Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe
Resource
win7-20240221-en
General
-
Target
6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe
-
Size
4.2MB
-
MD5
ccb06d2aa784b092bc872d8b64554f5f
-
SHA1
50c02f225f09fb1d5bf43bd616dc4b2c692bba78
-
SHA256
6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111
-
SHA512
f90076bf1517c27d58bdf86469d41967f3f064aeb9446e73fa0c2b40ce0facdb539acf87b07416f3c5b91ffe8c258faaac7bec4925dc10ef22226587ceb360bc
-
SSDEEP
98304:us/nrJvdb2aRq+PiuJq0CxRbZcjVqe1cESK835dVpUISU:tnd1b2aQsJvCxRtct1cbKGmIJ
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/1404-2-0x0000000002F40000-0x000000000382B000-memory.dmp family_glupteba behavioral2/memory/1404-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1404-81-0x0000000002F40000-0x000000000382B000-memory.dmp family_glupteba behavioral2/memory/1404-79-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/1404-131-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4424-133-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-160-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-212-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-219-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-221-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-223-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-225-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-227-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-229-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-231-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-233-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-235-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-237-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba behavioral2/memory/2780-239-0x0000000000400000-0x0000000000ED1000-memory.dmp family_glupteba -
Detects Windows executables referencing non-Windows User-Agents 17 IoCs
Processes:
resource yara_rule behavioral2/memory/1404-3-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1404-79-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1404-131-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/4424-133-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-160-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-212-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-219-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-221-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-223-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-225-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-227-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-229-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-231-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-233-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-235-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-237-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2780-239-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables Discord URL observed in first stage droppers 17 IoCs
Processes:
resource yara_rule behavioral2/memory/1404-3-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1404-79-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1404-131-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/4424-133-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-160-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-212-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-219-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-221-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-223-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-225-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-227-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-229-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-231-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-233-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-235-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-237-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2780-239-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables containing URLs to raw contents of a Github gist 17 IoCs
Processes:
resource yara_rule behavioral2/memory/1404-3-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1404-79-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1404-131-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4424-133-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-160-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-212-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-219-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-221-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-223-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-225-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-227-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-229-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-231-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-233-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-235-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-237-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2780-239-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 17 IoCs
Processes:
resource yara_rule behavioral2/memory/1404-3-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1404-79-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1404-131-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/4424-133-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-160-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-212-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-219-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-221-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-223-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-225-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-227-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-229-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-231-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-233-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-235-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-237-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2780-239-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables referencing many varying, potentially fake Windows User-Agents 17 IoCs
Processes:
resource yara_rule behavioral2/memory/1404-3-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1404-79-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1404-131-0x0000000000400000-0x0000000000D1C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/4424-133-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-160-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-212-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-219-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-221-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-223-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-225-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-227-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-229-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-231-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-233-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-235-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-237-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2780-239-0x0000000000400000-0x0000000000ED1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 4732 netsh.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid Process 2780 csrss.exe 1148 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.execsrss.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe -
Drops file in Windows directory 2 IoCs
Processes:
6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exedescription ioc Process File created C:\Windows\rss\csrss.exe 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe File opened for modification C:\Windows\rss 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 4380 powershell.exe 3664 powershell.exe 4248 powershell.exe 1448 powershell.exe 4008 powershell.exe 3944 powershell.exe 2460 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 3100 schtasks.exe 452 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-751 = "Tonga Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exepowershell.exe6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid Process 2460 powershell.exe 2460 powershell.exe 1404 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 1404 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 4380 powershell.exe 4380 powershell.exe 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 3664 powershell.exe 3664 powershell.exe 4248 powershell.exe 4248 powershell.exe 1448 powershell.exe 1448 powershell.exe 4008 powershell.exe 4008 powershell.exe 3944 powershell.exe 3944 powershell.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 2780 csrss.exe 2780 csrss.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 2780 csrss.exe 2780 csrss.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe 1148 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exe6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exedescription pid Process Token: SeDebugPrivilege 2460 powershell.exe Token: SeDebugPrivilege 1404 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Token: SeImpersonatePrivilege 1404 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe Token: SeDebugPrivilege 4380 powershell.exe Token: SeDebugPrivilege 3664 powershell.exe Token: SeDebugPrivilege 4248 powershell.exe Token: SeDebugPrivilege 1448 powershell.exe Token: SeDebugPrivilege 4008 powershell.exe Token: SeDebugPrivilege 3944 powershell.exe Token: SeSystemEnvironmentPrivilege 2780 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.execmd.execsrss.exedescription pid Process procid_target PID 1404 wrote to memory of 2460 1404 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 85 PID 1404 wrote to memory of 2460 1404 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 85 PID 1404 wrote to memory of 2460 1404 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 85 PID 4424 wrote to memory of 4380 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 90 PID 4424 wrote to memory of 4380 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 90 PID 4424 wrote to memory of 4380 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 90 PID 4424 wrote to memory of 804 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 92 PID 4424 wrote to memory of 804 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 92 PID 804 wrote to memory of 4732 804 cmd.exe 94 PID 804 wrote to memory of 4732 804 cmd.exe 94 PID 4424 wrote to memory of 3664 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 95 PID 4424 wrote to memory of 3664 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 95 PID 4424 wrote to memory of 3664 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 95 PID 4424 wrote to memory of 4248 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 97 PID 4424 wrote to memory of 4248 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 97 PID 4424 wrote to memory of 4248 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 97 PID 4424 wrote to memory of 2780 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 99 PID 4424 wrote to memory of 2780 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 99 PID 4424 wrote to memory of 2780 4424 6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe 99 PID 2780 wrote to memory of 1448 2780 csrss.exe 100 PID 2780 wrote to memory of 1448 2780 csrss.exe 100 PID 2780 wrote to memory of 1448 2780 csrss.exe 100 PID 2780 wrote to memory of 4008 2780 csrss.exe 107 PID 2780 wrote to memory of 4008 2780 csrss.exe 107 PID 2780 wrote to memory of 4008 2780 csrss.exe 107 PID 2780 wrote to memory of 3944 2780 csrss.exe 109 PID 2780 wrote to memory of 3944 2780 csrss.exe 109 PID 2780 wrote to memory of 3944 2780 csrss.exe 109 PID 2780 wrote to memory of 1148 2780 csrss.exe 111 PID 2780 wrote to memory of 1148 2780 csrss.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe"C:\Users\Admin\AppData\Local\Temp\6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe"C:\Users\Admin\AppData\Local\Temp\6eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:4732
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:3100
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:452
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51f11e458f619202697e6c2ad434f6b36
SHA152a428ec02ae77cd8a896cb4799d426005d253e8
SHA256466edda06574837759df40c5cd63752857b41c2b34fe2d0666fa62fb457ceeb6
SHA5128c64d76d6dfcac258c14bb0623344f6e2d1d4656baaa1384aa88b8c989384d9d961f0b478db4bc4714673a74a9cab0bdc78e685b222967235c210c0ef8946bbf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c6c5f0b2e984c912fcf2f3bf68c4957a
SHA1d10bdabe75b8dae97d570fc829b19f64c1b281f6
SHA256baa25e5382e47b67cf0bf5135c3356d7c7e08a08a3126ccae35b80fa5915a0f3
SHA512c977039e9028bdbcd2b50fddb43d781f3a85868fdd6a380ec0d5d245ce271df43c3f0ba1e9d99d9923ecfc3b96027f7eb7ea474c6a4aad1371e36c5a0a5e19c8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5329aa5187e2eb0a4bf07e75c38620405
SHA15de481e11ee9e645622ad5d4a5b63f25d4bd9055
SHA2565283fb1d66382b4b65a84081ad3dc43480f52985847b180eff6e41ddca7c4122
SHA512ac044eccf28fcf82fb8f540dea9e8944a788eabceea461566a2683f504f0d264ecee8c33fc0342aa9d45455e453ab27f0c244ecb6f1cdbb5403eb6b2f2b5a8f3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD554285b1eb7338eed55097102c5557fa7
SHA14baf777800b179a67b847d45b2f585cd3717fc22
SHA2568f80f0e062e850f53f7cb1c0acb6fd78dec57cc2f51a45a2dc7cf535e8aedaaa
SHA5120380c69be2382f644376c0cec06344ee37c5b76dac41f86fb438ea72ae06c25a45bc6cb0de85a762d578651cf1bedd59a750b022258e96c2bd1f044109dc2962
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56252de5810793a878eba2f5649437fcb
SHA12437c2af76c6898fdd752cefed3d57b4955e1edb
SHA2563e2ff81ab1814e66dcb1b5764f9ba02bb52e84f442e974e63958af1383825f67
SHA5128c27b365bfa8270375f2ee7fb7f1823174cc97c7ad34e3630b268f16b75e6b1a1a5fa5c2f83b35f1dc6435e8f092922568429613aa3e7349bb5e1c534cb9a562
-
Filesize
4.2MB
MD5ccb06d2aa784b092bc872d8b64554f5f
SHA150c02f225f09fb1d5bf43bd616dc4b2c692bba78
SHA2566eb2918ecb6a8acb5f8bbf26dcaa7fd3a3e9cf7b95b8f14d7329336a9e1b0111
SHA512f90076bf1517c27d58bdf86469d41967f3f064aeb9446e73fa0c2b40ce0facdb539acf87b07416f3c5b91ffe8c258faaac7bec4925dc10ef22226587ceb360bc