Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2023 12:08
Static task
static1
General
-
Target
8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe
-
Size
4.1MB
-
MD5
783dafd50978b949f7cffa1d8d421181
-
SHA1
644af3254317b0dfb8c6e41ecf228882961894b8
-
SHA256
8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63
-
SHA512
c09d513eb8febb7705fe56680ac9ad64398b5424c8fb9aab9b9e5c2a99cf3a5c60f6fe1af258cdc1d16e57fc1c333d21bdc8359408b7e48ba4d799fe0b4f72eb
-
SSDEEP
98304:NBOSV6AtTQL1Almw7Nke40oxogEDJlh7YB+zjGzI975:NwJ8mwZW0GOJn7KFzs
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
svchost.exedescription pid process target process PID 3260 created 1956 3260 svchost.exe 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe PID 3260 created 5056 3260 svchost.exe csrss.exe PID 3260 created 5056 3260 svchost.exe csrss.exe PID 3260 created 5056 3260 svchost.exe csrss.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid process 5056 csrss.exe 4436 injector.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 2 IoCs
Processes:
8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exedescription ioc process File created C:\Windows\rss\csrss.exe 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe File opened for modification C:\Windows\rss 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4952 schtasks.exe 4944 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-132 = "US Eastern Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exeinjector.execsrss.exepid process 1956 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 1956 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 5056 csrss.exe 5056 csrss.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 5056 csrss.exe 5056 csrss.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe 4436 injector.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exesvchost.execsrss.exedescription pid process Token: SeDebugPrivilege 1956 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Token: SeImpersonatePrivilege 1956 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe Token: SeTcbPrivilege 3260 svchost.exe Token: SeTcbPrivilege 3260 svchost.exe Token: SeBackupPrivilege 3260 svchost.exe Token: SeRestorePrivilege 3260 svchost.exe Token: SeBackupPrivilege 3260 svchost.exe Token: SeRestorePrivilege 3260 svchost.exe Token: SeBackupPrivilege 3260 svchost.exe Token: SeRestorePrivilege 3260 svchost.exe Token: SeBackupPrivilege 3260 svchost.exe Token: SeRestorePrivilege 3260 svchost.exe Token: SeSystemEnvironmentPrivilege 5056 csrss.exe Token: SeBackupPrivilege 3260 svchost.exe Token: SeRestorePrivilege 3260 svchost.exe Token: SeBackupPrivilege 3260 svchost.exe Token: SeRestorePrivilege 3260 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
svchost.exe8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.execmd.execsrss.exedescription pid process target process PID 3260 wrote to memory of 4148 3260 svchost.exe 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe PID 3260 wrote to memory of 4148 3260 svchost.exe 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe PID 3260 wrote to memory of 4148 3260 svchost.exe 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe PID 4148 wrote to memory of 3284 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe cmd.exe PID 4148 wrote to memory of 3284 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe cmd.exe PID 3284 wrote to memory of 2008 3284 cmd.exe netsh.exe PID 3284 wrote to memory of 2008 3284 cmd.exe netsh.exe PID 4148 wrote to memory of 5056 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe csrss.exe PID 4148 wrote to memory of 5056 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe csrss.exe PID 4148 wrote to memory of 5056 4148 8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe csrss.exe PID 3260 wrote to memory of 4952 3260 svchost.exe schtasks.exe PID 3260 wrote to memory of 4952 3260 svchost.exe schtasks.exe PID 3260 wrote to memory of 5052 3260 svchost.exe schtasks.exe PID 3260 wrote to memory of 5052 3260 svchost.exe schtasks.exe PID 5056 wrote to memory of 4436 5056 csrss.exe injector.exe PID 5056 wrote to memory of 4436 5056 csrss.exe injector.exe PID 3260 wrote to memory of 4944 3260 svchost.exe schtasks.exe PID 3260 wrote to memory of 4944 3260 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe"C:\Users\Admin\AppData\Local\Temp\8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe"C:\Users\Admin\AppData\Local\Temp\8580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\rss\csrss.exeFilesize
4.1MB
MD5783dafd50978b949f7cffa1d8d421181
SHA1644af3254317b0dfb8c6e41ecf228882961894b8
SHA2568580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63
SHA512c09d513eb8febb7705fe56680ac9ad64398b5424c8fb9aab9b9e5c2a99cf3a5c60f6fe1af258cdc1d16e57fc1c333d21bdc8359408b7e48ba4d799fe0b4f72eb
-
C:\Windows\rss\csrss.exeFilesize
4.1MB
MD5783dafd50978b949f7cffa1d8d421181
SHA1644af3254317b0dfb8c6e41ecf228882961894b8
SHA2568580f2559856a4fa134a859e8351fc2be7361e6e6f458fd1c44627ede5f38f63
SHA512c09d513eb8febb7705fe56680ac9ad64398b5424c8fb9aab9b9e5c2a99cf3a5c60f6fe1af258cdc1d16e57fc1c333d21bdc8359408b7e48ba4d799fe0b4f72eb
-
memory/1956-133-0x0000000002CD0000-0x0000000003547000-memory.dmpFilesize
8.5MB
-
memory/1956-134-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/1956-136-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/1956-132-0x00000000028E3000-0x0000000002CCC000-memory.dmpFilesize
3.9MB
-
memory/2008-138-0x0000000000000000-mapping.dmp
-
memory/3284-137-0x0000000000000000-mapping.dmp
-
memory/4148-140-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4148-144-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4148-139-0x0000000002AD8000-0x0000000002EC1000-memory.dmpFilesize
3.9MB
-
memory/4148-135-0x0000000000000000-mapping.dmp
-
memory/4436-149-0x0000000000000000-mapping.dmp
-
memory/4944-152-0x0000000000000000-mapping.dmp
-
memory/4952-147-0x0000000000000000-mapping.dmp
-
memory/5052-148-0x0000000000000000-mapping.dmp
-
memory/5056-141-0x0000000000000000-mapping.dmp
-
memory/5056-145-0x0000000002E00000-0x00000000031E9000-memory.dmpFilesize
3.9MB
-
memory/5056-146-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/5056-153-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB