Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 05:56
Static task
static1
Behavioral task
behavioral1
Sample
bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe
Resource
win7-20240508-en
General
-
Target
bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe
-
Size
4.1MB
-
MD5
1250c2afc46194b4d63ca011316d2f28
-
SHA1
2b1d8c1b13faca320cfeb1e3d3040407ff36f9d8
-
SHA256
bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3
-
SHA512
b4e394bb8dc1a336701a5c0aa14166f3ea2b6c7e9860e7d3d80d253eb2c5b4ed50b95518b609fe43d068f09d2f4dcebcf4c026e2a071a3ff3e1b62ee69eb14de
-
SSDEEP
98304:2k/C6baF9NNXYvR+SQPyohxfWe3/GY9pAEj6B:2n6bazjovoyoHfX3/GYHq
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/3620-2-0x0000000004590000-0x0000000004E7B000-memory.dmp family_glupteba behavioral2/memory/3620-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3620-56-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3620-57-0x0000000004590000-0x0000000004E7B000-memory.dmp family_glupteba behavioral2/memory/3620-55-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/2760-137-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-220-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-221-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-222-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-223-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-224-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-225-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-226-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-227-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-228-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-229-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-230-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-231-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba behavioral2/memory/4956-232-0x0000000000400000-0x0000000002364000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3884 netsh.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid process 4956 csrss.exe 6104 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe -
Drops file in Windows directory 2 IoCs
Processes:
bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exedescription ioc process File opened for modification C:\Windows\rss bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe File created C:\Windows\rss\csrss.exe bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 5212 powershell.exe 2380 powershell.exe 1612 powershell.exe 5724 powershell.exe 2640 powershell.exe 2152 powershell.exe 2848 powershell.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5440 3620 WerFault.exe bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2508 2760 WerFault.exe bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4324 schtasks.exe 5344 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exebf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exebf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exepowershell.exebf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid process 1612 powershell.exe 1612 powershell.exe 3620 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 3620 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 5724 powershell.exe 5724 powershell.exe 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe 2640 powershell.exe 2640 powershell.exe 2152 powershell.exe 2152 powershell.exe 2848 powershell.exe 2848 powershell.exe 5212 powershell.exe 5212 powershell.exe 2380 powershell.exe 2380 powershell.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 4956 csrss.exe 4956 csrss.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 4956 csrss.exe 4956 csrss.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe 6104 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exebf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exedescription pid process Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 3620 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Token: SeImpersonatePrivilege 3620 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe Token: SeDebugPrivilege 5724 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 5212 powershell.exe Token: SeDebugPrivilege 2380 powershell.exe Token: SeSystemEnvironmentPrivilege 4956 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exebf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.execmd.execsrss.exedescription pid process target process PID 3620 wrote to memory of 1612 3620 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 3620 wrote to memory of 1612 3620 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 3620 wrote to memory of 1612 3620 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 2760 wrote to memory of 5724 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 2760 wrote to memory of 5724 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 2760 wrote to memory of 5724 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 2760 wrote to memory of 3124 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe cmd.exe PID 2760 wrote to memory of 3124 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe cmd.exe PID 3124 wrote to memory of 3884 3124 cmd.exe netsh.exe PID 3124 wrote to memory of 3884 3124 cmd.exe netsh.exe PID 2760 wrote to memory of 2640 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 2760 wrote to memory of 2640 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 2760 wrote to memory of 2640 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 2760 wrote to memory of 2152 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 2760 wrote to memory of 2152 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 2760 wrote to memory of 2152 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe powershell.exe PID 2760 wrote to memory of 4956 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe csrss.exe PID 2760 wrote to memory of 4956 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe csrss.exe PID 2760 wrote to memory of 4956 2760 bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe csrss.exe PID 4956 wrote to memory of 2848 4956 csrss.exe powershell.exe PID 4956 wrote to memory of 2848 4956 csrss.exe powershell.exe PID 4956 wrote to memory of 2848 4956 csrss.exe powershell.exe PID 4956 wrote to memory of 5212 4956 csrss.exe powershell.exe PID 4956 wrote to memory of 5212 4956 csrss.exe powershell.exe PID 4956 wrote to memory of 5212 4956 csrss.exe powershell.exe PID 4956 wrote to memory of 2380 4956 csrss.exe powershell.exe PID 4956 wrote to memory of 2380 4956 csrss.exe powershell.exe PID 4956 wrote to memory of 2380 4956 csrss.exe powershell.exe PID 4956 wrote to memory of 6104 4956 csrss.exe injector.exe PID 4956 wrote to memory of 6104 4956 csrss.exe injector.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe"C:\Users\Admin\AppData\Local\Temp\bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe"C:\Users\Admin\AppData\Local\Temp\bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5724 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4324 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:5132
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:6104 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:5344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 9043⤵
- Program crash
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 7802⤵
- Program crash
PID:5440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3620 -ip 36201⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2760 -ip 27601⤵PID:2448
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d924004dab30fe9355647a002594aa35
SHA14709eb3ce8978b5dd1a86e11ad3e821fcc616f77
SHA256b1fb4b683e55654c07297ec9381870290fd1fed08a3e6511989dd77f934360b3
SHA512e8617227d06ff20220fc2db2516f767aded54ac09dccb2c28f763c81c208ae6f2be8d008ae0444de822b0a8261ac56251d3210642e32c076ae9eb5bc854e82b7
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59d5075b2c3514e372d2c92751211176e
SHA1ad204cf1303f5b08e2f8ae8e6fe34be02f1d05a0
SHA2565f5e2b1f604b9930e0671c5caa93eaef0d04946f21ebe806af07fdd402f73ec2
SHA5125aae995efc52e97f9c5140833b6c8304e99298d00fd5df558cf0512355a31449ad48ad187227eff45a01db5cd4a01553bdf948561d15f179a89b023d80f508e8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD50374c04b42a4ac8c9a2c1b4a0990f280
SHA1edb3e3dcf6aa68f5f6c35e9037e12621b9b2f8c8
SHA25622f8bf33db7961fe450a621ce066ee4c47489f2448e12d67c785a7ee5590b144
SHA5125d454801576dc796f8bc829bb8b1f2d3a9115f32d48ade2173ca4c7013c151c4b885ea119486e28abaead578673065cddc6f5d03fed626e1d89e2042f38e18bd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5d732a061bc34b2631ef9767bb91ecafa
SHA10fa34a7bf911efdc77c15ba7f0477f03ea45801a
SHA2563142781206513857bd33151febc3ab1845f83666dd4985db3d23d9110750c2b3
SHA5122634f1847da57c2d5cff814916a1d44030efd20c4c4da49bff29bea3a1e6c2a26d833ed058a91ec2f39f285a2adc18be93003500bf2094342305a9b75a988d59
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD588774eb067496e0d38adb72cd43270e0
SHA188d1a49128e52239f7a1faa27d6f3b214211a568
SHA2561f6161697d263b47f94de94ae68bd430e1ddb6a62204724481a2046d4f8a8148
SHA51239cd2b7455b9eb7bde10086bf5bd3a53236ad89fe1564e0a930f68749b7b68d22984e0f850d22b9e197a53c191705f19eca8c3cf760881e7ca0d32b66ac4645e
-
Filesize
4.1MB
MD51250c2afc46194b4d63ca011316d2f28
SHA12b1d8c1b13faca320cfeb1e3d3040407ff36f9d8
SHA256bf012a5a3808044d4c7a5f251cceefd2b70dd0a30787e5cdeb5699e78e0aeac3
SHA512b4e394bb8dc1a336701a5c0aa14166f3ea2b6c7e9860e7d3d80d253eb2c5b4ed50b95518b609fe43d068f09d2f4dcebcf4c026e2a071a3ff3e1b62ee69eb14de