Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe
Resource
win10v2004-20240426-en
General
-
Target
9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe
-
Size
4.1MB
-
MD5
3cce795e25374d5bd995345af924f438
-
SHA1
ec7bc8aaac66ca8a72d808fdb21c340bf53731ac
-
SHA256
9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce
-
SHA512
e7d0bd2f1fdfe67edb79a63cb3ee488c8bc3910a49d0d185f4ad9a92ace6b0b034f28a868cdfe6968c0538db78c238ce1d8f92c812a429f6d9a98427de9d492d
-
SSDEEP
98304:guOdAWE/bfbxbxBimum48oJjLrUZhWcgWy75MTps2CObMUZCzBSs:guOpIddBi3V8Ojm7gWylM939CF
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2748-2-0x0000000004830000-0x000000000511B000-memory.dmp family_glupteba behavioral1/memory/2748-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4528-130-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/2748-155-0x0000000004830000-0x000000000511B000-memory.dmp family_glupteba behavioral1/memory/2748-153-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/2748-212-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/5012-214-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-225-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-228-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-231-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-234-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-237-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-240-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-243-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-246-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-249-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-252-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-255-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba behavioral1/memory/5012-258-0x0000000000400000-0x000000000273B000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 2412 netsh.exe -
Executes dropped EXE 4 IoCs
Processes:
csrss.exeinjector.exewindefender.exewindefender.exepid Process 5012 csrss.exe 4516 injector.exe 3828 windefender.exe 1216 windefender.exe -
Processes:
resource yara_rule behavioral1/memory/3828-219-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1216-222-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3828-223-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/files/0x0008000000023486-220.dat upx behavioral1/memory/1216-226-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1216-232-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.execsrss.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe -
Drops file in Windows directory 4 IoCs
Processes:
9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.execsrss.exedescription ioc Process File opened for modification C:\Windows\rss 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe File created C:\Windows\rss\csrss.exe 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 1744 sc.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2232 powershell.exe 4912 powershell.exe 2472 powershell.exe 2284 powershell.exe 3848 powershell.exe 4936 powershell.exe 4532 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 2856 schtasks.exe 2404 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exewindefender.exe9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2891 = "Sudan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2792 = "Novosibirsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exepowershell.exe9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid Process 4912 powershell.exe 4912 powershell.exe 2748 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 2748 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 2472 powershell.exe 2472 powershell.exe 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 2284 powershell.exe 2284 powershell.exe 3848 powershell.exe 3848 powershell.exe 3848 powershell.exe 4936 powershell.exe 4936 powershell.exe 4936 powershell.exe 4532 powershell.exe 4532 powershell.exe 2232 powershell.exe 2232 powershell.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 5012 csrss.exe 5012 csrss.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 5012 csrss.exe 5012 csrss.exe 4516 injector.exe 4516 injector.exe 5012 csrss.exe 5012 csrss.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe 4516 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exe9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid Process Token: SeDebugPrivilege 4912 powershell.exe Token: SeDebugPrivilege 2748 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Token: SeImpersonatePrivilege 2748 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 3848 powershell.exe Token: SeDebugPrivilege 4936 powershell.exe Token: SeDebugPrivilege 4532 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeSystemEnvironmentPrivilege 5012 csrss.exe Token: SeSecurityPrivilege 1744 sc.exe Token: SeSecurityPrivilege 1744 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.execmd.execsrss.exewindefender.execmd.exedescription pid Process procid_target PID 2748 wrote to memory of 4912 2748 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 126 PID 2748 wrote to memory of 4912 2748 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 126 PID 2748 wrote to memory of 4912 2748 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 126 PID 4528 wrote to memory of 2472 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 95 PID 4528 wrote to memory of 2472 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 95 PID 4528 wrote to memory of 2472 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 95 PID 4528 wrote to memory of 3832 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 97 PID 4528 wrote to memory of 3832 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 97 PID 3832 wrote to memory of 2412 3832 cmd.exe 99 PID 3832 wrote to memory of 2412 3832 cmd.exe 99 PID 4528 wrote to memory of 2284 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 100 PID 4528 wrote to memory of 2284 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 100 PID 4528 wrote to memory of 2284 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 100 PID 4528 wrote to memory of 3848 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 104 PID 4528 wrote to memory of 3848 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 104 PID 4528 wrote to memory of 3848 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 104 PID 4528 wrote to memory of 5012 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 106 PID 4528 wrote to memory of 5012 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 106 PID 4528 wrote to memory of 5012 4528 9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe 106 PID 5012 wrote to memory of 4936 5012 csrss.exe 107 PID 5012 wrote to memory of 4936 5012 csrss.exe 107 PID 5012 wrote to memory of 4936 5012 csrss.exe 107 PID 5012 wrote to memory of 4532 5012 csrss.exe 112 PID 5012 wrote to memory of 4532 5012 csrss.exe 112 PID 5012 wrote to memory of 4532 5012 csrss.exe 112 PID 5012 wrote to memory of 2232 5012 csrss.exe 115 PID 5012 wrote to memory of 2232 5012 csrss.exe 115 PID 5012 wrote to memory of 2232 5012 csrss.exe 115 PID 5012 wrote to memory of 4516 5012 csrss.exe 117 PID 5012 wrote to memory of 4516 5012 csrss.exe 117 PID 3828 wrote to memory of 1152 3828 windefender.exe 123 PID 3828 wrote to memory of 1152 3828 windefender.exe 123 PID 3828 wrote to memory of 1152 3828 windefender.exe 123 PID 1152 wrote to memory of 1744 1152 cmd.exe 124 PID 1152 wrote to memory of 1744 1152 cmd.exe 124 PID 1152 wrote to memory of 1744 1152 cmd.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe"C:\Users\Admin\AppData\Local\Temp\9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe"C:\Users\Admin\AppData\Local\Temp\9e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2412
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2856
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:5008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2404
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1216
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv 3PWuLKO8hEmzg/NoLhlZXw.0.21⤵PID:4912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD574dc1ec9611da090c61d92172a9f678b
SHA1724a8dc23ab7bf105e3e38afd17bdc6ba7d01154
SHA2568625c2cbaea8b28f831253f07aa8719348a260138c7d070262c00e8d65033b62
SHA512f86c09565d2e4adf266945f586b0edf0f716189094058ab93c4fbb963628d4611d91c0790828f3796467aefb7eb007396ed60c6bb8e65fe2bdc7159ed0155b97
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e96d440051c153fb382ac5e110d65443
SHA106fe4d7133fcf913d990f13a7576571c50d5b601
SHA256e68bc218e1f6957c287ac5ceb6ead4a76d811e6c6c81650a6a11f785713a79ec
SHA5127a40cc87fa45c73285f27f2de237ec3206f232575704fe0a3034be9a58229ff63fb61a14846ee52d7d3e10e99463c1fc9ae26316fd94501ac33267d6a35dc55c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD596dfd985b8e1b91402aa9f17aac4dd6d
SHA1633cdd82a1fb95536ef494c09b6ba8d8ad801c33
SHA256e20347ffa1169a32db220a51a8ab6f4f3d008541b44fdd1f5121bb0f47100478
SHA512ca249787ce182f2a6abf35ec52a2a022f8f16e44164d36aa1c8691e419a8c420dfdadad8911a9f62ecada44f293c5fced91325efe949c01bd0b1afbed23f72fc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD515f98ec915f5b83d2c05c7a4de15e37b
SHA195953317e444214652c25d5f45b45df80aa53685
SHA2564bbc0b9ba815f9c84fa1f2990de23ffa20b05a8e0c2a75de978c783421526483
SHA512ef2261318ee66c38b1ae31b2e03e20dab3015505a4453f2418dade3e60fe4ae541a85f028dec37e45dd4c04ddeb0c42a0e37afaf0fd4e306a97e2be6e366a723
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50c633478fb6d828c5d8612a1ed12eb9f
SHA13757d546cd987360135b54ff1bafc771b4a306ec
SHA2567f87f60b9f9322637e032441881e21b6727f17fe34ba8d12776c2e4fe7a60202
SHA51248c52b6824ae8e889fdc260643d2cb0112b1965b5d894f7b5e170a23cc0e679dec0702f64dfd0b302b79c3fd01897c77ca9785207111f23a7f22cb600416f3d9
-
Filesize
4.1MB
MD53cce795e25374d5bd995345af924f438
SHA1ec7bc8aaac66ca8a72d808fdb21c340bf53731ac
SHA2569e670fbf651d07c8467a0c4e3ae1b029c0c397536050bbb8af1e21f0a421efce
SHA512e7d0bd2f1fdfe67edb79a63cb3ee488c8bc3910a49d0d185f4ad9a92ace6b0b034f28a868cdfe6968c0538db78c238ce1d8f92c812a429f6d9a98427de9d492d
-
Filesize
3.6MB
MD5fa82e23533c55903a7bf009ea34ed6f9
SHA1f4cd0be48be47970eec66eea0422bf54d06e9883
SHA256fc067e5f2b51440d7e440010379a344bf5c94e7f3b61de7c19d9550285164673
SHA5128e875905e4069932028771c3b4575c852637ee647ee60673f618afd99e0c4e86619bb9a30999508a85400b7d40913b0a678c1b06e365233c9d613f03d5284f3b
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec