General
-
Target
csrss.7z
-
Size
4.3MB
-
Sample
240701-lf1j7sxckr
-
MD5
d37b3107064b852f43eadace9abbea21
-
SHA1
9e01a766ddb26eb88cfdfe898502524900f92853
-
SHA256
4c80aad5c78ee7d93dd468973e721a120303194dbdac2f23b12b79d730911c60
-
SHA512
00b3cd19f200d199eee46d5b1b0fb27c7b4c0e23df88f155c986bdf1d30d01d2fed89b83d3af38343ea05314fb76b0ee0b1a8fccec4e923080c1facbfa6ac9de
-
SSDEEP
98304:2U6fMpYuMnh2OI/FF9AjuFU531av1WFXT8ndCfg0VTgorO//wv7:0e5Mnhz8G6uXE1W2dIH1goC/Iv7
Static task
static1
Behavioral task
behavioral1
Sample
csrss.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
csrss.exe
-
Size
4.4MB
-
MD5
3290a279c6a78104e8d1040e43bccf50
-
SHA1
2444a43ea7a74fe16a41576357249b96e8598421
-
SHA256
ab00529780e83ef9ab2420cb8f92ab7dd5c07a1ecda0a4785d056acce35f0c79
-
SHA512
a87c491678cc971c667e9d2a657b1a0fd4a386888ee7658a0e9f21a20d0180b9b57a7bc816bc1ff3f02bda7ac01a457d73e426e59a472ef4b6a61528f4aa09f7
-
SSDEEP
98304:Y6fOWfIIjhuSI9nFJA1ukxw3qFq10hWY1Z9Fil/VYVVr5Qv0C:ZHgIjhFWyYMpc10z/gleVV1QsC
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1