Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe
Resource
win7-20231129-en
General
-
Target
ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe
-
Size
4.1MB
-
MD5
dfb32879d0fd63b6442f140775eb1975
-
SHA1
a77f4bf5a1730d314dca28719fb0e5b4e2c11ace
-
SHA256
ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1
-
SHA512
b427f98a1148ec135b38a4e7b6c81a1837daf77cfb1412a6b04c3627a2b276581732b369ff732a9d5353b44e56f7ac994792ef4238db3c761dd4b1b47c8a3c16
-
SSDEEP
98304:JGrnwiB2dYFBQLVw0Jv37FWi1chPr/xRmmjECQgDNO:JG7LuY/yhvJWf/qmwCQmO
Malware Config
Signatures
-
Glupteba payload 14 IoCs
Processes:
resource yara_rule behavioral2/memory/1596-2-0x0000000004FC0000-0x00000000058AB000-memory.dmp family_glupteba behavioral2/memory/1596-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1596-9-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/1596-32-0x0000000004FC0000-0x00000000058AB000-memory.dmp family_glupteba behavioral2/memory/1596-55-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1596-54-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/1596-60-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/1512-99-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/1512-135-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/1512-140-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/4484-168-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/4484-198-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/4484-228-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba behavioral2/memory/4484-230-0x0000000000400000-0x0000000002EDD000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 5036 netsh.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid Process 4484 csrss.exe 3556 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.execsrss.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe -
Drops file in Windows directory 2 IoCs
Processes:
ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exedescription ioc Process File opened for modification C:\Windows\rss ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe File created C:\Windows\rss\csrss.exe ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 3172 powershell.exe 2464 powershell.exe 3488 powershell.exe 1976 powershell.exe 2348 powershell.exe 2960 powershell.exe 384 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 4036 schtasks.exe 2708 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
powershell.exeec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exepowershell.exeec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid Process 2464 powershell.exe 2464 powershell.exe 2464 powershell.exe 1596 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1596 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 3488 powershell.exe 3488 powershell.exe 3488 powershell.exe 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 1976 powershell.exe 1976 powershell.exe 1976 powershell.exe 2348 powershell.exe 2348 powershell.exe 2348 powershell.exe 2960 powershell.exe 2960 powershell.exe 384 powershell.exe 384 powershell.exe 3172 powershell.exe 3172 powershell.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 4484 csrss.exe 4484 csrss.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 4484 csrss.exe 4484 csrss.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe 3556 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exeec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exedescription pid Process Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 1596 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Token: SeImpersonatePrivilege 1596 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe Token: SeDebugPrivilege 3488 powershell.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 2348 powershell.exe Token: SeDebugPrivilege 2960 powershell.exe Token: SeDebugPrivilege 384 powershell.exe Token: SeDebugPrivilege 3172 powershell.exe Token: SeSystemEnvironmentPrivilege 4484 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exeec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.execmd.execsrss.exedescription pid Process procid_target PID 1596 wrote to memory of 2464 1596 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 99 PID 1596 wrote to memory of 2464 1596 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 99 PID 1596 wrote to memory of 2464 1596 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 