Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 20:35

General

  • Target

    JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe

  • Size

    4.4MB

  • MD5

    feb6f2a7f7a4c092138f6b11308ee0c3

  • SHA1

    3af107d6bc65846e7f08996014631ac4204ce370

  • SHA256

    724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331

  • SHA512

    08beb020053d6dc5672a719900ec9d282c3439d0c8d4d4870aa12eeef2edacedcebd82f25b1f038e2ca2e9f67c7f950256a6e616fdc955557b0ca0015daca058

  • SSDEEP

    98304:0csOAtco1SVicHAeEYyjBKKjG8u5KPEIsIlZaCQ:SntcoYVic419u5EsOtQ

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba family
  • Glupteba payload 20 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 2 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • GoLang User-Agent 6 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4156
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe"
      2⤵
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Windows\system32\cmd.exe
        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4996
        • C:\Windows\system32\netsh.exe
          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          PID:5096
      • C:\Windows\rss\csrss.exe
        C:\Windows\rss\csrss.exe /51-51
        3⤵
        • Executes dropped EXE
        • Manipulates WinMonFS driver.
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Windows\SYSTEM32\schtasks.exe
          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3108
        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
          C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2064

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.49.80.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    72.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    72.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    humisnee.com
    JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe
    Remote address:
    8.8.8.8:53
    Request
    humisnee.com
    IN A
    Response
    humisnee.com
    IN A
    185.107.56.199
  • flag-us
    DNS
    survey-smiles.com
    JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe
    Remote address:
    8.8.8.8:53
    Request
    survey-smiles.com
    IN A
    Response
    survey-smiles.com
    IN A
    199.59.243.227
  • flag-us
    GET
    http://survey-smiles.com/
    JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: survey-smiles.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Thu, 26 Dec 2024 20:36:08 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: 2af2916c-2615-44b1-a49a-a6dda37ecb64
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_GSbXHjSyM4GBXh+TDdQi5Ch6arC3xeKj8KkRwOq4qrqrlRcvBA0AmkBJ57Iam4tUGtRHYm5e3uPQsAB9Z6SRbg==
    set-cookie: parking_session=2af2916c-2615-44b1-a49a-a6dda37ecb64; expires=Thu, 26 Dec 2024 20:51:08 GMT; path=/
  • flag-us
    DNS
    199.56.107.185.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    199.56.107.185.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    227.243.59.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    227.243.59.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    ninhaine.com
    IN TXT
    Response
  • flag-us
    DNS
    2makestorage.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    2makestorage.com
    IN TXT
    Response
  • flag-us
    DNS
    nisdably.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    nisdably.com
    IN TXT
    Response
    nisdably.com
    IN TXT
    .v=spf1 include:_incspfcheck.mailspike.net ?all
  • flag-us
    DNS
    85eeae49-5f21-4605-9e1b-1265a2888723.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    85eeae49-5f21-4605-9e1b-1265a2888723.ninhaine.com
    IN TXT
    Response
  • flag-us
    DNS
    server5.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    server5.ninhaine.com
    IN A
    Response
    server5.ninhaine.com
    IN A
    46.8.9.145
  • flag-us
    DNS
    145.9.8.46.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    145.9.8.46.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    58.55.71.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    58.55.71.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    ww82.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    ww82.ninhaine.com
    IN A
    Response
    ww82.ninhaine.com
    IN CNAME
    63214.bodis.com
    63214.bodis.com
    IN A
    199.59.243.227
  • flag-us
    DNS
    ww53.ninhaine.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    ww53.ninhaine.com
    IN A
    Response
    ww53.ninhaine.com
    IN CNAME
    g87442272.c.giantpanda.com
    g87442272.c.giantpanda.com
    IN A
    139.162.181.76
    g87442272.c.giantpanda.com
    IN A
    172.104.149.86
    g87442272.c.giantpanda.com
    IN A
    172.104.251.198
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/json; charset=UTF-8
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Thu, 26 Dec 2024 20:36:19 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=2f1a9aeb9aabdde3d23de9036e74cef1; Path=/; HttpOnly; Max-Age=86400; Expires=Thursday, 26-Dec-2024 20:36:19 GMT
    Content-Encoding: gzip
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Thu, 26 Dec 2024 20:36:19 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=0c425080906304eca46e4effd6d2c97a; Path=/; HttpOnly; Max-Age=86400; Expires=Thursday, 26-Dec-2024 20:36:19 GMT
    Content-Encoding: gzip
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Safari/537.36
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Thu, 26 Dec 2024 20:36:22 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=4cb9f09ed330abf853ae4b89260157a6; Path=/; HttpOnly; Max-Age=86400; Expires=Thursday, 26-Dec-2024 20:36:22 GMT
    Content-Encoding: gzip
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Thu, 26 Dec 2024 20:36:18 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: ec2018df-7170-490a-9e4f-5a02b74cc08e
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Tt/J9oqHpuqXX6un3Cskdko3ntgD1EOja6YOeQ+8B1Hpbe2+JoOhWbyNcOz/GR92FxtaOj/IK4FrDZpNw9TExw==
    set-cookie: parking_session=ec2018df-7170-490a-9e4f-5a02b74cc08e; expires=Thu, 26 Dec 2024 20:51:19 GMT; path=/
  • flag-us
    GET
    http://ww82.ninhaine.com/
    csrss.exe
    Remote address:
    199.59.243.227:80
    Request
    GET / HTTP/1.1
    Host: ww82.ninhaine.com
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.122 Safari/537.36
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    date: Thu, 26 Dec 2024 20:36:28 GMT
    content-type: text/html; charset=utf-8
    content-length: 1054
    x-request-id: a0b75638-365d-449e-bc36-2ba96e3dd4f5
    cache-control: no-store, max-age=0
    accept-ch: sec-ch-prefers-color-scheme
    critical-ch: sec-ch-prefers-color-scheme
    vary: sec-ch-prefers-color-scheme
    x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_sbgV2yErCbmLvyyKFKKrjCYqFoLjwlH2n0PtT0xARnjrSQpTlLmR5cJXpIM9t9Bblrv2ATOy+lLglRrObNWzhg==
    set-cookie: parking_session=a0b75638-365d-449e-bc36-2ba96e3dd4f5; expires=Thu, 26 Dec 2024 20:51:28 GMT; path=/
  • flag-us
    DNS
    76.181.162.139.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    76.181.162.139.in-addr.arpa
    IN PTR
    Response
    76.181.162.139.in-addr.arpa
    IN PTR
    139-162-181-76iplinodeusercontentcom
  • flag-us
    DNS
    spolaect.info
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    spolaect.info
    IN A
    Response
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Thu, 26 Dec 2024 20:36:29 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=07026e8f083f64ac184de61de11f283b; Path=/; HttpOnly; Max-Age=86400; Expires=Thursday, 26-Dec-2024 20:36:29 GMT
    Content-Encoding: gzip
  • flag-us
    DNS
    200.163.202.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.163.202.172.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:73.0) Gecko/20100101 Firefox/73.0
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Thu, 26 Dec 2024 20:36:34 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=76a405ba5e7a5027f4ac60d41146450d; Path=/; HttpOnly; Max-Age=86400; Expires=Thursday, 26-Dec-2024 20:36:34 GMT
    Content-Encoding: gzip
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Safari/537.36
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Thu, 26 Dec 2024 20:36:41 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=6b985376e0f60df739a684ee9d6bbcce; Path=/; HttpOnly; Max-Age=86400; Expires=Thursday, 26-Dec-2024 20:36:41 GMT
    Content-Encoding: gzip
  • flag-us
    DNS
    181.129.81.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    181.129.81.91.in-addr.arpa
    IN PTR
    Response
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Go-http-client/1.1
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Thu, 26 Dec 2024 20:36:46 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=8b1e7a730dbc17feb30c4b6f5a919ffb; Path=/; HttpOnly; Max-Age=86400; Expires=Thursday, 26-Dec-2024 20:36:46 GMT
    Content-Encoding: gzip
  • flag-us
    DNS
    133.130.81.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.130.81.91.in-addr.arpa
    IN PTR
    Response
  • flag-de
    GET
    http://ww53.ninhaine.com/
    csrss.exe
    Remote address:
    139.162.181.76:80
    Request
    GET / HTTP/1.1
    Host: ww53.ninhaine.com
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
    Accept-Encoding: gzip
    Response
    HTTP/1.1 200 OK
    Server: openresty/1.25.3.2
    Date: Thu, 26 Dec 2024 20:37:05 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: keep-alive
    Vary: Accept-Encoding
    Set-Cookie: session_id=4bf17e0c3a9194d266d55d973c089659; Path=/; HttpOnly; Max-Age=86400; Expires=Thursday, 26-Dec-2024 20:37:05 GMT
    Content-Encoding: gzip
  • flag-us
    DNS
    73.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.144.22.2.in-addr.arpa
    IN PTR
    Response
    73.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-73deploystaticakamaitechnologiescom
  • flag-us
    DNS
    nexusrules.officeapps.live.com
    Remote address:
    8.8.8.8:53
    Request
    nexusrules.officeapps.live.com
    IN A
    Response
    nexusrules.officeapps.live.com
    IN CNAME
    prod.nexusrules.live.com.akadns.net
    prod.nexusrules.live.com.akadns.net
    IN A
    52.111.227.14
  • flag-us
    DNS
    14.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.227.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    server5.2makestorage.com
    csrss.exe
    Remote address:
    8.8.8.8:53
    Request
    server5.2makestorage.com
    IN A
    Response
  • 185.107.56.199:443
    humisnee.com
    tls
    JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe
    1.3kB
    3.8kB
    11
    10
  • 199.59.243.227:80
    http://survey-smiles.com/
    http
    JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe
    429 B
    2.3kB
    6
    5

