Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-05-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe
Resource
win10v2004-20240426-en
General
-
Target
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe
-
Size
4.1MB
-
MD5
3fe8a86a21840c87b9b1e2a74100f002
-
SHA1
833bf15d82cd4cf215173ccae45e1e47eeaeefef
-
SHA256
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3
-
SHA512
a89e132b02eec6a99060c3a1a20e26418e6e25f11cc9240d3bda5beb2572fd485129cbda7261f271de3f7bcfa0b0605a7bbaf83f9c06fc91e0a9b0692969995b
-
SSDEEP
98304:Ok/C6baF9NNXYvR+SQPyohxfWe3/GY9pAEj69:On6bazjovoyoHfX3/GYHK
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/1608-2-0x0000000004640000-0x0000000004F2B000-memory.dmp family_glupteba behavioral2/memory/1608-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1608-52-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1608-54-0x0000000004640000-0x0000000004F2B000-memory.dmp family_glupteba behavioral2/memory/1608-51-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/384-125-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-204-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-214-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-216-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-218-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-220-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-222-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-224-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-226-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-228-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-230-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-232-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-234-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/1824-236-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 2260 netsh.exe -
Executes dropped EXE 4 IoCs
Processes:
csrss.exeinjector.exewindefender.exewindefender.exepid Process 1824 csrss.exe 1624 injector.exe 4612 windefender.exe 1788 windefender.exe -
Processes:
resource yara_rule behavioral2/files/0x000300000002aa31-207.dat upx behavioral2/memory/4612-208-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1788-211-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4612-213-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1788-215-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1788-219-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.execsrss.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe -
Drops file in Windows directory 4 IoCs
Processes:
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.execsrss.exedescription ioc Process File opened for modification C:\Windows\rss 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe File created C:\Windows\rss\csrss.exe 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 1560 sc.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2852 powershell.exe 792 powershell.exe 2852 powershell.exe 704 powershell.exe 1384 powershell.exe 3528 powershell.exe 3564 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 3720 schtasks.exe 3996 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exepowershell.exepowershell.exewindefender.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-671 = "AUS Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2391 = "Aleutian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-741 = "New Zealand Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-335 = "Jordan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-491 = "India Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exepowershell.exe985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid Process 792 powershell.exe 792 powershell.exe 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 2852 powershell.exe 2852 powershell.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 704 powershell.exe 704 powershell.exe 1384 powershell.exe 1384 powershell.exe 3528 powershell.exe 3528 powershell.exe 3564 powershell.exe 3564 powershell.exe 2852 powershell.exe 2852 powershell.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1824 csrss.exe 1824 csrss.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1824 csrss.exe 1824 csrss.exe 1624 injector.exe 1624 injector.exe 1824 csrss.exe 1824 csrss.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe 1624 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exe985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid Process Token: SeDebugPrivilege 792 powershell.exe Token: SeDebugPrivilege 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Token: SeImpersonatePrivilege 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 704 powershell.exe Token: SeDebugPrivilege 1384 powershell.exe Token: SeDebugPrivilege 3528 powershell.exe Token: SeDebugPrivilege 3564 powershell.