Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 17:40

General

  • Target

    JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe

  • Size

    4.4MB

  • MD5

    c418bdd3bdb8a57fd02b99e9633d86f6

  • SHA1

    e8c0bf7b9f90d4421fba285c6f3ec0a96801a392

  • SHA256

    f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d

  • SHA512

    098e6a5a0aaacebad3f47cc126650a49c3c1d873b70264c8de2304057d208ed46da2f8889a35e7ddcb71bfb25415e30064363a3331eea08b41864c00f3a2baa7

  • SSDEEP

    98304:2zFSFAmhXkJj7xWo0CXinfQ3AdTF41pHdzYwrJxOlqf7rEEA:+FXJj78o0Q6QQdRMnzYWoI5A

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba family
  • Glupteba payload 21 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • GoLang User-Agent 6 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:880
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:832
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe /51-51
        3⤵
        • Executes dropped EXE
        • Manipulates WinMonFS driver.
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1332
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4188
        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
          C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4044

Network

  • flag-us
    DNS
    97.17.167.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    97.17.167.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    73.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.144.22.2.in-addr.arpa
    IN PTR
    Response
    73.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-73deploystaticakamaitechnologiescom
  • flag-us
    DNS
    17.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    17.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    humisnee.com
    JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe
    Remote address:
    8.8.8.8:53
    Request
    humisnee.com
    IN A
    Response
    humisnee.com
    IN A
    37.48.65.150
  • flag-us
    DNS
    survey-smiles.com
    JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe
    Remote address:
    8.8.8.8:53
    Request
    survey-smiles.com
    IN A
    Response
    survey-smiles.com
    IN A
    199.59.243.227
  • flag-us
    GET
    http://survey-smiles.com/
    JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: survey-smiles.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Wed, 25 Dec 2024 17:40:37 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: c951dd74-dd82-4923-b96a-50841d0ae393
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_GSbXHjSyM4GBXh+TDdQi5Ch6arC3xeKj8KkRwOq4qrqrlRcvBA0AmkBJ57Iam4tUGtRHYm5e3uPQsAB9Z6SRbg==
    set-cookie: parking_session=c951dd74-dd82-4923-b96a-50841d0ae393; expires=Wed, 25 Dec 2024 17:55:38 GMT; path=/
  • flag-us
    DNS
    150.65.48.37.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    150.65.48.37.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    227.243.59.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    227.243.59.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    ninhaine.com
    IN TXT
    Response
  • flag-us
    DNS
    2makestorage.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    2makestorage.com
    IN TXT
    Response
  • flag-us
    DNS
    nisdably.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    nisdably.com
    IN TXT
    Response
    nisdably.com
    IN TXT
    .v=spf1 include:_incspfcheck.mailspike.net ?all
  • flag-us
    DNS
    4d29edb9-d9f2-4dfa-a729-08785b914ddc.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    4d29edb9-d9f2-4dfa-a729-08785b914ddc.ninhaine.com
    IN TXT
    Response
  • flag-us
    DNS
    server4.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    server4.ninhaine.com
    IN A
    Response
    server4.ninhaine.com
    IN A
    46.8.8.145
  • flag-us
    DNS
    145.8.8.46.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    145.8.8.46.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    ww82.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    ww82.ninhaine.com
    IN A
    Response
    ww82.ninhaine.com
    IN CNAME
    63214.bodis.com
    63214.bodis.com
    IN A
    199.59.243.227
  • flag-us
    DNS
    ww53.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    ww53.ninhaine.com
    IN A
    Response
    ww53.ninhaine.com
    IN CNAME
    g87442272.c.giantpanda.com
    g87442272.c.giantpanda.com
    IN A
    172.104.149.86
    g87442272.c.giantpanda.com
    IN A
    139.162.181.76
    g87442272.c.giantpanda.com
    IN A
    172.104.251.198
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Wed, 25 Dec 2024 17:40:46 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: 0bd7da00-7857-42c2-bb79-52ba7b1543fc
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Tt/J9oqHpuqXX6un3Cskdko3ntgD1EOja6YOeQ+8B1Hpbe2+JoOhWbyNcOz/GR92FxtaOj/IK4FrDZpNw9TExw==
    set-cookie: parking_session=0bd7da00-7857-42c2-bb79-52ba7b1543fc; expires=Wed, 25 Dec 2024 17:55:47 GMT; path=/
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/json; charset=UTF-8
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Wed, 25 Dec 2024 17:40:47 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: 37adaab9-8221-4527-9475-234ba0f0a06f
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Tt/J9oqHpuqXX6un3Cskdko3ntgD1EOja6YOeQ+8B1Hpbe2+JoOhWbyNcOz/GR92FxtaOj/IK4FrDZpNw9TExw==
    set-cookie: parking_session=37adaab9-8221-4527-9475-234ba0f0a06f; expires=Wed, 25 Dec 2024 17:55:47 GMT; path=/
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    172.104.149.86:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.27.1.1
    Date: Wed, 25 Dec 2024 17:40:47 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=f2e1e7919775d52e6832c1a44a61dd00; Path=/; HttpOnly; Max-Age=86400; Expires=Wednesday, 25-Dec-2024 17:40:47 GMT
    Content-Encoding: gzip
  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.149.104.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.149.104.172.in-addr.arpa
    IN PTR
    Response
    86.149.104.172.in-addr.arpa
    IN PTR
    172-104-149-86iplinodeusercontentcom
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    172.104.149.86:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_2) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.0.4 Safari/605.1.15
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.27.1.1
    Date: Wed, 25 Dec 2024 17:40:51 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=ea299fd6d9e92924fc6d1234c6748a1b; Path=/; HttpOnly; Max-Age=86400; Expires=Wednesday, 25-Dec-2024 17:40:51 GMT
    Content-Encoding: gzip
  • flag-us
    DNS
    spolaect.info
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    spolaect.info
    IN A
    Response
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Wed, 25 Dec 2024 17:40:56 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: 7ac8bd2e-cc26-4362-a3a3-5797eb1ed42d
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_WywzW8deDttOwVWIdBFs36MfXi4hdo3mRDaw8B1gNn/UKJyyICBJwOQya0fr5aBDNng9Rlyk8q5VtTSrF+ma+w==
    set-cookie: parking_session=7ac8bd2e-cc26-4362-a3a3-5797eb1ed42d; expires=Wed, 25 Dec 2024 17:55:57 GMT; path=/
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Wed, 25 Dec 2024 17:40:57 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: f2901bc0-2aba-4e8e-bdd9-6236eaa8380a
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Tt/J9oqHpuqXX6un3Cskdko3ntgD1EOja6YOeQ+8B1Hpbe2+JoOhWbyNcOz/GR92FxtaOj/IK4FrDZpNw9TExw==
    set-cookie: parking_session=f2901bc0-2aba-4e8e-bdd9-6236eaa8380a; expires=Wed, 25 Dec 2024 17:55:57 GMT; path=/
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:74.0) Gecko/20100101 Firefox/74.0
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Wed, 25 Dec 2024 17:41:03 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: 58fc3b07-4c30-42b4-a1d9-89c7fb7c6626
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_HOJwisvqfkQYe3YxaKdJH95tEIErvYLi5HcL1anzoHEoc7tc2oPqC9pByXBYFLhe//VYH/f6JdZkNpKrQPnZQQ==
    set-cookie: parking_session=58fc3b07-4c30-42b4-a1d9-89c7fb7c6626; expires=Wed, 25 Dec 2024 17:56:03 GMT; path=/
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Safari/537.36
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Wed, 25 Dec 2024 17:41:09 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: 8e5c9c0d-2ce1-4295-8e58-2ad07b37e038
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_hxqftAGOaadiy0xkjxL0T3H/QrI497LW+WYH1kPLKuk2WUbpvwjClSRGU7ad61Xi+iyVKvlZtqsR5YzuHVQVRg==
    set-cookie: parking_session=8e5c9c0d-2ce1-4295-8e58-2ad07b37e038; expires=Wed, 25 Dec 2024 17:56:10 GMT; path=/
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    107.12.20.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    107.12.20.2.in-addr.arpa
    IN PTR
    Response
    107.12.20.2.in-addr.arpa
    IN PTR
    a2-20-12-107deploystaticakamaitechnologiescom
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    172.104.149.86:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.27.1.1
    Date: Wed, 25 Dec 2024 17:41:16 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=e8ad1ecce9517e4dbe2bf27a7b2bc384; Path=/; HttpOnly; Max-Age=86400; Expires=Wednesday, 25-Dec-2024 17:41:16 GMT
    Content-Encoding: gzip
  • flag-us
    DNS
    81.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    81.144.22.2.in-addr.arpa
    IN PTR
    Response
    81.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-81deploystaticakamaitechnologiescom
  • flag-us
    DNS
    29.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    29.243.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    172.104.149.86:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.130 Safari/537.36
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.27.1.1
    Date: Wed, 25 Dec 2024 17:42:09 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=3506235da36591713fbdd536340b1bc1; Path=/; HttpOnly; Max-Age=86400; Expires=Wednesday, 25-Dec-2024 17:42:09 GMT
    Content-Encoding: gzip
  • flag-us
    DNS
    server4.2makestorage.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    server4.2makestorage.com
    IN A
    Response
  • 37.48.65.150:443
    humisnee.com
    tls
    JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe
    1.4kB
    3.9kB
    12
    11
  • 199.59.243.227:80
    http://survey-smiles.com/
    http
    JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe
    429 B
    2.3kB
    6
    5

    HTTP Request

    GET http://survey-smiles.com/

    HTTP Response

    200
  • 46.8.8.145:443
    server4.ninhaine.com
    tls
    csrss.exe
    784 B
    3.6kB
    9
    10
  • 46.8.8.145:443
    server4.ninhaine.com
    tls
    csrss.exe
    16.4kB
    6.2kB
    53
    56
  • 46.8.8.145:443
    server4.ninhaine.com
    tls
    csrss.exe
    784 B
    3.6kB
    9
    10
  • 199.59.243.227:80
    http://ww82.ninhaine.com/
    http
    csrss.exe
    579 B
    3.8kB
    9
    8

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200
  • 199.59.243.227:80
    http://ww82.ninhaine.com/
    http
    csrss.exe
    473 B
    2.4kB
    7
    7

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200
  • 172.104.149.86:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    423 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 172.104.149.86:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    475 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 199.59.243.227:80
    http://ww82.ninhaine.com/
    http
    csrss.exe
    1.4kB
    9.0kB
    16
    16

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200
  • 172.104.149.86:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    423 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 46.8.8.145:443
    server4.ninhaine.com
    tls
    csrss.exe
    2.1kB
    4.2kB
    16
    19
  • 172.104.149.86:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    461 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 8.8.8.8:53
    97.17.167.52.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    97.17.167.52.in-addr.arpa

  • 8.8.8.8:53
    73.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    73.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    17.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    17.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    humisnee.com
    dns
    JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe
    58 B
    74 B
    1
    1

    DNS Request

    humisnee.com

    DNS Response

    37.48.65.150

  • 8.8.8.8:53
    survey-smiles.com
    dns
    JaffaCakes118_f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d.exe
    63 B
    79 B
    1
    1

    DNS Request

    survey-smiles.com

    DNS Response

    199.59.243.227

  • 8.8.8.8:53
    150.65.48.37.in-addr.arpa
    dns
    71 B
    134 B
    1
    1

    DNS Request

    150.65.48.37.in-addr.arpa

  • 8.8.8.8:53
    227.243.59.199.in-addr.arpa
    dns
    73 B
    131 B
    1
    1

    DNS Request

    227.243.59.199.in-addr.arpa

  • 8.8.8.8:53
    ninhaine.com
    dns
    csrss.exe
    58 B
    58 B
    1
    1

    DNS Request

    ninhaine.com

  • 8.8.8.8:53
    2makestorage.com
    dns
    csrss.exe
    62 B
    135 B
    1
    1

    DNS Request

    2makestorage.com

  • 8.8.8.8:53
    nisdably.com
    dns
    csrss.exe
    58 B
    117 B
    1
    1

    DNS Request

    nisdably.com

  • 8.8.8.8:53
    4d29edb9-d9f2-4dfa-a729-08785b914ddc.ninhaine.com
    dns
    csrss.exe
    95 B
    95 B
    1
    1

    DNS Request

    4d29edb9-d9f2-4dfa-a729-08785b914ddc.ninhaine.com

  • 8.8.8.8:53
    server4.ninhaine.com
    dns
    csrss.exe
    66 B
    82 B
    1
    1

    DNS Request

    server4.ninhaine.com

    DNS Response

    46.8.8.145

  • 8.8.8.8:53
    145.8.8.46.in-addr.arpa
    dns
    69 B
    129 B
    1
    1

    DNS Request

    145.8.8.46.in-addr.arpa

  • 8.8.8.8:53
    ww82.ninhaine.com
    dns
    csrss.exe
    63 B
    105 B
    1
    1

    DNS Request

    ww82.ninhaine.com

    DNS Response

    199.59.243.227

  • 8.8.8.8:53
    ww53.ninhaine.com
    dns
    csrss.exe
    63 B
    148 B
    1
    1

    DNS Request

    ww53.ninhaine.com

    DNS Response

    172.104.149.86
    139.162.181.76
    172.104.251.198

  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    86.149.104.172.in-addr.arpa
    dns
    73 B
    126 B
    1
    1

    DNS Request

    86.149.104.172.in-addr.arpa

  • 8.8.8.8:53
    spolaect.info
    dns
    csrss.exe
    59 B
    138 B
    1
    1

    DNS Request

    spolaect.info

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    107.12.20.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    107.12.20.2.in-addr.arpa

  • 8.8.8.8:53
    81.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    81.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    29.243.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    29.243.111.52.in-addr.arpa

  • 8.8.8.8:53
    server4.2makestorage.com
    dns
    csrss.exe
    70 B
    143 B
    1
    1

    DNS Request

    server4.2makestorage.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

    Filesize

    281KB

    MD5

    d98e33b66343e7c96158444127a117f6

    SHA1

    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

    SHA256

    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

    SHA512

    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

  • C:\Windows\rss\csrss.exe

    Filesize

    4.4MB

    MD5

    c418bdd3bdb8a57fd02b99e9633d86f6

    SHA1

    e8c0bf7b9f90d4421fba285c6f3ec0a96801a392

    SHA256

    f029e49b7a55ddee5b4f4348274631521cab0cef79af1a46c59e007870c6407d

    SHA512

    098e6a5a0aaacebad3f47cc126650a49c3c1d873b70264c8de2304057d208ed46da2f8889a35e7ddcb71bfb25415e30064363a3331eea08b41864c00f3a2baa7

  • memory/880-2-0x0000000004A40000-0x0000000005366000-memory.dmp

    Filesize

    9.1MB

  • memory/880-3-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/880-4-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/880-7-0x0000000004A40000-0x0000000005366000-memory.dmp

    Filesize

    9.1MB

  • memory/880-6-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/880-1-0x00000000045F0000-0x0000000004A3A000-memory.dmp

    Filesize

    4.3MB

  • memory/1332-28-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-27-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-16-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-34-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-22-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-23-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-24-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-25-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-26-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-33-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-32-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-29-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-30-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/1332-31-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/2836-8-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/2836-14-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

  • memory/2836-9-0x0000000000400000-0x00000000027DB000-memory.dmp

    Filesize

    35.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.