Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2023 20:49
Static task
static1
General
-
Target
23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe
-
Size
4.2MB
-
MD5
cec8527a4141de64f8bbfb7cebcf63b8
-
SHA1
7f11873dad6d2970440b054d47bf740bf27fffe6
-
SHA256
23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f
-
SHA512
10fa63076f4ebbd08d3cdf134d60ec17dea040313a989ea281be394dee2b59e7158dbfa76a1161f4e82d93f32c5f0fe5088756eb7f8b874da1138823ec2e335f
-
SSDEEP
98304:6telLDUkO9sPk0KAhDY6LKk1S/Ej2gjwm5RFle5:++/UkRPTXLK4Rj2gkm5I5
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
svchost.exedescription pid process target process PID 1440 created 4640 1440 svchost.exe 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe PID 1440 created 5048 1440 svchost.exe csrss.exe PID 1440 created 5048 1440 svchost.exe csrss.exe PID 1440 created 5048 1440 svchost.exe csrss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid process 5048 csrss.exe 3688 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 2 IoCs
Processes:
23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exedescription ioc process File opened for modification C:\Windows\rss 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe File created C:\Windows\rss\csrss.exe 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3960 4288 WerFault.exe 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4704 schtasks.exe 4036 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates csrss.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs csrss.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exeinjector.execsrss.exepid process 4640 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4640 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 5048 csrss.exe 5048 csrss.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 5048 csrss.exe 5048 csrss.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe 3688 injector.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exesvchost.execsrss.exedescription pid process Token: SeDebugPrivilege 4640 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Token: SeImpersonatePrivilege 4640 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe Token: SeTcbPrivilege 1440 svchost.exe Token: SeTcbPrivilege 1440 svchost.exe Token: SeBackupPrivilege 1440 svchost.exe Token: SeRestorePrivilege 1440 svchost.exe Token: SeBackupPrivilege 1440 svchost.exe Token: SeRestorePrivilege 1440 svchost.exe Token: SeSystemEnvironmentPrivilege 5048 csrss.exe Token: SeBackupPrivilege 1440 svchost.exe Token: SeRestorePrivilege 1440 svchost.exe Token: SeBackupPrivilege 1440 svchost.exe Token: SeRestorePrivilege 1440 svchost.exe Token: SeBackupPrivilege 1440 svchost.exe Token: SeRestorePrivilege 1440 svchost.exe Token: SeBackupPrivilege 1440 svchost.exe Token: SeRestorePrivilege 1440 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
svchost.exe23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.execmd.execsrss.exedescription pid process target process PID 1440 wrote to memory of 4288 1440 svchost.exe 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe PID 1440 wrote to memory of 4288 1440 svchost.exe 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe PID 1440 wrote to memory of 4288 1440 svchost.exe 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe PID 4288 wrote to memory of 1124 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe cmd.exe PID 4288 wrote to memory of 1124 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe cmd.exe PID 1124 wrote to memory of 608 1124 cmd.exe netsh.exe PID 1124 wrote to memory of 608 1124 cmd.exe netsh.exe PID 4288 wrote to memory of 5048 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe csrss.exe PID 4288 wrote to memory of 5048 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe csrss.exe PID 4288 wrote to memory of 5048 4288 23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe csrss.exe PID 1440 wrote to memory of 4704 1440 svchost.exe schtasks.exe PID 1440 wrote to memory of 4704 1440 svchost.exe schtasks.exe PID 1440 wrote to memory of 3804 1440 svchost.exe schtasks.exe PID 1440 wrote to memory of 3804 1440 svchost.exe schtasks.exe PID 5048 wrote to memory of 3688 5048 csrss.exe injector.exe PID 5048 wrote to memory of 3688 5048 csrss.exe injector.exe PID 1440 wrote to memory of 4036 1440 svchost.exe schtasks.exe PID 1440 wrote to memory of 4036 1440 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe"C:\Users\Admin\AppData\Local\Temp\23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe"C:\Users\Admin\AppData\Local\Temp\23e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 8563⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4288 -ip 42881⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD5cec8527a4141de64f8bbfb7cebcf63b8
SHA17f11873dad6d2970440b054d47bf740bf27fffe6
SHA25623e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f
SHA51210fa63076f4ebbd08d3cdf134d60ec17dea040313a989ea281be394dee2b59e7158dbfa76a1161f4e82d93f32c5f0fe5088756eb7f8b874da1138823ec2e335f
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD5cec8527a4141de64f8bbfb7cebcf63b8
SHA17f11873dad6d2970440b054d47bf740bf27fffe6
SHA25623e94e3b7384a4e08ca5eb3df65320159d11ee12acbae28b8df1a50fdaec3d1f
SHA51210fa63076f4ebbd08d3cdf134d60ec17dea040313a989ea281be394dee2b59e7158dbfa76a1161f4e82d93f32c5f0fe5088756eb7f8b874da1138823ec2e335f
-
memory/608-140-0x0000000000000000-mapping.dmp
-
memory/1124-139-0x0000000000000000-mapping.dmp
-
memory/3688-149-0x0000000000000000-mapping.dmp
-
memory/3804-146-0x0000000000000000-mapping.dmp
-
memory/4036-153-0x0000000000000000-mapping.dmp
-
memory/4288-144-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4288-138-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4288-137-0x0000000002AA3000-0x0000000002E8C000-memory.dmpFilesize
3.9MB
-
memory/4288-135-0x0000000000000000-mapping.dmp
-
memory/4640-132-0x00000000029A7000-0x0000000002D90000-memory.dmpFilesize
3.9MB
-
memory/4640-136-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4640-134-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/4640-133-0x0000000002DA0000-0x0000000003617000-memory.dmpFilesize
8.5MB
-
memory/4704-145-0x0000000000000000-mapping.dmp
-
memory/5048-141-0x0000000000000000-mapping.dmp
-
memory/5048-148-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/5048-152-0x0000000000400000-0x0000000000C91000-memory.dmpFilesize
8.6MB
-
memory/5048-147-0x0000000002E00000-0x00000000031E9000-memory.dmpFilesize
3.9MB