Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-05-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe
Resource
win10v2004-20240426-en
General
-
Target
2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe
-
Size
4.1MB
-
MD5
306543b55f1bbfdff3aa3c8ae7747099
-
SHA1
dfccada649518c9bc04275903803da1ca4b0168b
-
SHA256
2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2
-
SHA512
b1dab07c3b63d5f6ef1c25b6c554f8788daf5c8d940b1011c7f6d565114edb94558152798b38bce539930700b1c8715bcebd9a63ce27490d3b8f2d2d43e5f2fd
-
SSDEEP
98304:D7sgfTqZm7fywQIpjGUn+cmloZHued8miXbTsPufBvN9:DzgmDywQg+foZ8mw6Sf
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/2128-2-0x00000000048C0000-0x00000000051AB000-memory.dmp family_glupteba behavioral2/memory/2128-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2128-127-0x00000000048C0000-0x00000000051AB000-memory.dmp family_glupteba behavioral2/memory/2128-120-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1196-126-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/2128-195-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3884-202-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-213-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-216-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-219-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-222-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-225-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-228-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-231-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-234-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-237-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-240-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-243-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/3884-246-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 1496 netsh.exe -
Executes dropped EXE 4 IoCs
Processes:
csrss.exeinjector.exewindefender.exewindefender.exepid Process 3884 csrss.exe 3420 injector.exe 2104 windefender.exe 560 windefender.exe -
Processes:
resource yara_rule behavioral2/files/0x000200000002aa49-205.dat upx behavioral2/memory/2104-206-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/560-211-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2104-210-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/560-214-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/560-220-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.execsrss.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe -
Drops file in Windows directory 4 IoCs
Processes:
2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.execsrss.exedescription ioc Process File opened for modification C:\Windows\rss 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe File created C:\Windows\rss\csrss.exe 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid Process 4028 sc.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2288 powershell.exe 2792 powershell.exe 2136 powershell.exe 4328 powershell.exe 3464 powershell.exe 2000 powershell.exe 1488 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 3564 schtasks.exe 4260 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exepowershell.exepowershell.exewindefender.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2001 = "Cabo Verde Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-541 = "Myanmar Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-31 = "Mid-Atlantic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exepowershell.exe2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid Process 2288 powershell.exe 2288 powershell.exe 2128 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 2128 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 2792 powershell.exe 2792 powershell.exe 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 2136 powershell.exe 2136 powershell.exe 4328 powershell.exe 4328 powershell.exe 3464 powershell.exe 3464 powershell.exe 2000 powershell.exe 2000 powershell.exe 1488 powershell.exe 1488 powershell.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3884 csrss.exe 3884 csrss.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3884 csrss.exe 3884 csrss.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3884 csrss.exe 3884 csrss.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe 3420 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exe2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid Process Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 2128 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Token: SeImpersonatePrivilege 2128 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 2136 powershell.exe Token: SeDebugPrivilege 4328 powershell.exe Token: SeDebugPrivilege 3464 powershell.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 1488 powershell.exe Token: SeSystemEnvironmentPrivilege 3884 csrss.exe Token: SeSecurityPrivilege 4028 sc.exe Token: SeSecurityPrivilege 4028 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.execmd.execsrss.exewindefender.execmd.exedescription pid Process procid_target PID 2128 wrote to memory of 2288 2128 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 82 PID 2128 wrote to memory of 2288 2128 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 82 PID 2128 wrote to memory of 2288 2128 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 82 PID 1196 wrote to memory of 2792 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 87 PID 1196 wrote to memory of 2792 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 87 PID 1196 wrote to memory of 2792 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 87 PID 1196 wrote to memory of 2772 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 89 PID 1196 wrote to memory of 2772 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 89 PID 2772 wrote to memory of 1496 2772 cmd.exe 91 PID 2772 wrote to memory of 1496 2772 cmd.exe 91 PID 1196 wrote to memory of 2136 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 92 PID 1196 wrote to memory of 2136 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 92 PID 1196 wrote to memory of 2136 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 92 PID 1196 wrote to memory of 4328 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 94 PID 1196 wrote to memory of 4328 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 94 PID 1196 wrote to memory of 4328 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 94 PID 1196 wrote to memory of 3884 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 96 PID 1196 wrote to memory of 3884 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 96 PID 1196 wrote to memory of 3884 1196 2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe 96 PID 3884 wrote to memory of 3464 3884 csrss.exe 97 PID 3884 wrote to memory of 3464 3884 csrss.exe 97 PID 3884 wrote to memory of 3464 3884 csrss.exe 97 PID 3884 wrote to memory of 2000 3884 csrss.exe 103 PID 3884 wrote to memory of 2000 3884 csrss.exe 103 PID 3884 wrote to memory of 2000 3884 csrss.exe 103 PID 3884 wrote to memory of 1488 3884 csrss.exe 105 PID 3884 wrote to memory of 1488 3884 csrss.exe 105 PID 3884 wrote to memory of 1488 3884 csrss.exe 105 PID 3884 wrote to memory of 3420 3884 csrss.exe 107 PID 3884 wrote to memory of 3420 3884 csrss.exe 107 PID 2104 wrote to memory of 2400 2104 windefender.exe 113 PID 2104 wrote to memory of 2400 2104 windefender.exe 113 PID 2104 wrote to memory of 2400 2104 windefender.exe 113 PID 2400 wrote to memory of 4028 2400 cmd.exe 114 PID 2400 wrote to memory of 4028 2400 cmd.exe 114 PID 2400 wrote to memory of 4028 2400 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe"C:\Users\Admin\AppData\Local\Temp\2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe"C:\Users\Admin\AppData\Local\Temp\2d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1496
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3564
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2840
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4260
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:560
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59491f299b9e9aa15ab427b025b3ebe8e
SHA109fee38816bf6712eec8c4250271f8256fa9726c
SHA2567d3bf5be644baa0b0c37da1d84608994137ea72eb7522bc7d223e7ace2a0e98d
SHA512b3a12929d2ac8e96bb2e987ae055cedf05e88c6fd82a2174df98a55ca6753c178f91278cb526731e20f94975a0b1a05b3da877d9683516b253a3bcd085033adc
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bde83dfe0e0f012c331fb31df79e1718
SHA11bd7869d04ff3d40b75c45825611af3ea0ae2683
SHA256a245c2be00032fa0ede6d42a8cb2a37a0c1c783f0f1f922944be7716467a6d20
SHA5127f6e06099866e213808f9b2495ba4c75f3ca69fec50e2aeb5d978937e025f94b8725ae8ab75ec90636cd54bdf42539faa06e07f8c06537f41c0a2073dc377d18
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d106a7f8ba0fb09d2a289082d24acc85
SHA1dd6343b1283373cc33deae438c19f40799b8ce54
SHA25632c72f255541b1c601c20ace08735f7fcda596dfc6ef1a1c3f83b436d9108b66
SHA512dc3c0be8a5ae401f1990dbbfb4b1803456a658a897d3032c734711b2ad28ea0b0df9e29c102c085241ccd600a1b46e147813d2846491a2d2c39db3db1c0502c6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52010bf98c1dc8ab8481c7dcdf8c3b300
SHA1b30531903327f5e44c0afc53f234308e0bfbbd75
SHA2562c6534d434fe4e089c33568471125b93d494cc229f9095d231b58a076bc08dc0
SHA512fa8bea19c588dd8d439a55f8cc34e79b583ff5e4dc677b89890dea8d420f9b59bbd43babcb8065a0066f0d24198e6b2d77e86d3a6813c9880e5de04fedc5a9e3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b9bd7031e50cb2791a0120ebd1be2e9e
SHA1d116bcd78a6eb865bb87297ce0350f453d82dd59
SHA256662e36845dab9542fad9092a030177b6bb913aed87a5a493f939cd84b8966836
SHA512ef3d4cfb2d92c7c6972e0e7c5a82147e8cf4e98487314675ea1ef5ebb844fd1c6579b4b73a40eb1eb5720677f0e299c50eff6e76b01cbcc356ad1615d314d0df
-
Filesize
4.1MB
MD5306543b55f1bbfdff3aa3c8ae7747099
SHA1dfccada649518c9bc04275903803da1ca4b0168b
SHA2562d0427d3d39bc5524dae2e9964deba25adbef3f61980d82568507576243f25f2
SHA512b1dab07c3b63d5f6ef1c25b6c554f8788daf5c8d940b1011c7f6d565114edb94558152798b38bce539930700b1c8715bcebd9a63ce27490d3b8f2d2d43e5f2fd
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec