Analysis
-
max time kernel
150s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 09:51
Static task
static1
Behavioral task
behavioral1
Sample
d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe
Resource
win10v2004-20220721-en
General
-
Target
d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe
-
Size
3.7MB
-
MD5
ad2b83150300987958b84e85618c4b9f
-
SHA1
960b6c9b85a010bd51aacbdb2c4750d8d47cba7b
-
SHA256
d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956
-
SHA512
9b83e40628f076ffc38ea4ecfc026e51be2f482cd7ebe6373bb389cf5dae218a8f788abc03f44c4e1c23500aa53ced9f733c68cddba1bc9abef408c692d0c8f1
Malware Config
Signatures
-
Glupteba payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/3180-131-0x0000000002CC0000-0x00000000033AF000-memory.dmp family_glupteba behavioral2/memory/3180-133-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba behavioral2/memory/3180-135-0x0000000002CC0000-0x00000000033AF000-memory.dmp family_glupteba behavioral2/memory/3180-136-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba behavioral2/memory/2176-138-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba behavioral2/memory/2176-146-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba behavioral2/memory/2396-148-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 4456 created 3180 4456 svchost.exe d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe -
Executes dropped EXE 1 IoCs
Processes:
csrss.exepid process 2396 csrss.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HiddenTree = "\"C:\\Windows\\rss\\csrss.exe\"" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe -
Drops file in System32 directory 6 IoCs
Processes:
csrss.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A csrss.exe -
Drops file in Windows directory 2 IoCs
Processes:
d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exedescription ioc process File opened for modification C:\Windows\rss d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe File created C:\Windows\rss\csrss.exe d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe -
Processes:
csrss.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 5c0000000100000004000000001000001900000001000000100000002fe1f70bb05d7c92335bc5e05b984da60f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f63030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e814000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e20000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 csrss.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exed138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.execsrss.exepid process 3180 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 3180 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 3180 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 3180 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 3180 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 3180 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 3180 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 3180 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe 2396 csrss.exe 2396 csrss.exe 2396 csrss.exe 2396 csrss.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exesvchost.exedescription pid process Token: SeDebugPrivilege 3180 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Token: SeImpersonatePrivilege 3180 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe Token: SeTcbPrivilege 4456 svchost.exe Token: SeTcbPrivilege 4456 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
svchost.exed138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.execmd.execmd.exedescription pid process target process PID 4456 wrote to memory of 2176 4456 svchost.exe d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe PID 4456 wrote to memory of 2176 4456 svchost.exe d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe PID 4456 wrote to memory of 2176 4456 svchost.exe d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe PID 2176 wrote to memory of 3588 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe cmd.exe PID 2176 wrote to memory of 3588 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe cmd.exe PID 3588 wrote to memory of 4392 3588 cmd.exe netsh.exe PID 3588 wrote to memory of 4392 3588 cmd.exe netsh.exe PID 2176 wrote to memory of 1784 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe cmd.exe PID 2176 wrote to memory of 1784 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe cmd.exe PID 1784 wrote to memory of 3684 1784 cmd.exe netsh.exe PID 1784 wrote to memory of 3684 1784 cmd.exe netsh.exe PID 2176 wrote to memory of 2396 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe csrss.exe PID 2176 wrote to memory of 2396 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe csrss.exe PID 2176 wrote to memory of 2396 2176 d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe"C:\Users\Admin\AppData\Local\Temp\d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe"C:\Users\Admin\AppData\Local\Temp\d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\EpicNet Inc\CloudNet\cloudnet.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\EpicNet Inc\CloudNet\cloudnet.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\rss\csrss.exeFilesize
3.7MB
MD5ad2b83150300987958b84e85618c4b9f
SHA1960b6c9b85a010bd51aacbdb2c4750d8d47cba7b
SHA256d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956
SHA5129b83e40628f076ffc38ea4ecfc026e51be2f482cd7ebe6373bb389cf5dae218a8f788abc03f44c4e1c23500aa53ced9f733c68cddba1bc9abef408c692d0c8f1
-
C:\Windows\rss\csrss.exeFilesize
3.7MB
MD5ad2b83150300987958b84e85618c4b9f
SHA1960b6c9b85a010bd51aacbdb2c4750d8d47cba7b
SHA256d138d2e8b8db734a3454f3288604adea74946bab5350187e5bdd0b73e38a0956
SHA5129b83e40628f076ffc38ea4ecfc026e51be2f482cd7ebe6373bb389cf5dae218a8f788abc03f44c4e1c23500aa53ced9f733c68cddba1bc9abef408c692d0c8f1
-
memory/1784-141-0x0000000000000000-mapping.dmp
-
memory/2176-138-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB
-
memory/2176-137-0x00000000028D3000-0x0000000002C77000-memory.dmpFilesize
3.6MB
-
memory/2176-146-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB
-
memory/2176-134-0x0000000000000000-mapping.dmp
-
memory/2396-143-0x0000000000000000-mapping.dmp
-
memory/2396-147-0x0000000002D00000-0x00000000030A4000-memory.dmpFilesize
3.6MB
-
memory/2396-148-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB
-
memory/3180-130-0x0000000002913000-0x0000000002CB7000-memory.dmpFilesize
3.6MB
-
memory/3180-133-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB
-
memory/3180-136-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB
-
memory/3180-132-0x0000000002913000-0x0000000002CB7000-memory.dmpFilesize
3.6MB
-
memory/3180-131-0x0000000002CC0000-0x00000000033AF000-memory.dmpFilesize
6.9MB
-
memory/3180-135-0x0000000002CC0000-0x00000000033AF000-memory.dmpFilesize
6.9MB
-
memory/3588-139-0x0000000000000000-mapping.dmp
-
memory/3684-142-0x0000000000000000-mapping.dmp
-
memory/4392-140-0x0000000000000000-mapping.dmp