Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2023 17:41
Static task
static1
General
-
Target
1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe
-
Size
4.2MB
-
MD5
3a9f3a4624bc8ec1ff95ce9ba40ea96b
-
SHA1
1022b9ed9d70a6e4adf5888f0d6f58194c82c7e8
-
SHA256
1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d
-
SHA512
61b1c3ac7ba34d1a26640212d40ad89871aab75b7c275ba42086efba627a5ee940ef5123a6d965b641372443e12164ee4561114c8e2326768ea2ec6d2349f345
-
SSDEEP
98304:RC/oay0UtjjvmEYbQqX7o9EAxis5NYNYAOkLXq8AHA6OGY1L5mLVKqb79:43y0CjTmEYbQqXoZUYlZcYHAn5cV59
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
svchost.exedescription pid process target process PID 4964 created 4728 4964 svchost.exe 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe PID 4964 created 4532 4964 svchost.exe csrss.exe PID 4964 created 4532 4964 svchost.exe csrss.exe PID 4964 created 4532 4964 svchost.exe csrss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid process 4532 csrss.exe 3028 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 2 IoCs
Processes:
1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exedescription ioc process File opened for modification C:\Windows\rss 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe File created C:\Windows\rss\csrss.exe 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5080 schtasks.exe 3392 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2632 = "Norfolk Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exeinjector.execsrss.exepid process 4728 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 4728 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 4532 csrss.exe 4532 csrss.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 4532 csrss.exe 4532 csrss.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe 3028 injector.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exesvchost.execsrss.exedescription pid process Token: SeDebugPrivilege 4728 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Token: SeImpersonatePrivilege 4728 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe Token: SeTcbPrivilege 4964 svchost.exe Token: SeTcbPrivilege 4964 svchost.exe Token: SeBackupPrivilege 4964 svchost.exe Token: SeRestorePrivilege 4964 svchost.exe Token: SeBackupPrivilege 4964 svchost.exe Token: SeRestorePrivilege 4964 svchost.exe Token: SeBackupPrivilege 4964 svchost.exe Token: SeRestorePrivilege 4964 svchost.exe Token: SeBackupPrivilege 4964 svchost.exe Token: SeRestorePrivilege 4964 svchost.exe Token: SeSystemEnvironmentPrivilege 4532 csrss.exe Token: SeBackupPrivilege 4964 svchost.exe Token: SeRestorePrivilege 4964 svchost.exe Token: SeBackupPrivilege 4964 svchost.exe Token: SeRestorePrivilege 4964 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
svchost.exe1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.execmd.execsrss.exedescription pid process target process PID 4964 wrote to memory of 3680 4964 svchost.exe 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe PID 4964 wrote to memory of 3680 4964 svchost.exe 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe PID 4964 wrote to memory of 3680 4964 svchost.exe 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe PID 3680 wrote to memory of 764 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe cmd.exe PID 3680 wrote to memory of 764 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe cmd.exe PID 764 wrote to memory of 3592 764 cmd.exe netsh.exe PID 764 wrote to memory of 3592 764 cmd.exe netsh.exe PID 3680 wrote to memory of 4532 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe csrss.exe PID 3680 wrote to memory of 4532 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe csrss.exe PID 3680 wrote to memory of 4532 3680 1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe csrss.exe PID 4964 wrote to memory of 5080 4964 svchost.exe schtasks.exe PID 4964 wrote to memory of 5080 4964 svchost.exe schtasks.exe PID 4964 wrote to memory of 3228 4964 svchost.exe schtasks.exe PID 4964 wrote to memory of 3228 4964 svchost.exe schtasks.exe PID 4532 wrote to memory of 3028 4532 csrss.exe injector.exe PID 4532 wrote to memory of 3028 4532 csrss.exe injector.exe PID 4964 wrote to memory of 3392 4964 svchost.exe schtasks.exe PID 4964 wrote to memory of 3392 4964 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe"C:\Users\Admin\AppData\Local\Temp\1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe"C:\Users\Admin\AppData\Local\Temp\1a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD53a9f3a4624bc8ec1ff95ce9ba40ea96b
SHA11022b9ed9d70a6e4adf5888f0d6f58194c82c7e8
SHA2561a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d
SHA51261b1c3ac7ba34d1a26640212d40ad89871aab75b7c275ba42086efba627a5ee940ef5123a6d965b641372443e12164ee4561114c8e2326768ea2ec6d2349f345
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD53a9f3a4624bc8ec1ff95ce9ba40ea96b
SHA11022b9ed9d70a6e4adf5888f0d6f58194c82c7e8
SHA2561a739183fa93a8728518c07da71be2ea90ecb144fc6f3b3c9dbf807e7fdde64d
SHA51261b1c3ac7ba34d1a26640212d40ad89871aab75b7c275ba42086efba627a5ee940ef5123a6d965b641372443e12164ee4561114c8e2326768ea2ec6d2349f345
-
memory/764-137-0x0000000000000000-mapping.dmp
-
memory/3028-149-0x0000000000000000-mapping.dmp
-
memory/3228-146-0x0000000000000000-mapping.dmp
-
memory/3392-152-0x0000000000000000-mapping.dmp
-
memory/3592-138-0x0000000000000000-mapping.dmp
-
memory/3680-140-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/3680-139-0x0000000002A41000-0x0000000002E2A000-memory.dmpFilesize
3.9MB
-
memory/3680-135-0x0000000000000000-mapping.dmp
-
memory/3680-144-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4532-141-0x0000000000000000-mapping.dmp
-
memory/4532-147-0x0000000002E00000-0x00000000031E9000-memory.dmpFilesize
3.9MB
-
memory/4532-148-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4532-153-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4728-132-0x0000000002C4C000-0x0000000003035000-memory.dmpFilesize
3.9MB
-
memory/4728-136-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4728-134-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4728-133-0x0000000003040000-0x00000000038B7000-memory.dmpFilesize
8.5MB
-
memory/5080-145-0x0000000000000000-mapping.dmp