Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:15
Static task
static1
Behavioral task
behavioral1
Sample
8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe
Resource
win10v2004-20240508-en
General
-
Target
8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe
-
Size
4.1MB
-
MD5
687908c7c25af2020a425fcafac226e2
-
SHA1
2e52ab075fd5b0cdad1b5d66aaf15b9705cb4d3f
-
SHA256
8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8
-
SHA512
1cee297497e8869e263cd6726f1ec8361ca5e3bffdbf5a806bb11b6eb3303d51ecd555e3092fa2eb86bce8444efed968d2d6a688440e4ef105ab37e067737ee2
-
SSDEEP
98304:eQAQcsa3GhfWYEvpb4LdECaqY+VYhFzXw/u5g9cAd9nAJ:eQAQcDPYxuCJe7X5ghfG
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4188-2-0x0000000004850000-0x000000000513B000-memory.dmp family_glupteba behavioral1/memory/4188-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4188-104-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4188-133-0x0000000004850000-0x000000000513B000-memory.dmp family_glupteba behavioral1/memory/3356-156-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4188-197-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4880-210-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-228-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-230-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-234-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-238-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-242-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-246-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-250-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-254-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-258-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-262-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-266-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba behavioral1/memory/4880-270-0x0000000000400000-0x0000000002733000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4964 netsh.exe -
Executes dropped EXE 4 IoCs
Processes:
csrss.exeinjector.exewindefender.exewindefender.exepid process 4880 csrss.exe 3592 injector.exe 3576 windefender.exe 3992 windefender.exe -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral1/memory/3576-222-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3992-224-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3576-226-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3992-231-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3992-239-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe -
Drops file in Windows directory 4 IoCs
Processes:
8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.execsrss.exedescription ioc process File opened for modification C:\Windows\rss 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe File created C:\Windows\rss\csrss.exe 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1580 sc.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3716 powershell.exe 3328 powershell.exe 1060 powershell.exe 4552 powershell.exe 1736 powershell.exe 3628 powershell.exe 376 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1836 schtasks.exe 1736 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
windefender.exepowershell.exe8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-171 = "Central Daylight Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2632 = "Norfolk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-202 = "US Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2432 = "Cuba Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exepowershell.exe8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid process 1736 powershell.exe 1736 powershell.exe 4188 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 4188 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 3628 powershell.exe 3628 powershell.exe 3628 powershell.exe 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe 376 powershell.exe 376 powershell.exe 376 powershell.exe 3716 powershell.exe 3716 powershell.exe 3716 powershell.exe 3328 powershell.exe 3328 powershell.exe 1060 powershell.exe 1060 powershell.exe 1060 powershell.exe 4552 powershell.exe 4552 powershell.exe 4552 powershell.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 4880 csrss.exe 4880 csrss.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 4880 csrss.exe 4880 csrss.exe 3592 injector.exe 3592 injector.exe 4880 csrss.exe 4880 csrss.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe 3592 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
powershell.exe8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 1736 powershell.exe Token: SeDebugPrivilege 4188 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Token: SeImpersonatePrivilege 4188 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 376 powershell.exe Token: SeDebugPrivilege 3716 powershell.exe Token: SeDebugPrivilege 3328 powershell.exe Token: SeDebugPrivilege 1060 powershell.exe Token: SeDebugPrivilege 4552 powershell.exe Token: SeSystemEnvironmentPrivilege 4880 csrss.exe Token: SeSecurityPrivilege 1580 sc.exe Token: SeSecurityPrivilege 1580 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.execmd.execsrss.exewindefender.execmd.exedescription pid process target process PID 4188 wrote to memory of 1736 4188 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 4188 wrote to memory of 1736 4188 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 4188 wrote to memory of 1736 4188 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 3356 wrote to memory of 3628 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 3356 wrote to memory of 3628 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 3356 wrote to memory of 3628 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 3356 wrote to memory of 4860 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe cmd.exe PID 3356 wrote to memory of 4860 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe cmd.exe PID 4860 wrote to memory of 4964 4860 cmd.exe netsh.exe PID 4860 wrote to memory of 4964 4860 cmd.exe netsh.exe PID 3356 wrote to memory of 376 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 3356 wrote to memory of 376 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 3356 wrote to memory of 376 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 3356 wrote to memory of 3716 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 3356 wrote to memory of 3716 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 3356 wrote to memory of 3716 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe powershell.exe PID 3356 wrote to memory of 4880 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe csrss.exe PID 3356 wrote to memory of 4880 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe csrss.exe PID 3356 wrote to memory of 4880 3356 8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe csrss.exe PID 4880 wrote to memory of 3328 4880 csrss.exe powershell.exe PID 4880 wrote to memory of 3328 4880 csrss.exe powershell.exe PID 4880 wrote to memory of 3328 4880 csrss.exe powershell.exe PID 4880 wrote to memory of 1060 4880 csrss.exe powershell.exe PID 4880 wrote to memory of 1060 4880 csrss.exe powershell.exe PID 4880 wrote to memory of 1060 4880 csrss.exe powershell.exe PID 4880 wrote to memory of 4552 4880 csrss.exe powershell.exe PID 4880 wrote to memory of 4552 4880 csrss.exe powershell.exe PID 4880 wrote to memory of 4552 4880 csrss.exe powershell.exe PID 4880 wrote to memory of 3592 4880 csrss.exe injector.exe PID 4880 wrote to memory of 3592 4880 csrss.exe injector.exe PID 3576 wrote to memory of 1216 3576 windefender.exe cmd.exe PID 3576 wrote to memory of 1216 3576 windefender.exe cmd.exe PID 3576 wrote to memory of 1216 3576 windefender.exe cmd.exe PID 1216 wrote to memory of 1580 1216 cmd.exe sc.exe PID 1216 wrote to memory of 1580 1216 cmd.exe sc.exe PID 1216 wrote to memory of 1580 1216 cmd.exe sc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe"C:\Users\Admin\AppData\Local\Temp\8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe"C:\Users\Admin\AppData\Local\Temp\8d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1836 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3252
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3592 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1736 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD55edd6f201f33200834b860d4d113b0c5
SHA14354687e4f1a9af899b38136ef16f5e86cb336f6
SHA256902aa072368a3efebf451a6498afae9d3ff959283861061caa91f222345de193
SHA512897414b51e7bfa7fdea08e22dcd57b87955a81c806a45c0ebfedf8b290956af8beab110e117542fb006e4038a7c00d95c8fb14ccba3c296fab11c4c3701a4c25
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53ed605902ad3dc6766706dfe59dfb32c
SHA162649d36c460f450a8fb09cb6f510ba1ebc5e8cc
SHA2566c895760a9d1ab415bd21809c78476b7e26f0e2a469ef95637c3f34179ca0ee0
SHA512591b4bd925e0a9d2475fa9d46fcac94482296e36e023466c3c4d9f1f2a2703e2564004adcdb5ee491e373b5a354e0f39cd35bfab20e98c7f446246f221dfe511
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51e2d7520fa56b51f7c29a3bb7b51c228
SHA1dd1b5640d5dd3f2f7046d0ab17c630da4cc1cdf7
SHA256453254fd499eb82696571ee01944766abab5d5d725032551bfc5d938408da67f
SHA512686051dc2ea9257ebe4af9b9e860a4e998dadc5dea8f42f2593989c8bc51900efb363b31847ced8261376621d5419888ddcb6c757a99bbb330c7e6474f10c083
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ad59d7b9cd7e0276597d6cc6a6db07c9
SHA1aa97f9ce66f030c2e6bb08be1c37b1315dfbf14e
SHA256e5c2b0ee252fffd0f9c3cc4eab3d1ff7eaf339acb89131ffed63080c63e43754
SHA5120d6658c95ac04c98ac69f0c8c17cd8c15402f3fa59b575073c6bd47f4108825bd345af420a8c110030dc69c29110d026731dfae877a2c4c8bd179aedc99f0d56
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5665f594c5befb3c6247139bb68c4bed9
SHA160b62eb2d1fbe256d9bcc927f65d4bb173011295
SHA256ee4f551af6a96c56280f2d0b9f4cc38bc7e152c64cee8adaca4beec4e688431a
SHA5122bb4ef06e37e827a30a2d8a6ced6ab685ee62c72e9126568c38d6cde9172c7bea61544379ba2d7171a4ee7cb7752f6b1de79b2852149e475c81638160b62fdb9
-
Filesize
4.1MB
MD5687908c7c25af2020a425fcafac226e2
SHA12e52ab075fd5b0cdad1b5d66aaf15b9705cb4d3f
SHA2568d33ecf326d6bcf6406ad6642a9287cfe3664beb875c8466555301eb7073b1b8
SHA5121cee297497e8869e263cd6726f1ec8361ca5e3bffdbf5a806bb11b6eb3303d51ecd555e3092fa2eb86bce8444efed968d2d6a688440e4ef105ab37e067737ee2
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec