Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe
Resource
win10v2004-20240508-en
General
-
Target
225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe
-
Size
4.1MB
-
MD5
e2fd3f6c0c2dbc7067e3a4fd0431017a
-
SHA1
7f47fcfab1f58d6edf17f85e90452a60cfae6a1f
-
SHA256
225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898
-
SHA512
6ababb4a85e2a4bfdcb9d6da2e68b1446ce8f0c0352ecd3911667b9ae2f23df619c654f683d0b765ca55b5409d8ebbf726f66d432af5b4901cbecb93a80deddd
-
SSDEEP
98304:77sgfTqZm7fywQIpjGUn+cmloZHued8miXbTsPufBvNI:7zgmDywQg+foZ8mw6SO
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/208-2-0x0000000004810000-0x00000000050FB000-memory.dmp family_glupteba behavioral1/memory/208-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/208-93-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/208-129-0x0000000004810000-0x00000000050FB000-memory.dmp family_glupteba behavioral1/memory/4180-157-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/208-197-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3272-216-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-219-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-222-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-224-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-228-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-231-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-234-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-236-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-239-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-243-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-246-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-249-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/3272-251-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 3756 netsh.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid Process 3272 csrss.exe 520 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.execsrss.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe -
Drops file in Windows directory 2 IoCs
Processes:
225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exedescription ioc Process File opened for modification C:\Windows\rss 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe File created C:\Windows\rss\csrss.exe 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 3796 powershell.exe 1812 powershell.exe 3468 powershell.exe 4456 powershell.exe 1828 powershell.exe 4340 powershell.exe 3340 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 376 schtasks.exe 4708 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exepowershell.exedescription ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exepowershell.exe225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid Process 4456 powershell.exe 4456 powershell.exe 208 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 208 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 1828 powershell.exe 1828 powershell.exe 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 4340 powershell.exe 4340 powershell.exe 3340 powershell.exe 3340 powershell.exe 3340 powershell.exe 3796 powershell.exe 3796 powershell.exe 1812 powershell.exe 1812 powershell.exe 3468 powershell.exe 3468 powershell.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 3272 csrss.exe 3272 csrss.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 3272 csrss.exe 3272 csrss.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe 520 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exe225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exedescription pid Process Token: SeDebugPrivilege 4456 powershell.exe Token: SeDebugPrivilege 208 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Token: SeImpersonatePrivilege 208 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe Token: SeDebugPrivilege 1828 powershell.exe Token: SeDebugPrivilege 4340 powershell.exe Token: SeDebugPrivilege 3340 powershell.exe Token: SeDebugPrivilege 3796 powershell.exe Token: SeDebugPrivilege 1812 powershell.exe Token: SeDebugPrivilege 3468 powershell.exe Token: SeSystemEnvironmentPrivilege 3272 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.execmd.execsrss.exedescription pid Process procid_target PID 208 wrote to memory of 4456 208 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 84 PID 208 wrote to memory of 4456 208 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 84 PID 208 wrote to memory of 4456 208 