Analysis
-
max time kernel
152s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 22:35
Static task
static1
Behavioral task
behavioral1
Sample
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe
Resource
win10v2004-20221111-en
General
-
Target
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe
-
Size
1.2MB
-
MD5
4e87cf628a36e2d160b67954b934b2cc
-
SHA1
f8eae5f87bae52461e2a2a790c058765d5dd9751
-
SHA256
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6
-
SHA512
9ba4bf4094c03419f844c854c0a9407bbbe809470a66e7fd1f0d22eea64ee89858b68374b8d534f99de197e4f622f324e6c78ae2691b91f4303dd432e6f92f61
-
SSDEEP
24576:yB6A6q4kZl5WRHDP/14mohqsODOeDVs2xS/VtRlw1TVf+tEoJL5LlpcE7my:y6qR9WRjPlohmtxS/Vvlw3olvvD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\csrss.exe" ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe -
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
csrss.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile csrss.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" csrss.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" csrss.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
csrss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" csrss.exe -
Processes:
csrss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" csrss.exe -
Drops file in Drivers directory 1 IoCs
Processes:
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe -
Executes dropped EXE 3 IoCs
Processes:
csrss.execsrss.execsrss.exepid process 3652 csrss.exe 4984 csrss.exe 3580 csrss.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
csrss.execsrss.exeba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exeba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion csrss.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe -
Processes:
csrss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" csrss.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
csrss.exeba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run csrss.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SYSTEM = "C:\\Windows\\csrss.exe" ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.execsrss.exedescription pid process target process PID 1612 set thread context of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 4984 set thread context of 3580 4984 csrss.exe csrss.exe -
Drops file in Windows directory 4 IoCs
Processes:
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.execsrss.exedescription ioc process File created C:\Windows\csrss.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe File opened for modification C:\Windows\csrss.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe File opened for modification C:\Windows\ ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe File opened for modification C:\Windows\csrss.exe csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.execsrss.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier csrss.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
csrss.exeba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier csrss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe -
Modifies registry class 8 IoCs
Processes:
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exeba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.execsrss.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174}\InprocServer32 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174}\InprocServer32\ = "%SystemRoot%\\SysWow64\\Speech\\Engines\\SR\\spsrx.dll" ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174}\InprocServer32\ThreadingModel = "Both" ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174}\Programmable ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174} csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174} ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C266174-2C26-6174-2C26-61742C266174}\ = "MsasrUI Class" ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
csrss.exepid process 3580 csrss.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
Processes:
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exeba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.execsrss.execsrss.exedescription pid process Token: 33 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeIncBasePriorityPrivilege 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeIncreaseQuotaPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeSecurityPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeTakeOwnershipPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeLoadDriverPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeSystemProfilePrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeSystemtimePrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeProfSingleProcessPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeIncBasePriorityPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeCreatePagefilePrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeBackupPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeRestorePrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeShutdownPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeDebugPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeSystemEnvironmentPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeChangeNotifyPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeRemoteShutdownPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeUndockPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeManageVolumePrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeImpersonatePrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: SeCreateGlobalPrivilege 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: 33 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: 34 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: 35 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: 36 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe Token: 33 4984 csrss.exe Token: SeIncBasePriorityPrivilege 4984 csrss.exe Token: SeIncreaseQuotaPrivilege 3580 csrss.exe Token: SeSecurityPrivilege 3580 csrss.exe Token: SeTakeOwnershipPrivilege 3580 csrss.exe Token: SeLoadDriverPrivilege 3580 csrss.exe Token: SeSystemProfilePrivilege 3580 csrss.exe Token: SeSystemtimePrivilege 3580 csrss.exe Token: SeProfSingleProcessPrivilege 3580 csrss.exe Token: SeIncBasePriorityPrivilege 3580 csrss.exe Token: SeCreatePagefilePrivilege 3580 csrss.exe Token: SeBackupPrivilege 3580 csrss.exe Token: SeRestorePrivilege 3580 csrss.exe Token: SeShutdownPrivilege 3580 csrss.exe Token: SeDebugPrivilege 3580 csrss.exe Token: SeSystemEnvironmentPrivilege 3580 csrss.exe Token: SeChangeNotifyPrivilege 3580 csrss.exe Token: SeRemoteShutdownPrivilege 3580 csrss.exe Token: SeUndockPrivilege 3580 csrss.exe Token: SeManageVolumePrivilege 3580 csrss.exe Token: SeImpersonatePrivilege 3580 csrss.exe Token: SeCreateGlobalPrivilege 3580 csrss.exe Token: 33 3580 csrss.exe Token: 34 3580 csrss.exe Token: 35 3580 csrss.exe Token: 36 3580 csrss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.execsrss.exepid process 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe 4984 csrss.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exeba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exeba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.execsrss.execsrss.exedescription pid process target process PID 2356 wrote to memory of 1612 2356 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 2356 wrote to memory of 1612 2356 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 2356 wrote to memory of 1612 2356 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 1612 wrote to memory of 3092 1612 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe PID 3092 wrote to memory of 3652 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe csrss.exe PID 3092 wrote to memory of 3652 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe csrss.exe PID 3092 wrote to memory of 3652 3092 ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe csrss.exe PID 3652 wrote to memory of 4984 3652 csrss.exe csrss.exe PID 3652 wrote to memory of 4984 3652 csrss.exe csrss.exe PID 3652 wrote to memory of 4984 3652 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe PID 4984 wrote to memory of 3580 4984 csrss.exe csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe"C:\Users\Admin\AppData\Local\Temp\ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe"C:\Users\Admin\AppData\Local\Temp\ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe"2⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exeC:\Users\Admin\AppData\Local\Temp\ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6.exe3⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\csrss.exe"C:\Windows\csrss.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\csrss.exe"C:\Windows\csrss.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\csrss.exeC:\Windows\csrss.exe6⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Checks BIOS information in registry
- Windows security modification
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5C4E791B.TMPFilesize
66B
MD54fbdb4d9ccb1172951cb0b3434e191ff
SHA1dc4c2549630b1d9b103b758b90ec00918bf3218f
SHA256a7c5bf67b46582847b8cce0d98dc2a4565d4851a021d55ea30096530b4f514ef
SHA5122880c9be71ab512fbf71d1cb100655970f714271a041fa9039efd7f3ae634a450f8c71782500aed23821f9c6ae9c89ba3993bf9b2fd0392b9fec5aa665324bb7
-
C:\Windows\csrss.exeFilesize
1.2MB
MD54e87cf628a36e2d160b67954b934b2cc
SHA1f8eae5f87bae52461e2a2a790c058765d5dd9751
SHA256ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6
SHA5129ba4bf4094c03419f844c854c0a9407bbbe809470a66e7fd1f0d22eea64ee89858b68374b8d534f99de197e4f622f324e6c78ae2691b91f4303dd432e6f92f61
-
C:\Windows\csrss.exeFilesize
1.2MB
MD54e87cf628a36e2d160b67954b934b2cc
SHA1f8eae5f87bae52461e2a2a790c058765d5dd9751
SHA256ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6
SHA5129ba4bf4094c03419f844c854c0a9407bbbe809470a66e7fd1f0d22eea64ee89858b68374b8d534f99de197e4f622f324e6c78ae2691b91f4303dd432e6f92f61
-
C:\Windows\csrss.exeFilesize
1.2MB
MD54e87cf628a36e2d160b67954b934b2cc
SHA1f8eae5f87bae52461e2a2a790c058765d5dd9751
SHA256ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6
SHA5129ba4bf4094c03419f844c854c0a9407bbbe809470a66e7fd1f0d22eea64ee89858b68374b8d534f99de197e4f622f324e6c78ae2691b91f4303dd432e6f92f61
-
C:\Windows\csrss.exeFilesize
1.2MB
MD54e87cf628a36e2d160b67954b934b2cc
SHA1f8eae5f87bae52461e2a2a790c058765d5dd9751
SHA256ba8efd1c3b16d2324a24b74decbd3cf18c1c810ccb6b26713c7dbea9586c74b6
SHA5129ba4bf4094c03419f844c854c0a9407bbbe809470a66e7fd1f0d22eea64ee89858b68374b8d534f99de197e4f622f324e6c78ae2691b91f4303dd432e6f92f61
-
memory/1612-142-0x0000000000611000-0x000000000063F000-memory.dmpFilesize
184KB
-
memory/1612-147-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1612-148-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1612-146-0x0000000000401000-0x000000000044A000-memory.dmpFilesize
292KB
-
memory/1612-139-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1612-135-0x0000000000610000-0x0000000000658000-memory.dmpFilesize
288KB
-
memory/1612-133-0x0000000000000000-mapping.dmp
-
memory/1612-155-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1612-143-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/1612-145-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/2356-137-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/2356-144-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/3092-154-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/3092-152-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/3092-158-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/3092-156-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/3092-151-0x0000000000000000-mapping.dmp
-
memory/3580-188-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/3580-182-0x0000000000000000-mapping.dmp
-
memory/3652-159-0x0000000000000000-mapping.dmp
-
memory/3652-171-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/3652-174-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/4984-166-0x00000000021A0000-0x00000000021E8000-memory.dmpFilesize
288KB
-
memory/4984-176-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/4984-178-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/4984-177-0x0000000000401000-0x000000000044A000-memory.dmpFilesize
292KB
-
memory/4984-179-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/4984-172-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/4984-173-0x00000000021A1000-0x00000000021CF000-memory.dmpFilesize
184KB
-
memory/4984-186-0x0000000000400000-0x00000000004F2000-memory.dmpFilesize
968KB
-
memory/4984-163-0x0000000000000000-mapping.dmp