Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe
Resource
win10v2004-20220812-en
General
-
Target
4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe
-
Size
3.7MB
-
MD5
0f3c19354bca37d528ca01952ca2adf5
-
SHA1
6b407d41ea30461940e6550da333795e0a56b9c1
-
SHA256
4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43
-
SHA512
fb64589149924605e2f910a558d600b487ca61c7d133087a9e544ff7a0237cebd123e7a7fc681a1bdf8bb5720a7d0569024a0183ede147cc1226e6dfc1133ab3
-
SSDEEP
98304:PDJQgTe5T8B2TtNzHY5jGctrCSDcxeiBhLf2pTSWJmmf+9:Wqs8B01HSKyrClxnh+pOWJmmf+
Malware Config
Signatures
-
Glupteba payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/4528-133-0x0000000002CB0000-0x000000000339F000-memory.dmp family_glupteba behavioral2/memory/4528-135-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba behavioral2/memory/4528-137-0x0000000002CB0000-0x000000000339F000-memory.dmp family_glupteba behavioral2/memory/4528-138-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba behavioral2/memory/3224-140-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba behavioral2/memory/3224-148-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba behavioral2/memory/4664-150-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba behavioral2/memory/4664-151-0x0000000000400000-0x0000000000B0A000-memory.dmp family_glupteba -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 3500 created 4528 3500 svchost.exe 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe -
Executes dropped EXE 1 IoCs
Processes:
csrss.exepid process 4664 csrss.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LivelyNight = "\"C:\\Windows\\rss\\csrss.exe\"" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe -
Drops file in System32 directory 8 IoCs
Processes:
csrss.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A csrss.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A csrss.exe -
Drops file in Windows directory 2 IoCs
Processes:
4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exedescription ioc process File created C:\Windows\rss\csrss.exe 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe File opened for modification C:\Windows\rss 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe -
Processes:
csrss.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 csrss.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.execsrss.exepid process 4528 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 4528 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 4528 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 4528 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 4528 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 4528 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 4528 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 4528 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe 4664 csrss.exe 4664 csrss.exe 4664 csrss.exe 4664 csrss.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exesvchost.exedescription pid process Token: SeDebugPrivilege 4528 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Token: SeImpersonatePrivilege 4528 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe Token: SeTcbPrivilege 3500 svchost.exe Token: SeTcbPrivilege 3500 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
svchost.exe4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.execmd.execmd.exedescription pid process target process PID 3500 wrote to memory of 3224 3500 svchost.exe 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe PID 3500 wrote to memory of 3224 3500 svchost.exe 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe PID 3500 wrote to memory of 3224 3500 svchost.exe 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe PID 3224 wrote to memory of 2336 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe cmd.exe PID 3224 wrote to memory of 2336 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe cmd.exe PID 2336 wrote to memory of 1536 2336 cmd.exe netsh.exe PID 2336 wrote to memory of 1536 2336 cmd.exe netsh.exe PID 3224 wrote to memory of 1396 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe cmd.exe PID 3224 wrote to memory of 1396 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe cmd.exe PID 1396 wrote to memory of 3200 1396 cmd.exe netsh.exe PID 1396 wrote to memory of 3200 1396 cmd.exe netsh.exe PID 3224 wrote to memory of 4664 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe csrss.exe PID 3224 wrote to memory of 4664 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe csrss.exe PID 3224 wrote to memory of 4664 3224 4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe"C:\Users\Admin\AppData\Local\Temp\4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe"C:\Users\Admin\AppData\Local\Temp\4cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\EpicNet Inc\CloudNet\cloudnet.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="CloudNet" dir=in action=allow program="C:\Users\Admin\AppData\Roaming\EpicNet Inc\CloudNet\cloudnet.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe ""3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\rss\csrss.exeFilesize
3.7MB
MD50f3c19354bca37d528ca01952ca2adf5
SHA16b407d41ea30461940e6550da333795e0a56b9c1
SHA2564cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43
SHA512fb64589149924605e2f910a558d600b487ca61c7d133087a9e544ff7a0237cebd123e7a7fc681a1bdf8bb5720a7d0569024a0183ede147cc1226e6dfc1133ab3
-
C:\Windows\rss\csrss.exeFilesize
3.7MB
MD50f3c19354bca37d528ca01952ca2adf5
SHA16b407d41ea30461940e6550da333795e0a56b9c1
SHA2564cc3fdd2b9e9ccec1203c8b153e47e9d0632d05ce97c3362c3552c876d8a5e43
SHA512fb64589149924605e2f910a558d600b487ca61c7d133087a9e544ff7a0237cebd123e7a7fc681a1bdf8bb5720a7d0569024a0183ede147cc1226e6dfc1133ab3
-
memory/1396-143-0x0000000000000000-mapping.dmp
-
memory/1536-142-0x0000000000000000-mapping.dmp
-
memory/2336-141-0x0000000000000000-mapping.dmp
-
memory/3200-144-0x0000000000000000-mapping.dmp
-
memory/3224-140-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB
-
memory/3224-139-0x000000000274C000-0x0000000002AF0000-memory.dmpFilesize
3.6MB
-
memory/3224-136-0x0000000000000000-mapping.dmp
-
memory/3224-148-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB
-
memory/4528-132-0x00000000028FE000-0x0000000002CA2000-memory.dmpFilesize
3.6MB
-
memory/4528-135-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB
-
memory/4528-137-0x0000000002CB0000-0x000000000339F000-memory.dmpFilesize
6.9MB
-
memory/4528-134-0x00000000028FE000-0x0000000002CA2000-memory.dmpFilesize
3.6MB
-
memory/4528-133-0x0000000002CB0000-0x000000000339F000-memory.dmpFilesize
6.9MB
-
memory/4528-138-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB
-
memory/4664-145-0x0000000000000000-mapping.dmp
-
memory/4664-149-0x0000000002E00000-0x00000000031A4000-memory.dmpFilesize
3.6MB
-
memory/4664-150-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB
-
memory/4664-151-0x0000000000400000-0x0000000000B0A000-memory.dmpFilesize
7.0MB