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 84 PID 4180 wrote to memory of 1828 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 95 PID 4180 wrote to memory of 1828 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 95 PID 4180 wrote to memory of 1828 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 95 PID 4180 wrote to memory of 2008 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 100 PID 4180 wrote to memory of 2008 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 100 PID 2008 wrote to memory of 3756 2008 cmd.exe 102 PID 2008 wrote to memory of 3756 2008 cmd.exe 102 PID 4180 wrote to memory of 4340 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 104 PID 4180 wrote to memory of 4340 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 104 PID 4180 wrote to memory of 4340 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 104 PID 4180 wrote to memory of 3340 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 109 PID 4180 wrote to memory of 3340 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 109 PID 4180 wrote to memory of 3340 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 109 PID 4180 wrote to memory of 3272 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 111 PID 4180 wrote to memory of 3272 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 111 PID 4180 wrote to memory of 3272 4180 225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe 111 PID 3272 wrote to memory of 3796 3272 csrss.exe 112 PID 3272 wrote to memory of 3796 3272 csrss.exe 112 PID 3272 wrote to memory of 3796 3272 csrss.exe 112 PID 3272 wrote to memory of 1812 3272 csrss.exe 118 PID 3272 wrote to memory of 1812 3272 csrss.exe 118 PID 3272 wrote to memory of 1812 3272 csrss.exe 118 PID 3272 wrote to memory of 3468 3272 csrss.exe 120 PID 3272 wrote to memory of 3468 3272 csrss.exe 120 PID 3272 wrote to memory of 3468 3272 csrss.exe 120 PID 3272 wrote to memory of 520 3272 csrss.exe 122 PID 3272 wrote to memory of 520 3272 csrss.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe"C:\Users\Admin\AppData\Local\Temp\225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe"C:\Users\Admin\AppData\Local\Temp\225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3756
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:376
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4176
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:520
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4708
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ce0c75c03fd52ed60a730798a0d06bdb
SHA16b19c2c44bf3161d5ee842b752a65da8947a88fd
SHA256439d944925a02613326069ba63d20e5e1cc2c5f9896ba47141cc07d86988e323
SHA5126a8a299ed6bda3afe7389d00c4cbf5f81053542fa936f9546f3ee3e9b1ef67be174e5b32553a585f79d2902d24f0415c6eae26c264b6138ff060f5562eed59c5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD554e49505634ab0d23110c90f3f0ce973
SHA17fdee9cae5e4d6af5ab22b560ec261408a0dedda
SHA25699d407facfcfc702e7f7b6fec729ec226f33a24b4cbbf5e9cd88d559c275a149
SHA512b9ac6f60a0c9d61e00fe7574472ddb32b6eb6b4b7defcd70fffb9d09bce9184ba49ebbfbf0d9874f7622dbe57571ec680d5a6ebe81bdedf776c6b4fcfaf0d954
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5aee1071bfcbde8163e30ddbca4e678ac
SHA1791ecb33b36b91439720e9a265a3bbc734a616f2
SHA2568870b0fcb3ef6366b847a34949a10ba06906baf55e384801186c487f8c29f213
SHA512903198ee65830289b4c11aa6cac9116ad4d3f8125501cc917819f47ff5ae35ff20c6e488cab48c7c2cf3e1e8a9fe6ae64bfbf3efb6e929327b04b5ad610f7d6b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d8bfff1ada8a6ed009ee8f6926d2f1c1
SHA1e041239baf491fb2501074e3f5eb833a80d3b619
SHA25618092d33f8b7c02f0d2a6aae6e7f6600b52585fd2548601ea2b7c340fbf96446
SHA5126a40a1911ee1fd30c133e46564781cc5250353c25f533d8511cf2d058e25a1ee7575debcb9035f73599f38071beaebae6be55eca3a5fb17e7f36e8eb81689f88
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5860418f1db4bcaeb3e2c12d460a90214
SHA1baaa6801c31e1fe5c3f2cdc5addea22103824a8d
SHA2567b9c1132444e993c1267f317857e207320dc85c6a34e12ca625838376e75c901
SHA512f1722c5eccadcc132928fc9a1e672973b0aa11eaa434e4468c24e62f07ada47680030b14ce3f9ef78eccae8bc5da8ad13d9f9052882e6d04faaf3bd8ff3d8c53
-
Filesize
4.1MB
MD5e2fd3f6c0c2dbc7067e3a4fd0431017a
SHA17f47fcfab1f58d6edf17f85e90452a60cfae6a1f
SHA256225d3470a778ccafe32bc3fc70e5f56668dc3ede3d892bcb0d579d1866bc9898
SHA5126ababb4a85e2a4bfdcb9d6da2e68b1446ce8f0c0352ecd3911667b9ae2f23df619c654f683d0b765ca55b5409d8ebbf726f66d432af5b4901cbecb93a80deddd