Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2023 11:02
Static task
static1
General
-
Target
549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe
-
Size
4.1MB
-
MD5
b686cd8125ed80c7811b72ab16c28e2b
-
SHA1
90a794e4d4f5af544b1344bfbb06797a11a89f4f
-
SHA256
549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371
-
SHA512
f9976a2e3520c6eff80cbd4699c07a5678f6f679078897c3ac0ec894826b8f40e466389b22a6b2aad15e5831ceb3c9b00008b81064a83af0e4d29dbdaa3bc14b
-
SSDEEP
98304:+DRa9t52alR+zGMAoLvfaiYMIKqODq2EVBfHX0VJ3VKrlSPNB1rpWSzl:+NAkab+zl1vfj1dbEVpEzlqSz1N
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
svchost.exedescription pid process target process PID 3004 created 4848 3004 svchost.exe 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe PID 3004 created 2180 3004 svchost.exe csrss.exe PID 3004 created 2180 3004 svchost.exe csrss.exe PID 3004 created 2180 3004 svchost.exe csrss.exe -
Executes dropped EXE 3 IoCs
Processes:
csrss.exeinjector.exef801950a962ddba14caaa44bf084b55c.exepid process 2180 csrss.exe 788 injector.exe 4636 f801950a962ddba14caaa44bf084b55c.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe upx C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe upx behavioral1/memory/4636-157-0x0000000000400000-0x0000000000C25000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 2 IoCs
Processes:
549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exedescription ioc process File opened for modification C:\Windows\rss 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe File created C:\Windows\rss\csrss.exe 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3896 schtasks.exe 5036 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exeinjector.execsrss.exepid process 4848 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 4848 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 2180 csrss.exe 2180 csrss.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 2180 csrss.exe 2180 csrss.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe 788 injector.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exesvchost.execsrss.exedescription pid process Token: SeDebugPrivilege 4848 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Token: SeImpersonatePrivilege 4848 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe Token: SeTcbPrivilege 3004 svchost.exe Token: SeTcbPrivilege 3004 svchost.exe Token: SeBackupPrivilege 3004 svchost.exe Token: SeRestorePrivilege 3004 svchost.exe Token: SeBackupPrivilege 3004 svchost.exe Token: SeRestorePrivilege 3004 svchost.exe Token: SeBackupPrivilege 3004 svchost.exe Token: SeRestorePrivilege 3004 svchost.exe Token: SeBackupPrivilege 3004 svchost.exe Token: SeRestorePrivilege 3004 svchost.exe Token: SeSystemEnvironmentPrivilege 2180 csrss.exe Token: SeBackupPrivilege 3004 svchost.exe Token: SeRestorePrivilege 3004 svchost.exe Token: SeBackupPrivilege 3004 svchost.exe Token: SeRestorePrivilege 3004 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
svchost.exe549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.execmd.execsrss.exedescription pid process target process PID 3004 wrote to memory of 1860 3004 svchost.exe 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe PID 3004 wrote to memory of 1860 3004 svchost.exe 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe PID 3004 wrote to memory of 1860 3004 svchost.exe 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe PID 1860 wrote to memory of 3180 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe cmd.exe PID 1860 wrote to memory of 3180 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe cmd.exe PID 3180 wrote to memory of 3620 3180 cmd.exe netsh.exe PID 3180 wrote to memory of 3620 3180 cmd.exe netsh.exe PID 1860 wrote to memory of 2180 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe csrss.exe PID 1860 wrote to memory of 2180 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe csrss.exe PID 1860 wrote to memory of 2180 1860 549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe csrss.exe PID 3004 wrote to memory of 5036 3004 svchost.exe schtasks.exe PID 3004 wrote to memory of 5036 3004 svchost.exe schtasks.exe PID 3004 wrote to memory of 2140 3004 svchost.exe schtasks.exe PID 3004 wrote to memory of 2140 3004 svchost.exe schtasks.exe PID 2180 wrote to memory of 788 2180 csrss.exe injector.exe PID 2180 wrote to memory of 788 2180 csrss.exe injector.exe PID 3004 wrote to memory of 3896 3004 svchost.exe schtasks.exe PID 3004 wrote to memory of 3896 3004 svchost.exe schtasks.exe PID 2180 wrote to memory of 4636 2180 csrss.exe f801950a962ddba14caaa44bf084b55c.exe PID 2180 wrote to memory of 4636 2180 csrss.exe f801950a962ddba14caaa44bf084b55c.exe PID 2180 wrote to memory of 4636 2180 csrss.exe f801950a962ddba14caaa44bf084b55c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe"C:\Users\Admin\AppData\Local\Temp\549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe"C:\Users\Admin\AppData\Local\Temp\549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe4⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeFilesize
893KB
MD5ddb62615645d2da3e4303f17ffe950c0
SHA1663761d23eb33520cdc8297263a82c7de697515d
SHA2562dd3484107278fa302f66dffc47fdd03287f13d562673dd2f64e2f4df311135f
SHA51204a4628fbd97f9e31534eddb6d2b622aadcb1cb6ec3a14c615066b5bfdfcb90a38155e8fd61207b6b5ddb1b04488ba87773f794cdf59ea479be5d8b288302580
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeFilesize
381KB
MD5d67435a131758324915b3087a9a0eee0
SHA17e49bda6cdfdf2d59451bf2ec0249c0a73185ad7
SHA2565cf9330a7b78804b7ae13b5dd8db4c8c4a8f1d0700b823e919ff0d204bf77991
SHA5121b975d0a703d82b864c494f4163ab545fbbb5bf1a61ad678ff2da2a6d0d40c639dbf0b3c3cd89cee57254f378027a040126eb8e5620ad84b1a29f0e14059424c
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\rss\csrss.exeFilesize
4.1MB
MD5b686cd8125ed80c7811b72ab16c28e2b
SHA190a794e4d4f5af544b1344bfbb06797a11a89f4f
SHA256549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371
SHA512f9976a2e3520c6eff80cbd4699c07a5678f6f679078897c3ac0ec894826b8f40e466389b22a6b2aad15e5831ceb3c9b00008b81064a83af0e4d29dbdaa3bc14b
-
C:\Windows\rss\csrss.exeFilesize
4.1MB
MD5b686cd8125ed80c7811b72ab16c28e2b
SHA190a794e4d4f5af544b1344bfbb06797a11a89f4f
SHA256549e4d4a190c573cbdd09aa7b86fceed816ab66cd73b4a5ca03ed5a7721ba371
SHA512f9976a2e3520c6eff80cbd4699c07a5678f6f679078897c3ac0ec894826b8f40e466389b22a6b2aad15e5831ceb3c9b00008b81064a83af0e4d29dbdaa3bc14b
-
memory/788-149-0x0000000000000000-mapping.dmp
-
memory/1860-138-0x00000000028DB000-0x0000000002CC4000-memory.dmpFilesize
3.9MB
-
memory/1860-140-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/1860-135-0x0000000000000000-mapping.dmp
-
memory/1860-144-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/2140-147-0x0000000000000000-mapping.dmp
-
memory/2180-141-0x0000000000000000-mapping.dmp
-
memory/2180-158-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/2180-148-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/2180-145-0x0000000002E00000-0x00000000031E9000-memory.dmpFilesize
3.9MB
-
memory/2180-153-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/3180-137-0x0000000000000000-mapping.dmp
-
memory/3620-139-0x0000000000000000-mapping.dmp
-
memory/3896-152-0x0000000000000000-mapping.dmp
-
memory/4636-154-0x0000000000000000-mapping.dmp
-
memory/4636-157-0x0000000000400000-0x0000000000C25000-memory.dmpFilesize
8.1MB
-
memory/4848-132-0x0000000002B03000-0x0000000002EEC000-memory.dmpFilesize
3.9MB
-
memory/4848-133-0x0000000002EF0000-0x0000000003767000-memory.dmpFilesize
8.5MB
-
memory/4848-134-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4848-136-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/5036-146-0x0000000000000000-mapping.dmp