Analysis
-
max time kernel
23s -
max time network
126s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/05/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe
Resource
win10v2004-20240508-en
General
-
Target
7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe
-
Size
4.1MB
-
MD5
7719e380e9ea2836ef30d49ca060030e
-
SHA1
13697a1941551c0ef5548d857f27949599e5adcb
-
SHA256
7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa
-
SHA512
a67bba6f77ba05b5b7eb9036e33ef02798a09eb08139feb4942dcf94194e3d25c850a385a4cf3e536a1f7990f04d4dea3a8c7e4371d23c2b6bd194d55da172f8
-
SSDEEP
98304:uQAQcsa3GhfWYEvpb4LdECaqY+VYhFzXw/u5g9cAd9n3:uQAQcDPYxuCJe7X5ghf3
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral2/memory/848-2-0x0000000004980000-0x000000000526B000-memory.dmp family_glupteba behavioral2/memory/848-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/848-99-0x0000000004980000-0x000000000526B000-memory.dmp family_glupteba behavioral2/memory/848-98-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/948-126-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/848-148-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1200-201-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-211-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-213-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-216-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-219-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-223-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-225-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-228-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-231-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-235-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-238-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-240-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral2/memory/1200-243-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2496 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 1200 csrss.exe -
resource yara_rule behavioral2/files/0x000200000002aa59-205.dat upx behavioral2/memory/3172-206-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2744-209-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3172-210-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2744-214-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2744-220-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2744-229-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe File created C:\Windows\rss\csrss.exe 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1808 sc.exe -
pid Process 4688 powershell.exe 4676 powershell.exe 2360 powershell.exe 1320 powershell.exe 3096 powershell.exe 240 powershell.exe 1524 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4956 schtasks.exe 4716 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1320 powershell.exe 1320 powershell.exe 848 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 848 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 3096 powershell.exe 3096 powershell.exe 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 240 powershell.exe 240 powershell.exe 1524 powershell.exe 1524 powershell.exe 4688 powershell.exe 4688 powershell.exe 4676 powershell.exe 4676 powershell.exe 2360 powershell.exe 2360 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1320 powershell.exe Token: SeDebugPrivilege 848 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Token: SeImpersonatePrivilege 848 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe Token: SeDebugPrivilege 3096 powershell.exe Token: SeDebugPrivilege 240 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 4676 powershell.exe Token: SeDebugPrivilege 2360 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 848 wrote to memory of 1320 848 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 83 PID 848 wrote to memory of 1320 848 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 83 PID 848 wrote to memory of 1320 848 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 83 PID 948 wrote to memory of 3096 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 88 PID 948 wrote to memory of 3096 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 88 PID 948 wrote to memory of 3096 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 88 PID 948 wrote to memory of 776 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 90 PID 948 wrote to memory of 776 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 90 PID 776 wrote to memory of 2496 776 cmd.exe 92 PID 776 wrote to memory of 2496 776 cmd.exe 92 PID 948 wrote to memory of 240 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 93 PID 948 wrote to memory of 240 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 93 PID 948 wrote to memory of 240 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 93 PID 948 wrote to memory of 1524 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 95 PID 948 wrote to memory of 1524 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 95 PID 948 wrote to memory of 1524 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 95 PID 948 wrote to memory of 1200 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 97 PID 948 wrote to memory of 1200 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 97 PID 948 wrote to memory of 1200 948 7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe 97 PID 1200 wrote to memory of 4688 1200 csrss.exe 98 PID 1200 wrote to memory of 4688 1200 csrss.exe 98 PID 1200 wrote to memory of 4688 1200 csrss.exe 98 PID 1200 wrote to memory of 4676 1200 csrss.exe 104 PID 1200 wrote to memory of 4676 1200 csrss.exe 104 PID 1200 wrote to memory of 4676 1200 csrss.exe 104 PID 1200 wrote to memory of 2360 1200 csrss.exe 106 PID 1200 wrote to memory of 2360 1200 csrss.exe 106 PID 1200 wrote to memory of 2360 1200 csrss.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe"C:\Users\Admin\AppData\Local\Temp\7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe"C:\Users\Admin\AppData\Local\Temp\7dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2496
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4956
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:1784
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4716
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:3172
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:3292
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:1808
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f0b41910951a44260e14816cdb8a87c5
SHA1e6d6874f6117fc25360363eaf36bb1894618ee35
SHA2565ac88943518df38d4c1e43dbeb5852cd24c04f73bf7c071d2854f11ab7ebc2af
SHA5127f3776abe2b140f0948ed119b0ab838486dcd7b48c906365150bbf7ff4c4ed322793920e4bfc0a2e5b40777b62db1b3ba91a911d8a9f6f8a309edf7e17f793ad
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59c6348ee8dcba6a2d14cfc79167a7318
SHA129d7bb7576db9a945d6a219454afa9af2a93aa11
SHA256e41b15803e1a68d523ed19df8d84a605dce877a3a2d6e38ed2775e1b7c516d47
SHA51226db4880a6a6ea0c962417d906f858bd44826ccfbb31ea642076b1f5301fb08e1a34c5e4ad9351783f608ad31ed761fad475a1413df182773deceb9f2ffc863a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD589e6357c2c490182ce78713f0c2baf2c
SHA1ebaedf8792a0ae07a4a40964e2d379682ed3ed0e
SHA256615e81faebfebb243e21bad6bc45ae5978f5fac878e3666488254a4b668596b3
SHA512e558e250766681c9affe965759d319a652d6b93e0e04a26e134d7025dc1f5510339df7a4e9bec96f1328dbbaa177c4be7380ed928f26c4530bb2cfc75b237902
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50271f3eaae519875b02df580b45e20fe
SHA1e19da223f09752b52fff90cfc52e4c09745cacd3
SHA25681f386f9808b2acbef53f1cc5e997acfe7fba32f08f0793b6bcd3c51ba679a06
SHA512303ddc2aa9ad80b9c3f4cd3577ec0fe301f3e11abf24b12ef4f17bec964c947f8d48f2439869889ca184317ed10d347d6e83634ed18b990c718f347d6ee9d7c3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54adddeaeb1b927a2fcab4edf786fe080
SHA12426eec1db0c8798549d0089429a44c98121e5d3
SHA25696345883a42413f1c10e7324917296d44953ea4e9a6ff85dd027fa4cf6e4e934
SHA512c5864a8577ba30b435783c240e3c7c410fc45c26a068329a9a52b58716073baa5440a855c715f6d5360c18766344d0859812352215700ca83adea5897c0014bf
-
Filesize
4.1MB
MD57719e380e9ea2836ef30d49ca060030e
SHA113697a1941551c0ef5548d857f27949599e5adcb
SHA2567dc7a13d4395d698eeed8b23f27ede688062adbd028a5577c9be9a9d08c326fa
SHA512a67bba6f77ba05b5b7eb9036e33ef02798a09eb08139feb4942dcf94194e3d25c850a385a4cf3e536a1f7990f04d4dea3a8c7e4371d23c2b6bd194d55da172f8
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec