Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2023 17:57
Static task
static1
General
-
Target
cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe
-
Size
4.2MB
-
MD5
9729aed0deeae79b340f1cc6a96561a5
-
SHA1
169b0538ec432848e75def0c6a75d863a3786a2b
-
SHA256
cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264
-
SHA512
e9fe2d5903405464d59598424b01a85117d253ce211756330f0717180112760cddb2d637440d13b3891b2b41291e48eaeb173c557feabdc24d1dbe620ced7273
-
SSDEEP
98304:RC/oay0UtjjvmEYbQqX7o9EAxis5NYNYAOkLXq8AHA6OGY1L5mLVKqb7S:43y0CjTmEYbQqXoZUYlZcYHAn5cV5S
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
svchost.exedescription pid process target process PID 4324 created 2728 4324 svchost.exe cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe PID 4324 created 1196 4324 svchost.exe csrss.exe PID 4324 created 1196 4324 svchost.exe csrss.exe PID 4324 created 1196 4324 svchost.exe csrss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid process 1196 csrss.exe 2124 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
csrss.execd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
Processes:
cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exedescription ioc process File opened for modification C:\Windows\rss cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe File created C:\Windows\rss\csrss.exe cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3016 4408 WerFault.exe cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3564 schtasks.exe 4332 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-3142 = "South Sudan Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-31 = "Mid-Atlantic Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-391 = "Arab Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1972 = "Belarus Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.execd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exeinjector.execsrss.exepid process 2728 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 2728 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 1196 csrss.exe 1196 csrss.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 1196 csrss.exe 1196 csrss.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe 2124 injector.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exesvchost.execsrss.exedescription pid process Token: SeDebugPrivilege 2728 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Token: SeImpersonatePrivilege 2728 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe Token: SeTcbPrivilege 4324 svchost.exe Token: SeTcbPrivilege 4324 svchost.exe Token: SeBackupPrivilege 4324 svchost.exe Token: SeRestorePrivilege 4324 svchost.exe Token: SeBackupPrivilege 4324 svchost.exe Token: SeRestorePrivilege 4324 svchost.exe Token: SeSystemEnvironmentPrivilege 1196 csrss.exe Token: SeBackupPrivilege 4324 svchost.exe Token: SeRestorePrivilege 4324 svchost.exe Token: SeBackupPrivilege 4324 svchost.exe Token: SeRestorePrivilege 4324 svchost.exe Token: SeBackupPrivilege 4324 svchost.exe Token: SeRestorePrivilege 4324 svchost.exe Token: SeBackupPrivilege 4324 svchost.exe Token: SeRestorePrivilege 4324 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
svchost.execd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.execmd.execsrss.exedescription pid process target process PID 4324 wrote to memory of 4408 4324 svchost.exe cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe PID 4324 wrote to memory of 4408 4324 svchost.exe cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe PID 4324 wrote to memory of 4408 4324 svchost.exe cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe PID 4408 wrote to memory of 544 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe cmd.exe PID 4408 wrote to memory of 544 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe cmd.exe PID 544 wrote to memory of 4960 544 cmd.exe netsh.exe PID 544 wrote to memory of 4960 544 cmd.exe netsh.exe PID 4408 wrote to memory of 1196 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe csrss.exe PID 4408 wrote to memory of 1196 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe csrss.exe PID 4408 wrote to memory of 1196 4408 cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe csrss.exe PID 4324 wrote to memory of 3564 4324 svchost.exe schtasks.exe PID 4324 wrote to memory of 3564 4324 svchost.exe schtasks.exe PID 4324 wrote to memory of 4944 4324 svchost.exe schtasks.exe PID 4324 wrote to memory of 4944 4324 svchost.exe schtasks.exe PID 1196 wrote to memory of 2124 1196 csrss.exe injector.exe PID 1196 wrote to memory of 2124 1196 csrss.exe injector.exe PID 4324 wrote to memory of 4332 4324 svchost.exe schtasks.exe PID 4324 wrote to memory of 4332 4324 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe"C:\Users\Admin\AppData\Local\Temp\cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe"C:\Users\Admin\AppData\Local\Temp\cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 6603⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4408 -ip 44081⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD59729aed0deeae79b340f1cc6a96561a5
SHA1169b0538ec432848e75def0c6a75d863a3786a2b
SHA256cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264
SHA512e9fe2d5903405464d59598424b01a85117d253ce211756330f0717180112760cddb2d637440d13b3891b2b41291e48eaeb173c557feabdc24d1dbe620ced7273
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD59729aed0deeae79b340f1cc6a96561a5
SHA1169b0538ec432848e75def0c6a75d863a3786a2b
SHA256cd191920ad8844e36d6935487d43d8a3e3d129323bef2e8c984a647cbe07c264
SHA512e9fe2d5903405464d59598424b01a85117d253ce211756330f0717180112760cddb2d637440d13b3891b2b41291e48eaeb173c557feabdc24d1dbe620ced7273
-
memory/544-139-0x0000000000000000-mapping.dmp
-
memory/1196-147-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/1196-146-0x0000000002E00000-0x00000000031E9000-memory.dmpFilesize
3.9MB
-
memory/1196-154-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/1196-142-0x0000000000000000-mapping.dmp
-
memory/2124-150-0x0000000000000000-mapping.dmp
-
memory/2728-132-0x0000000002BE6000-0x0000000002FCF000-memory.dmpFilesize
3.9MB
-
memory/2728-136-0x0000000002BE6000-0x0000000002FCF000-memory.dmpFilesize
3.9MB
-
memory/2728-134-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/2728-133-0x0000000002FD0000-0x0000000003847000-memory.dmpFilesize
8.5MB
-
memory/2728-137-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/3564-148-0x0000000000000000-mapping.dmp
-
memory/4332-153-0x0000000000000000-mapping.dmp
-
memory/4408-135-0x0000000000000000-mapping.dmp
-
memory/4408-145-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4408-138-0x0000000002BF6000-0x0000000002FDF000-memory.dmpFilesize
3.9MB
-
memory/4408-141-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4944-149-0x0000000000000000-mapping.dmp
-
memory/4960-140-0x0000000000000000-mapping.dmp