Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2025, 07:53
Behavioral task
behavioral1
Sample
2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe
-
Size
9.1MB
-
MD5
c58f25c810c785f05813475023121031
-
SHA1
6df0a077acb531e0be99bc471150cbe0afbd0679
-
SHA256
30d781083f98cf9197b61b69f5bca602c94a24192e763c471ba37ad490c561d2
-
SHA512
8f07a198dd1da03c98f6890654804400f4bff688d3c09e1ddbfcf8a06e5cb382e06864458e1060bdedb37d7443d27da3a80c9c18efa32f82575901a0d84d34b6
-
SSDEEP
98304:GHxMZDJ1TRpxYVX9u2IazANfdhZytTD5iqm:sxEvYjVzAN1hwN
Malware Config
Signatures
-
Glupteba family
-
Glupteba payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000024220-127.dat family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5952 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 4996 csrss.exe 2960 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe File opened for modification C:\Windows\rss 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe -
pid Process 5820 powershell.exe 5364 powershell.exe 2356 powershell.exe 552 powershell.exe 5012 powershell.exe 5408 powershell.exe 5020 powershell.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2891 = "Sudan Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4648 schtasks.exe 5868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5820 powershell.exe 5820 powershell.exe 5948 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 5948 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 5364 powershell.exe 5364 powershell.exe 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2356 powershell.exe 2356 powershell.exe 552 powershell.exe 552 powershell.exe 5012 powershell.exe 5012 powershell.exe 5408 powershell.exe 5408 powershell.exe 5020 powershell.exe 5020 powershell.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 4996 csrss.exe 4996 csrss.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 4996 csrss.exe 4996 csrss.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe 2960 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 5820 powershell.exe Token: SeDebugPrivilege 5948 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Token: SeImpersonatePrivilege 5948 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Token: SeDebugPrivilege 5364 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 552 powershell.exe Token: SeDebugPrivilege 5012 powershell.exe Token: SeDebugPrivilege 5408 powershell.exe Token: SeDebugPrivilege 5020 powershell.exe Token: SeSystemEnvironmentPrivilege 4996 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 5948 wrote to memory of 5820 5948 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 89 PID 5948 wrote to memory of 5820 5948 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 89 PID 5948 wrote to memory of 5820 5948 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 89 PID 2060 wrote to memory of 5364 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 94 PID 2060 wrote to memory of 5364 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 94 PID 2060 wrote to memory of 5364 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 94 PID 2060 wrote to memory of 1888 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 96 PID 2060 wrote to memory of 1888 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 96 PID 1888 wrote to memory of 5952 1888 cmd.exe 98 PID 1888 wrote to memory of 5952 1888 cmd.exe 98 PID 2060 wrote to memory of 2356 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 99 PID 2060 wrote to memory of 2356 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 99 PID 2060 wrote to memory of 2356 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 99 PID 2060 wrote to memory of 552 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 101 PID 2060 wrote to memory of 552 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 101 PID 2060 wrote to memory of 552 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 101 PID 2060 wrote to memory of 4996 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 103 PID 2060 wrote to memory of 4996 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 103 PID 2060 wrote to memory of 4996 2060 2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 103 PID 4996 wrote to memory of 5012 4996 csrss.exe 104 PID 4996 wrote to memory of 5012 4996 csrss.exe 104 PID 4996 wrote to memory of 5012 4996 csrss.exe 104 PID 4996 wrote to memory of 5408 4996 csrss.exe 109 PID 4996 wrote to memory of 5408 4996 csrss.exe 109 PID 4996 wrote to memory of 5408 4996 csrss.exe 109 PID 4996 wrote to memory of 5020 4996 csrss.exe 112 PID 4996 wrote to memory of 5020 4996 csrss.exe 112 PID 4996 wrote to memory of 5020 4996 csrss.exe 112 PID 4996 wrote to memory of 2960 4996 csrss.exe 114 PID 4996 wrote to memory of 2960 4996 csrss.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5820
-
-
C:\Users\Admin\AppData\Local\Temp\2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5364
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5952
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:5868
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4148
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5408
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:4648
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c7184f3fc55515d97ff7a838c03939ad
SHA10ae5690269cd66ec15ee9b34038a6b490db09488
SHA256abe5dfe01c23804dd11087e2302b4a247a417139e49a3a26089f586f87f567cc
SHA5129eb2f57459f52f2ba7c8b7a023e051ae8a0270eb97a9116ceb3835759e6f9d51a0c5961b985148258e3d7cdef5344476871b709f2fbe91cba6603bb17fd3ef85
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56ba79e8062c1f1d5ed18f2063ec46ec1
SHA1480fff4d1dcd7c30cc97b0d22549a823b3afd944
SHA256249ee27fe5daea764dd25ced616b6c175c9dbe55c950062952eea3ac6ff6d515
SHA5126adfe749904c771943ca7a309a934cd20b40db0a13ac7d6f3cdeeb6c5c198bf63483d45331ffdfa360790efedc8df63ee9815b058592451dca9c7793b7e2d062
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD527d179c959461ac30f6fa235bb5526bd
SHA150b0c46890f633876e10c635565e783230a608a8
SHA2561d3a597d9a5e61a109a81117aa2119faa2875c988c9cc7fe8e96f21f32cf2a85
SHA512409fc6affff84cfbfb2887a8c136ca7a975a4523b8f1985991c43126b0a1d18363a2137d51c532058f677817765ffc9dc2666cb39fb73475ed927c3f64203f4a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5443e7bd59010166026ac35cba77880e1
SHA1ecb229f5d671c0b1729f2232a899bfa1f87c1c25
SHA256a571e0f52f9d1e658700b10f0064b8bd7594180ade42f144838b44f8e0e6737d
SHA512d8baa6e1bbad3fc941ff09216bc9ecb498d78fbfff34b8910cd4aef628b8d63633e4610e351e33917d3693e2ef92f686245d030a27ea44d2a53905cd0c80fe3c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c9844afa306a66813b2d0ffc9fbc3873
SHA1130ff9d3bdcda0426497519b3d0b9ce59dde952a
SHA2567f3a65845befbc1df0dfaee730b5897559cf8c7a3ae27432f25c8ae246aa668c
SHA512374f6550e76041c73c027315796c26a57bf94231b55d2695b8d5bb91654839bc9c34a1b725d9e5a600c76979e4df1b7e63fd55ec2122cbeeefd200ca68dc0403
-
Filesize
9.1MB
MD5c58f25c810c785f05813475023121031
SHA16df0a077acb531e0be99bc471150cbe0afbd0679
SHA25630d781083f98cf9197b61b69f5bca602c94a24192e763c471ba37ad490c561d2
SHA5128f07a198dd1da03c98f6890654804400f4bff688d3c09e1ddbfcf8a06e5cb382e06864458e1060bdedb37d7443d27da3a80c9c18efa32f82575901a0d84d34b6