99 PID 1512 wrote to memory of 3488 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 105 PID 1512 wrote to memory of 3488 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 105 PID 1512 wrote to memory of 3488 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 105 PID 1512 wrote to memory of 3836 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 107 PID 1512 wrote to memory of 3836 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 107 PID 3836 wrote to memory of 5036 3836 cmd.exe 109 PID 3836 wrote to memory of 5036 3836 cmd.exe 109 PID 1512 wrote to memory of 1976 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 110 PID 1512 wrote to memory of 1976 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 110 PID 1512 wrote to memory of 1976 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 110 PID 1512 wrote to memory of 2348 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 112 PID 1512 wrote to memory of 2348 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 112 PID 1512 wrote to memory of 2348 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 112 PID 1512 wrote to memory of 4484 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 114 PID 1512 wrote to memory of 4484 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 114 PID 1512 wrote to memory of 4484 1512 ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe 114 PID 4484 wrote to memory of 2960 4484 csrss.exe 115 PID 4484 wrote to memory of 2960 4484 csrss.exe 115 PID 4484 wrote to memory of 2960 4484 csrss.exe 115 PID 4484 wrote to memory of 384 4484 csrss.exe 120 PID 4484 wrote to memory of 384 4484 csrss.exe 120 PID 4484 wrote to memory of 384 4484 csrss.exe 120 PID 4484 wrote to memory of 3172 4484 csrss.exe 123 PID 4484 wrote to memory of 3172 4484 csrss.exe 123 PID 4484 wrote to memory of 3172 4484 csrss.exe 123 PID 4484 wrote to memory of 3556 4484 csrss.exe 125 PID 4484 wrote to memory of 3556 4484 csrss.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe"C:\Users\Admin\AppData\Local\Temp\ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe"C:\Users\Admin\AppData\Local\Temp\ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:5036
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4036
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1792
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2708
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53c08d7a5789e559230fb6cf55189b9fe
SHA1cb1c15b41d94988c4e578ea909860f545009bd2d
SHA2562d0795d2343c7c4e8f60f2c3b8e5ec43f34e1cfa57a17d1b66c7707fd80b3b1a
SHA5125d69a340fa65c72354007607797bca7f2afa9790582b5373e2b4c0812f59485ee8df6ca6a026890cc8d95db39ff67574f4519c9a50d35adfc5f91fcb0a53d08c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58f3347ee741a6e0fda051ee5e37ecfce
SHA1cec7d6fbf48478b1cbadc99efcf085d3d0ddf482
SHA256df76b71ede114405dedf64e3effd8d2e8b228ebcfcecf9bdd6152d0067a28303
SHA51298c0941a83a4a4553e247cd3d31d2ee87a6a847f9e869c329cb14befbea205553ab869215ed0f922c614843a0613dd7e04c27b72faca7779283a6574237f4769
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5e25b8ac2bad871c0a7ce5ee1967ac104
SHA1491957f55d44096eab3bcabcf2d7a53739b31fc3
SHA2567c66f3c9d49f1224bc0ef045a0e94347beeed58dc73126ca1e645869daa57a41
SHA512e1f5c4ad8ada74a958c76c2d68376ff0f2ef513f16878984efb95b7b42dabefd150b8a2b68d42cd56426bd0b1e914bb07d0ffe74235b87f45aea8efd9c4dc6c1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51e830887575dd01316121c3c9c4659ae
SHA1b5cec1db891b0b82f9dcc031ccae4c3bb0db14b9
SHA25660dfd3ca7ffaadc8a733d898a53ed6ed6badf39794522ea2c0d267a41fda6a76
SHA512d608b4eeee6d076059642b2ef5131f00f60364ab61988e35045e6b46f52381830ddf7f1382463bd1933cc3ce8634df13d9b92784b19066ac9bed518db273b761
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58248a3984aaec80833ea5d0db1ddfdb6
SHA18024da6ad5ac2a92668d0d136fbe6ec4e375868d
SHA256529c82fac416450f3f5daf3b65c42b883221901e581cea62d8d95f6a7cfea0f3
SHA5126da1276d57e4072162fdeb911f8a61c2447ccf9da9404d6176b5273aca5270f3e1352a6383fb80ebdedd7465a8125a00a75d1bf276f049c9f10eee30fc0be934
-
Filesize
4.1MB
MD5dfb32879d0fd63b6442f140775eb1975
SHA1a77f4bf5a1730d314dca28719fb0e5b4e2c11ace
SHA256ec045ab4c0957a1930d5effe265d30a1624713ea2897b78b7fddb5322d9960f1
SHA512b427f98a1148ec135b38a4e7b6c81a1837daf77cfb1412a6b04c3627a2b276581732b369ff732a9d5353b44e56f7ac994792ef4238db3c761dd4b1b47c8a3c16