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeSystemEnvironmentPrivilege 1824 csrss.exe Token: SeSecurityPrivilege 1560 sc.exe Token: SeSecurityPrivilege 1560 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.execmd.execsrss.exewindefender.execmd.exedescription pid Process procid_target PID 1608 wrote to memory of 792 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 82 PID 1608 wrote to memory of 792 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 82 PID 1608 wrote to memory of 792 1608 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 82 PID 384 wrote to memory of 2852 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 89 PID 384 wrote to memory of 2852 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 89 PID 384 wrote to memory of 2852 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 89 PID 384 wrote to memory of 1908 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 91 PID 384 wrote to memory of 1908 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 91 PID 1908 wrote to memory of 2260 1908 cmd.exe 93 PID 1908 wrote to memory of 2260 1908 cmd.exe 93 PID 384 wrote to memory of 704 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 95 PID 384 wrote to memory of 704 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 95 PID 384 wrote to memory of 704 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 95 PID 384 wrote to memory of 1384 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 98 PID 384 wrote to memory of 1384 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 98 PID 384 wrote to memory of 1384 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 98 PID 384 wrote to memory of 1824 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 101 PID 384 wrote to memory of 1824 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 101 PID 384 wrote to memory of 1824 384 985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe 101 PID 1824 wrote to memory of 3528 1824 csrss.exe 102 PID 1824 wrote to memory of 3528 1824 csrss.exe 102 PID 1824 wrote to memory of 3528 1824 csrss.exe 102 PID 1824 wrote to memory of 3564 1824 csrss.exe 107 PID 1824 wrote to memory of 3564 1824 csrss.exe 107 PID 1824 wrote to memory of 3564 1824 csrss.exe 107 PID 1824 wrote to memory of 2852 1824 csrss.exe 110 PID 1824 wrote to memory of 2852 1824 csrss.exe 110 PID 1824 wrote to memory of 2852 1824 csrss.exe 110 PID 1824 wrote to memory of 1624 1824 csrss.exe 112 PID 1824 wrote to memory of 1624 1824 csrss.exe 112 PID 4612 wrote to memory of 944 4612 windefender.exe 118 PID 4612 wrote to memory of 944 4612 windefender.exe 118 PID 4612 wrote to memory of 944 4612 windefender.exe 118 PID 944 wrote to memory of 1560 944 cmd.exe 119 PID 944 wrote to memory of 1560 944 cmd.exe 119 PID 944 wrote to memory of 1560 944 cmd.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe"C:\Users\Admin\AppData\Local\Temp\985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe"C:\Users\Admin\AppData\Local\Temp\985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2260
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3996
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2252
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3720
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1788
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5572d42411dfd0710be63b11029f4f5a0
SHA1646b588050eeb4d103840ab938a79a97da2b300e
SHA256803a078689f7f37df0f3085e1d11fe86275916e57305b66d58ba3ed32cd4c3b6
SHA51248f7510bf287f4f7fdf19c4f75e45587492361e68b7f6a8b7d6212b0984d91646fddc69d5a5598ee06314fdacb2252e488092c3e253b26f313c4c9718ebd9404
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD506180aa084f48df9d8cbd0c86428fd6e
SHA1b516a04a0766b70f4892c42dab73714802298d5d
SHA2565ef258e5cd55d3f6a39562ee3467446869b1043533fd71d73971aae37df41bed
SHA512edb20eb70dcb46d2b931da04283ea7621dd63a3dc25b1884886b43bc6da28592f4091119cd523d49f7c1b56cd562ebca5c1ad91f5ee4f7ae112049451e3b1a10
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52d43d4766397ae887c00d23266bf6f97
SHA1669884655c13f874453c2323b4b204554287e1e4
SHA25648709845a69ad79f5ce4807592cf3290516523ae84ca3d97675f38637c3b2458
SHA5121985c7948b379c97432c4cd67c81ea60aeb3bfc946665bc3f090cc2af49befa878b6bb50493be3fdafa54d8de9171b1b21efeca0d588ba1883843023a98f74fc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5821d42db5cd82bc82346962b543fe70f
SHA1154732914f2bd60fad5a0b71dedee18ca44178b7
SHA25669fa6cc5398b7d3facd6779a6f098544b9ca53f22818f7b1721740434130d3e8
SHA512c927fb4fbfbd444103d081aed77bdb13c48bec35efd04757a59c7ad129b65043ec392f12fca6140a0e65dc1ac47dfe189f95727cec0fb1892b75931a44450dfe
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57d1b46c52bc868aa13ee3f8229c33c0b
SHA18fbc819745efc2a5facfcc6f0d667db0c160d7fb
SHA256c8747dd104dc45ed30dbbdf83193d5cc4194c7084dbf7ca8626b1f6f0b838159
SHA512662cb4fb0bcc234357fef78e92a9b4ae0351bbd9f5ea83282a11922081ac5965cb0654bf0fbb261b46ed9dd0ebb66ee8a1f04bb57e896df8ecc94c87060add17
-
Filesize
4.1MB
MD53fe8a86a21840c87b9b1e2a74100f002
SHA1833bf15d82cd4cf215173ccae45e1e47eeaeefef
SHA256985b14d2d4f1957a7f68304759dd0a2e4445db2a2ed593ccb23d219d0532c9c3
SHA512a89e132b02eec6a99060c3a1a20e26418e6e25f11cc9240d3bda5beb2572fd485129cbda7261f271de3f7bcfa0b0605a7bbaf83f9c06fc91e0a9b0692969995b
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec