Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2023 16:42
Static task
static1
General
-
Target
28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe
-
Size
4.1MB
-
MD5
cc3d64956333e837226f2970c7ddbef8
-
SHA1
844bb290e146935b6f482a889d5bccd2c892e8f2
-
SHA256
28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739
-
SHA512
b975f7f8a2fdd51451b096391ac1bfcc76002abd0f55ed5163ee6607790a541872e51e35a4f29d2f7d87362bcd610f93043e20e1740785c0311c9e62ccc186d5
-
SSDEEP
98304:L7TfzaiHcQ3VRXxSozCr0smNhcqJFcdmFhzqZJOwslPcviz2Sa:L7Tfz133XxSozCLmNhIdmFgL20viHa
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
svchost.exedescription pid process target process PID 4268 created 1508 4268 svchost.exe 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe PID 4268 created 5088 4268 svchost.exe csrss.exe PID 4268 created 5088 4268 svchost.exe csrss.exe PID 4268 created 5088 4268 svchost.exe csrss.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid process 5088 csrss.exe 2220 injector.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 2 IoCs
Processes:
28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exedescription ioc process File opened for modification C:\Windows\rss 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe File created C:\Windows\rss\csrss.exe 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3028 schtasks.exe 4952 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exeinjector.execsrss.exepid process 1508 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 1508 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 5088 csrss.exe 5088 csrss.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 5088 csrss.exe 5088 csrss.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe 2220 injector.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exesvchost.execsrss.exedescription pid process Token: SeDebugPrivilege 1508 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Token: SeImpersonatePrivilege 1508 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe Token: SeTcbPrivilege 4268 svchost.exe Token: SeTcbPrivilege 4268 svchost.exe Token: SeBackupPrivilege 4268 svchost.exe Token: SeRestorePrivilege 4268 svchost.exe Token: SeBackupPrivilege 4268 svchost.exe Token: SeRestorePrivilege 4268 svchost.exe Token: SeBackupPrivilege 4268 svchost.exe Token: SeRestorePrivilege 4268 svchost.exe Token: SeBackupPrivilege 4268 svchost.exe Token: SeRestorePrivilege 4268 svchost.exe Token: SeSystemEnvironmentPrivilege 5088 csrss.exe Token: SeBackupPrivilege 4268 svchost.exe Token: SeRestorePrivilege 4268 svchost.exe Token: SeBackupPrivilege 4268 svchost.exe Token: SeRestorePrivilege 4268 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
svchost.exe28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.execmd.execsrss.exedescription pid process target process PID 4268 wrote to memory of 3612 4268 svchost.exe 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe PID 4268 wrote to memory of 3612 4268 svchost.exe 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe PID 4268 wrote to memory of 3612 4268 svchost.exe 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe PID 3612 wrote to memory of 3708 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe cmd.exe PID 3612 wrote to memory of 3708 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe cmd.exe PID 3708 wrote to memory of 4508 3708 cmd.exe netsh.exe PID 3708 wrote to memory of 4508 3708 cmd.exe netsh.exe PID 3612 wrote to memory of 5088 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe csrss.exe PID 3612 wrote to memory of 5088 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe csrss.exe PID 3612 wrote to memory of 5088 3612 28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe csrss.exe PID 4268 wrote to memory of 3028 4268 svchost.exe schtasks.exe PID 4268 wrote to memory of 3028 4268 svchost.exe schtasks.exe PID 4268 wrote to memory of 4080 4268 svchost.exe schtasks.exe PID 4268 wrote to memory of 4080 4268 svchost.exe schtasks.exe PID 5088 wrote to memory of 2220 5088 csrss.exe injector.exe PID 5088 wrote to memory of 2220 5088 csrss.exe injector.exe PID 4268 wrote to memory of 4952 4268 svchost.exe schtasks.exe PID 4268 wrote to memory of 4952 4268 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe"C:\Users\Admin\AppData\Local\Temp\28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe"C:\Users\Admin\AppData\Local\Temp\28785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\rss\csrss.exeFilesize
4.1MB
MD5cc3d64956333e837226f2970c7ddbef8
SHA1844bb290e146935b6f482a889d5bccd2c892e8f2
SHA25628785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739
SHA512b975f7f8a2fdd51451b096391ac1bfcc76002abd0f55ed5163ee6607790a541872e51e35a4f29d2f7d87362bcd610f93043e20e1740785c0311c9e62ccc186d5
-
C:\Windows\rss\csrss.exeFilesize
4.1MB
MD5cc3d64956333e837226f2970c7ddbef8
SHA1844bb290e146935b6f482a889d5bccd2c892e8f2
SHA25628785def6823922fe6fbff2ef34e215fbaaec2253d4fc44eb859b07d9c7b1739
SHA512b975f7f8a2fdd51451b096391ac1bfcc76002abd0f55ed5163ee6607790a541872e51e35a4f29d2f7d87362bcd610f93043e20e1740785c0311c9e62ccc186d5
-
memory/1508-133-0x0000000005190000-0x0000000005A07000-memory.dmpFilesize
8.5MB
-
memory/1508-134-0x0000000000400000-0x0000000002F78000-memory.dmpFilesize
43.5MB
-
memory/1508-136-0x0000000000400000-0x0000000002F78000-memory.dmpFilesize
43.5MB
-
memory/1508-132-0x0000000004D98000-0x0000000005181000-memory.dmpFilesize
3.9MB
-
memory/2220-150-0x0000000000000000-mapping.dmp
-
memory/3028-146-0x0000000000000000-mapping.dmp
-
memory/3612-137-0x0000000004C22000-0x000000000500B000-memory.dmpFilesize
3.9MB
-
memory/3612-144-0x0000000004C22000-0x000000000500B000-memory.dmpFilesize
3.9MB
-
memory/3612-145-0x0000000000400000-0x0000000002F78000-memory.dmpFilesize
43.5MB
-
memory/3612-140-0x0000000000400000-0x0000000002F78000-memory.dmpFilesize
43.5MB
-
memory/3612-135-0x0000000000000000-mapping.dmp
-
memory/3708-138-0x0000000000000000-mapping.dmp
-
memory/4080-147-0x0000000000000000-mapping.dmp
-
memory/4508-139-0x0000000000000000-mapping.dmp
-
memory/4952-153-0x0000000000000000-mapping.dmp
-
memory/5088-141-0x0000000000000000-mapping.dmp
-
memory/5088-148-0x0000000005200000-0x00000000055E9000-memory.dmpFilesize
3.9MB
-
memory/5088-149-0x0000000000400000-0x0000000002F78000-memory.dmpFilesize
43.5MB
-
memory/5088-154-0x0000000000400000-0x0000000002F78000-memory.dmpFilesize
43.5MB