Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2025, 10:13
Behavioral task
behavioral1
Sample
2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe
-
Size
9.1MB
-
MD5
b538bbf95474d2b3af7c9a35ca6bae17
-
SHA1
a33fbad3a5601d52224a749a68dfbbd77eadbf2b
-
SHA256
cdc6c87ca04b9ae34b819f3d394c370993d2ca046ddce4acc6b0a8e3c2aa3a6c
-
SHA512
a56cc6d09d7416ae1880c8d757a1fb041c2a01da1314630d1eaee77684d78b8f91733e74f7c6cc473cc6f49968faa1aebc5eceb3ada3c6390946b7bbc07e1587
-
SSDEEP
98304:GHxMZDJ1TRpxYVX9u2IazANf6hZytTD5iq6:sxEvYjVzANihwN
Malware Config
Signatures
-
Glupteba family
-
Glupteba payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000024276-127.dat family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2840 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 316 csrss.exe 2012 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe File created C:\Windows\rss\csrss.exe 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe -
pid Process 5772 powershell.exe 2700 powershell.exe 676 powershell.exe 5548 powershell.exe 4092 powershell.exe 3268 powershell.exe 3040 powershell.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-282 = "Central Europe Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-111 = "Eastern Daylight Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5472 schtasks.exe 5368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3040 powershell.exe 3040 powershell.exe 5588 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 5588 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 5772 powershell.exe 5772 powershell.exe 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2700 powershell.exe 2700 powershell.exe 676 powershell.exe 676 powershell.exe 5548 powershell.exe 5548 powershell.exe 4092 powershell.exe 4092 powershell.exe 3268 powershell.exe 3268 powershell.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 316 csrss.exe 316 csrss.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 316 csrss.exe 316 csrss.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe 2012 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 5588 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Token: SeImpersonatePrivilege 5588 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Token: SeDebugPrivilege 5772 powershell.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 676 powershell.exe Token: SeDebugPrivilege 5548 powershell.exe Token: SeDebugPrivilege 4092 powershell.exe Token: SeDebugPrivilege 3268 powershell.exe Token: SeSystemEnvironmentPrivilege 316 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 5588 wrote to memory of 3040 5588 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 89 PID 5588 wrote to memory of 3040 5588 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 89 PID 5588 wrote to memory of 3040 5588 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 89 PID 3680 wrote to memory of 5772 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 94 PID 3680 wrote to memory of 5772 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 94 PID 3680 wrote to memory of 5772 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 94 PID 3680 wrote to memory of 4752 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 96 PID 3680 wrote to memory of 4752 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 96 PID 4752 wrote to memory of 2840 4752 cmd.exe 98 PID 4752 wrote to memory of 2840 4752 cmd.exe 98 PID 3680 wrote to memory of 2700 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 99 PID 3680 wrote to memory of 2700 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 99 PID 3680 wrote to memory of 2700 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 99 PID 3680 wrote to memory of 676 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 101 PID 3680 wrote to memory of 676 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 101 PID 3680 wrote to memory of 676 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 101 PID 3680 wrote to memory of 316 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 103 PID 3680 wrote to memory of 316 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 103 PID 3680 wrote to memory of 316 3680 2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 103 PID 316 wrote to memory of 5548 316 csrss.exe 104 PID 316 wrote to memory of 5548 316 csrss.exe 104 PID 316 wrote to memory of 5548 316 csrss.exe 104 PID 316 wrote to memory of 4092 316 csrss.exe 109 PID 316 wrote to memory of 4092 316 csrss.exe 109 PID 316 wrote to memory of 4092 316 csrss.exe 109 PID 316 wrote to memory of 3268 316 csrss.exe 112 PID 316 wrote to memory of 3268 316 csrss.exe 112 PID 316 wrote to memory of 3268 316 csrss.exe 112 PID 316 wrote to memory of 2012 316 csrss.exe 114 PID 316 wrote to memory of 2012 316 csrss.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5588 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-17_b538bbf95474d2b3af7c9a35ca6bae17_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5772
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2840
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5548
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:5472
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:2728
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:5368
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54bfb9dc241decd5431ab52e44afdc598
SHA1b34eaf38f7bd8995889ec6b5b7f8716af3141d0a
SHA256719ae58d0c46871a798372f373e67dfcf96f4cac3261de11bbc0d88a22836b7e
SHA512c27b4f775ac6ab0609bb8c0d51d13b6fac09b292e4f4beb95dd80085f430f1c9c4d4a7097efbbcaf15c3b9da7e7887c6e303df2d53cf91968ee5b7aa4caa7886
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5acb794ed245b0b3c976bf5f31796faa7
SHA1256e1ac5bae6d742d821de721ca64c4643324d9c
SHA25623180e1133cb0666e336f64086aef2a76ff15235a5af2e4f2a3ef0e78c6301d6
SHA51294656d261b9b94a206447cb7bad5a1aeb4f3db46e1050aad5de3640e541674d346ced1dac9671c34ae20353667c769238d7fe4b3406d3ef9e0a1f341cc265f66
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ae70805765ef61a0d896803548996c36
SHA1fb1198dcf0596d767ae902167352d63530d17475
SHA2568b68f740316c8384ebad6622dadd35087dcf4d07dccd3a3e740333c09d4c314c
SHA512cea208f56b29a6db7fe8d650d6fddc34141b3c4adb3f43d7d6a9d2354f4f25c3d32b63049302bec995f35c4f5d54e10da1f2ae29e395dfcb0af9f0dd034ccba4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a43737d498e96bd996b38f09f01822f1
SHA1acfc7421302c59dcf8db4ee6cc02b5ff9b0004fd
SHA256a4290c14f6598462bc81a3962f3e5ba399195f78bc7ead407afb1654fbbde954
SHA5123dc1637a86fd568b272d86c6c59508ab88d0d96ea4f6fd3f29de23e329152fcc035f879f39590273f865acb1afb9ac18629794e2beaacb9b9eda55cf878dd14c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5eeb8ac78f2055e1847cdc7418af9b7db
SHA1a81add7417d9f42428b4ee66493a0224668c3a6a
SHA25628f822c2a90ec666c6b325c264aaac2c170c319ea726654851ab3c7ee7e298f4
SHA512ed0d7d9e4c3888df81e31bcf57354b3c300c429fa2e678f1dbf9050bcebae56cb976b51d5be23493776fa0538da507d8e54119b2d7a494c88d5c6197d3db1beb
-
Filesize
9.1MB
MD5b538bbf95474d2b3af7c9a35ca6bae17
SHA1a33fbad3a5601d52224a749a68dfbbd77eadbf2b
SHA256cdc6c87ca04b9ae34b819f3d394c370993d2ca046ddce4acc6b0a8e3c2aa3a6c
SHA512a56cc6d09d7416ae1880c8d757a1fb041c2a01da1314630d1eaee77684d78b8f91733e74f7c6cc473cc6f49968faa1aebc5eceb3ada3c6390946b7bbc07e1587