    HTTP Request

    GET http://survey-smiles.com/

    HTTP Response

    200
  • 46.8.9.145:443
    server5.ninhaine.com
    tls
    csrss.exe
    16.5kB
    6.3kB
    54
    58
  • 46.8.9.145:443
    server5.ninhaine.com
    tls
    csrss.exe
    784 B
    3.5kB
    9
    9
  • 46.8.9.145:443
    server5.ninhaine.com
    tls
    csrss.exe
    784 B
    3.5kB
    9
    8
  • 139.162.181.76:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    421 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 139.162.181.76:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    703 B
    2.8kB
    8
    6

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 199.59.243.227:80
    http://ww82.ninhaine.com/
    http
    csrss.exe
    814 B
    4.6kB
    10
    10

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200

    HTTP Request

    GET http://ww82.ninhaine.com/

    HTTP Response

    200
  • 139.162.181.76:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    423 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 139.162.181.76:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    432 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 139.162.181.76:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    466 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 139.162.181.76:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    423 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 46.8.9.145:443
    server5.ninhaine.com
    tls
    csrss.exe
    2.1kB
    4.0kB
    16
    15
  • 139.162.181.76:80
    http://ww53.ninhaine.com/
    http
    csrss.exe
    470 B
    1.5kB
    6
    5

    HTTP Request

    GET http://ww53.ninhaine.com/

    HTTP Response

    200
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    86.49.80.91.in-addr.arpa
    dns
    70 B
    145 B
    1
    1

    DNS Request

    86.49.80.91.in-addr.arpa

  • 8.8.8.8:53
    72.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    72.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    humisnee.com
    dns
    JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe
    58 B
    74 B
    1
    1

    DNS Request

    humisnee.com

    DNS Response

    185.107.56.199

  • 8.8.8.8:53
    survey-smiles.com
    dns
    JaffaCakes118_724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331.exe
    63 B
    79 B
    1
    1

    DNS Request

    survey-smiles.com

    DNS Response

    199.59.243.227

  • 8.8.8.8:53
    199.56.107.185.in-addr.arpa
    dns
    73 B
    134 B
    1
    1

    DNS Request

    199.56.107.185.in-addr.arpa

  • 8.8.8.8:53
    227.243.59.199.in-addr.arpa
    dns
    73 B
    131 B
    1
    1

    DNS Request

    227.243.59.199.in-addr.arpa

  • 8.8.8.8:53
    ninhaine.com
    dns
    csrss.exe
    58 B
    58 B
    1
    1

    DNS Request

    ninhaine.com

  • 8.8.8.8:53
    2makestorage.com
    dns
    csrss.exe
    62 B
    135 B
    1
    1

    DNS Request

    2makestorage.com

  • 8.8.8.8:53
    nisdably.com
    dns
    csrss.exe
    58 B
    117 B
    1
    1

    DNS Request

    nisdably.com

  • 8.8.8.8:53
    85eeae49-5f21-4605-9e1b-1265a2888723.ninhaine.com
    dns
    csrss.exe
    95 B
    95 B
    1
    1

    DNS Request

    85eeae49-5f21-4605-9e1b-1265a2888723.ninhaine.com

  • 8.8.8.8:53
    server5.ninhaine.com
    dns
    csrss.exe
    66 B
    82 B
    1
    1

    DNS Request

    server5.ninhaine.com

    DNS Response

    46.8.9.145

  • 8.8.8.8:53
    145.9.8.46.in-addr.arpa
    dns
    69 B
    129 B
    1
    1

    DNS Request

    145.9.8.46.in-addr.arpa

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    58.55.71.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    58.55.71.13.in-addr.arpa

  • 8.8.8.8:53
    ww82.ninhaine.com
    dns
    csrss.exe
    63 B
    105 B
    1
    1

    DNS Request

    ww82.ninhaine.com

    DNS Response

    199.59.243.227

  • 8.8.8.8:53
    ww53.ninhaine.com
    dns
    csrss.exe
    63 B
    148 B
    1
    1

    DNS Request

    ww53.ninhaine.com

    DNS Response

    139.162.181.76
    172.104.149.86
    172.104.251.198

  • 8.8.8.8:53
    76.181.162.139.in-addr.arpa
    dns
    73 B
    126 B
    1
    1

    DNS Request

    76.181.162.139.in-addr.arpa

  • 8.8.8.8:53
    spolaect.info
    dns
    csrss.exe
    59 B
    138 B
    1
    1

    DNS Request

    spolaect.info

  • 8.8.8.8:53
    200.163.202.172.in-addr.arpa
    dns
    74 B
    160 B
    1
    1

    DNS Request

    200.163.202.172.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    181.129.81.91.in-addr.arpa
    dns
    72 B
    147 B
    1
    1

    DNS Request

    181.129.81.91.in-addr.arpa

  • 8.8.8.8:53
    133.130.81.91.in-addr.arpa
    dns
    72 B
    147 B
    1
    1

    DNS Request

    133.130.81.91.in-addr.arpa

  • 8.8.8.8:53
    73.144.22.2.in-addr.arpa
    dns
    146 B
    274 B
    2
    2

    DNS Request

    73.144.22.2.in-addr.arpa

    DNS Request

    nexusrules.officeapps.live.com

    DNS Response

    52.111.227.14

  • 8.8.8.8:53
    14.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    14.227.111.52.in-addr.arpa

  • 8.8.8.8:53
    server5.2makestorage.com
    dns
    csrss.exe
    70 B
    143 B
    1
    1

    DNS Request

    server5.2makestorage.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

    Filesize

    281KB

    MD5

    d98e33b66343e7c96158444127a117f6

    SHA1

    bb716c5509a2bf345c6c1152f6e3e1452d39d50d

    SHA256

    5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

    SHA512

    705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

  • C:\Windows\rss\csrss.exe

    Filesize

    4.4MB

    MD5

    feb6f2a7f7a4c092138f6b11308ee0c3

    SHA1

    3af107d6bc65846e7f08996014631ac4204ce370

    SHA256

    724d072447d24c548d9533d8be1fabf7fb8d599334d435bee929fc72749d4331

    SHA512

    08beb020053d6dc5672a719900ec9d282c3439d0c8d4d4870aa12eeef2edacedcebd82f25b1f038e2ca2e9f67c7f950256a6e616fdc955557b0ca0015daca058

  • memory/1636-28-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-25-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-22-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-29-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-31-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-27-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-23-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-26-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-16-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-24-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-33-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-34-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-32-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/1636-30-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2396-13-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2396-9-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2396-8-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/2396-7-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/4156-3-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

  • memory/4156-1-0x0000000001280000-0x00000000016C6000-memory.dmp

    Filesize

    4.3MB

  • memory/4156-2-0x00000000016D0000-0x0000000001FF6000-memory.dmp

    Filesize

    9.1MB

  • memory/4156-6-0x00000000016D0000-0x0000000001FF6000-memory.dmp

    Filesize

    9.1MB

  • memory/4156-5-0x0000000000400000-0x0000000000D41000-memory.dmp

    Filesize

    9.3MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.