatePrivilege 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe Token: SeDebugPrivilege 3252 powershell.exe Token: SeDebugPrivilege 4844 powershell.exe Token: SeDebugPrivilege 4300 powershell.exe Token: SeDebugPrivilege 400 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2468 powershell.exe Token: SeSystemEnvironmentPrivilege 3036 csrss.exe Token: SeSecurityPrivilege 1880 sc.exe Token: SeSecurityPrivilege 1880 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3584 wrote to memory of 516 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 85 PID 3584 wrote to memory of 516 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 85 PID 3584 wrote to memory of 516 3584 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 85 PID 3352 wrote to memory of 3252 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 96 PID 3352 wrote to memory of 3252 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 96 PID 3352 wrote to memory of 3252 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 96 PID 3352 wrote to memory of 2496 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 98 PID 3352 wrote to memory of 2496 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 98 PID 2496 wrote to memory of 3592 2496 cmd.exe 100 PID 2496 wrote to memory of 3592 2496 cmd.exe 100 PID 3352 wrote to memory of 4844 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 101 PID 3352 wrote to memory of 4844 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 101 PID 3352 wrote to memory of 4844 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 101 PID 3352 wrote to memory of 4300 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 105 PID 3352 wrote to memory of 4300 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 105 PID 3352 wrote to memory of 4300 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 105 PID 3352 wrote to memory of 3036 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 108 PID 3352 wrote to memory of 3036 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 108 PID 3352 wrote to memory of 3036 3352 81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe 108 PID 3036 wrote to memory of 400 3036 csrss.exe 111 PID 3036 wrote to memory of 400 3036 csrss.exe 111 PID 3036 wrote to memory of 400 3036 csrss.exe 111 PID 3036 wrote to memory of 2680 3036 csrss.exe 117 PID 3036 wrote to memory of 2680 3036 csrss.exe 117 PID 3036 wrote to memory of 2680 3036 csrss.exe 117 PID 3036 wrote to memory of 2468 3036 csrss.exe 121 PID 3036 wrote to memory of 2468 3036 csrss.exe 121 PID 3036 wrote to memory of 2468 3036 csrss.exe 121 PID 3036 wrote to memory of 3920 3036 csrss.exe 123 PID 3036 wrote to memory of 3920 3036 csrss.exe 123 PID 1360 wrote to memory of 4728 1360 windefender.exe 129 PID 1360 wrote to memory of 4728 1360 windefender.exe 129 PID 1360 wrote to memory of 4728 1360 windefender.exe 129 PID 4728 wrote to memory of 1880 4728 cmd.exe 130 PID 4728 wrote to memory of 1880 4728 cmd.exe 130 PID 4728 wrote to memory of 1880 4728 cmd.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe"C:\Users\Admin\AppData\Local\Temp\81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 24923⤵
- Program crash
PID:3116
-
-
-
C:\Users\Admin\AppData\Local\Temp\81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe"C:\Users\Admin\AppData\Local\Temp\81ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3592
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4340
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3536
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 7403⤵
- Program crash
PID:1284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 6322⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 516 -ip 5161⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3584 -ip 35841⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3352 -ip 33521⤵PID:4904
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD587e6c62647bfe0381498754e60cb02ea
SHA1bb7b98fc66bb73f23b2262c4962fc90a798b9257
SHA256641e0c3b978326b07a56d98f137737f713dddae57bb8b8a433ea553bf6e14053
SHA5129858af1e21d3e3a7cac2d43404bc9a5fa078c002f44ffa44a8a696e8c68ddaac5e144f475a2ed5a1cf16ba0900c0f93c618269e1a5a88a4de05e42b70c79a5c8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e4a892d299f4ef084ebd65eed57ab078
SHA1124e3575928154dca0339daf1f6eafd699a397ad
SHA256ce2119396c1a9577f55b2cffd6e4bb1456b1fe819ec59e71d00c435138c7d295
SHA512518f5e52886dfbbf67eb58009332f633815a73998681f952d257a4624f5201a8343384ae54994ffe9574f26ba4ebd7915f52dca66ea6ba70c9f0781c50e0e41b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b3e54ed320793b1dcbdf870cab196480
SHA1db61794d118f8b5662888488cefd4df90fdb7efe
SHA2567d767eb32248e1b09be726d630c048a93b993314437aa5684282b6cd670f3c82
SHA512a37e58405432345e32cfe59ac17e368dec4c21dd47c19787fbbbc3ef5055ad6789f4b5f37a710fd6c9e575568059f7bf34b97134c5d3d312290c31aac768ab7a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50f4b6302d707fe2c973955b850e5a6e7
SHA1bc00c3966b3ab1f31c03129f6b227692e48ead60
SHA256b56bd5d22732cc2d97d7618cba71f15a9268a473d92bdc2734be7dd3fbc039f0
SHA512b1385b30d1ac89acaea4e5345461426416520a1390f6bf537afbacbfe139517a343fb98f3b717a06d5387c008954d58d3cb0e10ec467c6c6ebc5dbb64a3e4957
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d995aa2f469ad85aef68747aeba04449
SHA131543613b2247dbe4ae59cc69072d5318b8190cc
SHA256d7ab761690bae521fed0ab31043177111c237e4a48c3cb723f7b60b8dede5a35
SHA512b7b90be1e811569acba22218f0e8c31f33fc736ab1eaba43e82a4251f10c4a57f945ca9ee412f50289f7e58abff3a17d5161858d796378cf5b10b7b94027d76d
-
Filesize
4.1MB
MD5cb6a29e08314289f9331972b48abf960
SHA144fab7c4febffeed8f0a677fbfed75f0fa941db2
SHA25681ea76eb362accf3cf44a9320fecd2e8c473c6b3b6ff570bc938ff663012fb4e
SHA51206ccc47678e0a177ef0a395113327420c8f9638a07682913d9d9835ab1acccd3c4e2d51515d3441e3bf4d75f6f38e2a8f2435026ebb7dd53cc929998fca8a7c2
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec