Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24-05-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe
Resource
win7-20240508-en
General
-
Target
942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe
-
Size
4.1MB
-
MD5
3600b9a82907a9f072c5086fdc376220
-
SHA1
0553de1e76929adf821c5d78516a8ad2a86eb503
-
SHA256
942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6
-
SHA512
1389f017f0ff4cb31d068a1f9add60cd0f1670a271ab8463ed5a68e65464f9e60943a9daa48a6cc9ad9fe42d38a80cd123ac51ff8b7bb4aa6a0f22ac7291a5a5
-
SSDEEP
98304:MxfL9oyIkrku4AJMBJNRxIbk0RddEjk9Pc8cg301s2mGvl:6RrVrv4XbNRWhj2o9k8f3CspGvl
Malware Config
Signatures
-
Glupteba payload 34 IoCs
resource yara_rule behavioral2/memory/2920-2-0x0000000004BE0000-0x00000000054CB000-memory.dmp family_glupteba behavioral2/memory/2920-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2920-285-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/2920-303-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2920-304-0x0000000004BE0000-0x00000000054CB000-memory.dmp family_glupteba behavioral2/memory/2920-301-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4224-547-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/4224-1031-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1535-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1763-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1764-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1765-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1766-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1767-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1768-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1769-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1770-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1771-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1772-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1773-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1774-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1775-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1776-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1777-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1778-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1779-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1780-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1781-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1782-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1783-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1784-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1785-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1786-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba behavioral2/memory/3228-1787-0x0000000000400000-0x0000000002B0D000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2080 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3228 csrss.exe 3452 injector.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 31 raw.githubusercontent.com 32 raw.githubusercontent.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe File created C:\Windows\rss\csrss.exe 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe -
pid Process 4208 powershell.exe 4500 powershell.exe 1816 powershell.exe 4624 powershell.exe 3424 powershell.exe 4344 powershell.exe 508 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3608 schtasks.exe 2560 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3424 powershell.exe 3424 powershell.exe 3424 powershell.exe 2920 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 2920 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 4344 powershell.exe 4344 powershell.exe 4344 powershell.exe 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 508 powershell.exe 508 powershell.exe 508 powershell.exe 4208 powershell.exe 4208 powershell.exe 4208 powershell.exe 4500 powershell.exe 4500 powershell.exe 4500 powershell.exe 1816 powershell.exe 1816 powershell.exe 1816 powershell.exe 4624 powershell.exe 4624 powershell.exe 4624 powershell.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3228 csrss.exe 3228 csrss.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3228 csrss.exe 3228 csrss.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe 3452 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3424 powershell.exe Token: SeDebugPrivilege 2920 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Token: SeImpersonatePrivilege 2920 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe Token: SeDebugPrivilege 4344 powershell.exe Token: SeDebugPrivilege 508 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 4500 powershell.exe Token: SeDebugPrivilege 1816 powershell.exe Token: SeDebugPrivilege 4624 powershell.exe Token: SeSystemEnvironmentPrivilege 3228 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2920 wrote to memory of 3424 2920 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 73 PID 2920 wrote to memory of 3424 2920 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 73 PID 2920 wrote to memory of 3424 2920 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 73 PID 4224 wrote to memory of 4344 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 78 PID 4224 wrote to memory of 4344 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 78 PID 4224 wrote to memory of 4344 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 78 PID 4224 wrote to memory of 64 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 80 PID 4224 wrote to memory of 64 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 80 PID 64 wrote to memory of 2080 64 cmd.exe 82 PID 64 wrote to memory of 2080 64 cmd.exe 82 PID 4224 wrote to memory of 508 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 83 PID 4224 wrote to memory of 508 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 83 PID 4224 wrote to memory of 508 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 83 PID 4224 wrote to memory of 4208 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 85 PID 4224 wrote to memory of 4208 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 85 PID 4224 wrote to memory of 4208 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 85 PID 4224 wrote to memory of 3228 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 87 PID 4224 wrote to memory of 3228 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 87 PID 4224 wrote to memory of 3228 4224 942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe 87 PID 3228 wrote to memory of 4500 3228 csrss.exe 88 PID 3228 wrote to memory of 4500 3228 csrss.exe 88 PID 3228 wrote to memory of 4500 3228 csrss.exe 88 PID 3228 wrote to memory of 1816 3228 csrss.exe 95 PID 3228 wrote to memory of 1816 3228 csrss.exe 95 PID 3228 wrote to memory of 1816 3228 csrss.exe 95 PID 3228 wrote to memory of 4624 3228 csrss.exe 97 PID 3228 wrote to memory of 4624 3228 csrss.exe 97 PID 3228 wrote to memory of 4624 3228 csrss.exe 97 PID 3228 wrote to memory of 3452 3228 csrss.exe 99 PID 3228 wrote to memory of 3452 3228 csrss.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe"C:\Users\Admin\AppData\Local\Temp\942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe"C:\Users\Admin\AppData\Local\Temp\942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6.exe"2⤵
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:2080
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:508
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2560
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1416
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3608
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5a66591cf7ec3a0dca9c3c7cfaf169d9c
SHA1a77c7360fa944744825db06e7c646adbe21a746e
SHA256233eab7abaa8afed5de70aed127b8d921b91f560a1ab271a880ed81338448acd
SHA51205ee119eb0c21898679b31eb49fdf24bf773e7f9798d38ea713941d8bb8c58c7c1e08989c480755c7c352a58d1b84516c8be5306edf2de3fce4ab75a94798eac
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD59a3df805fc1623b1e0c566e52451f6c3
SHA15b6165188b0b87953cb35f0d3cb3b36b9e9fd70a
SHA256c4b11c910067c18cf210f38de88f044f3a38342fb29424fd35eff618f95d6cb4
SHA512b0c42586deed64e3d20575da87e86a56bb71a9790a7db740f8d3fe38836f3f948456c7b2f54b49e3f336cff8743d13d42cf327b9735a83ba21ae8acb7a078143
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD53fe753ce1eb1dc0f30e50437ddba99cd
SHA1e0efa275831ecd7780d6851f0995ac2fc3356946
SHA25616d2976f123cdf903410e0b317fbe52e1543bb6a74b91f5ec33ab44c02c28d3d
SHA512e87e1e56c8dad27f5640420d7bb74c57214e5b8defe2126e735d24cbb0bcefe2bd1b67c7695f2869be698e7b1d14a5593d655cb07321db61a4ba005bf1930e18
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5c81cae171868e1d0f6c89bda0fb1b292
SHA12bac70fdf60359ab05e1d47bb253415ff213a8fd
SHA256fbf917a48e7b7ceab66c990a6a9d25c312d5295c84c9df53b07515c3d6ee9f66
SHA512343f77d502ec6faaf045ab31a50068cb04450d6781e7052feaa2a740c88d6742a981069ab638eaff7f8eee99816ba2a97a4738856bdc18ac4af83a735a41e242
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5183cc98fcac54971ba9fa2b04e430284
SHA1324cfa60627cfcff9cd8bf6be6cd51743ce72809
SHA25634524854cd9e871733ca0eba359c14d15981c0f0564a9aba38e9965734872eed
SHA5122e1f19e836e17c8cb16f98591cf733166ade0102a3ca00e9a977dc4eaf11ac4063d7706403878f287a082fc2087758a4e9acfef00626f9cde57f7741bf8f6149
-
Filesize
4.1MB
MD53600b9a82907a9f072c5086fdc376220
SHA10553de1e76929adf821c5d78516a8ad2a86eb503
SHA256942893be9543258a4290f15162e51847b081f46aad850c902cb5ace6244af9f6
SHA5121389f017f0ff4cb31d068a1f9add60cd0f1670a271ab8463ed5a68e65464f9e60943a9daa48a6cc9ad9fe42d38a80cd123ac51ff8b7bb4aa6a0f22ac7291a5a5